Manuel E. Maisog Partner
|
|
- Tyler Washington
- 5 years ago
- Views:
Transcription
1 Biographies Manuel E. Maisog Partner Beijing direct Languages: English, Mandarin Chinese SERVICES Industries Energy Financial Services Retail and Consumer Products Practices Privacy and Cybersecurity Cybersecurity Incidents Mergers and Acquisitions Asia Pacific China International and Cross- Border Transactions EDUCATION JD, Harvard Law School, cum laude, 1993 AM, Regional Studies - East Asia, Harvard Graduate School of Arts and Sciences, Harvard Grant, 1992 AB, Princeton University, Woodrow Wilson School of Public and International Affairs, magna cum laude, 1989 Inter-University Program (Stanford Center), Taipei, Taiwan, 1988 Bing s practice focuses on sophisticated cross-border transactions involving Asia and especially China, with an emphasis on data protection. Bing Maisog is the Chief Representative of the firm's office in Beijing. He is a member of the firm's corporate practice team, working extensively in advising clients on matters involving data protection and privacy in Asia. Bing frequently advises clients on existing and emerging privacy and data security laws in the Asia- Pacific region, including with respect to the ongoing development of China's developing data protection framework. In addition to data protection and privacy, Bing also advises clients on matters relating to energy, finance, mergers and acquisitions, and foreign direct investment. Relevant Experience Advised several companies (including health care companies and providers of health care-related products and services, manufacturers, real estate companies, retailers, and technology and consumer products companies) on China s new cybersecurity law. Advised a US-based Internet platform developer in relation to China s new cybersecurity law and on Chinese law considerations affecting a proposed SaaS project in China, as well as in relation to the Chinese aspects of its acquisition of a developer and operator of Internet information services platforms including an operating subsidiary in China, a complex local management buyout of the assets of one of its operating subsidiaries in China, and the restructuring of subsidiary ownership in China. Advised a Korean-origin chemicals manufacturer in relation to China s new cybersecurity law and privacy law requirements in relation to employee monitoring. Advised a Canadian data analytics service company on the data privacy requirements applicable in China to a pilot project in Shanghai involving the collection of health-related data on wearable devices. Advised a major US investment firm in relation to rules on whistleblower hotlines and websites in China and Hong Kong. Hunton & Williams LLP 1
2 BAR ADMISSIONS Maryland Advised a US information services firm on the drafting of a preliminary agreement for its provision of analytical software for a data laboratory project to be hosted by its project collaborator. Advised a major hospitality services firm on data breach handling requirements in China. Represented a major US-based consumer products company in relation to privacy requirements in China, including in relation to the use in China of an employee monitoring and data loss prevention solution. Advised a large retailer on matters relating to an in-store marketing campaign in China; the drafting of a privacy statement to conduct a training program in China, Hong Kong, Macau and Taiwan; and the use of customer personal information in the operation of an online customer relations management tool in China, Hong Kong, Macau and Taiwan. Advised a Fortune 10 company on legal issues in the Asia-Pacific region arising in connection with a global data security incident, including matters related to employee monitoring, international transfers, and breach notification obligations. Advised a commercial finance company regarding the use of employee photographs in China. Advised a software company on the formulation of a privacy policy and operating policies for a social networking application to be designed for installation on a website in cooperation with a Chinese microblogging support services operator. In addition, advised this client on the location (in Hong Kong or Shanghai) of a server proposed to host cloud computing functions. Advised a payment services provider on developments in data privacy laws in the Asia-Pacific region, including jurisdictions in China; development of a comprehensive summary of breach notification obligations among China, Taiwan, Hong Kong and Macau; rules and restrictions in China on employee monitoring; Chinese rules relating to the text of a privacy notice for a consumer offerings website; and regulations in China prohibiting the disclosure of account information to overseas parties. Represented an information services company on matters relating to criminal records searches in China, and Chinese foreign investment restrictions on the proposed establishment of offices or subsidiaries to conduct and provide information aggregation, analysis and verification services and products in China. Advised an analytics services provider on matters relating to Chinese rules affecting an online whistleblowing hotline system. Advised a consumer products manufacturer on data protection matters in China, including in regard to information relating to employees and online consumers. Advised a Fortune 50 retail company on its proposal for operation of a data center in China, including advising on matters relating to the location of the data center, cross-border data transfers, and regulatory and prospective licensing requirements for the establishment of the data center. Advised a large consumer products manufacturer on matters relating to the cross-border transfer of employee data from China. Hunton & Williams LLP 2
3 Appointments Delegate, United States of America, Asia-Pacific Economic Cooperation, attending meetings of the Data Privacy Subgroup of the Electronic Commerce Steering Group, in China (2014), the Philippines (2015), Peru (2016), Vietnam (2017) and Papua New Guinea (2018). Second Expert Committee, APEC E-Commerce Business Alliance, appointed for June June 2018 Co-Chair, KnowledgeNet Beijing Chapter, present. Awards & Recognition Best for Cross-Border Transactions China & Energy Law Advisor of the Year China, Acquisition International, AI Offshore Excellence Awards 2016 Data Protection Law Firm of the Year in China, Global Law Experts, 2015 Data Protection Law Firm of the Year, China, Corporate INTL, 2012, 2013 Data Protection Law Firm of the Year, China, Global Law Experts, 2013 Events Presenter, Essential Legislative Approaches for Enabling Cross-Border Data Transfers in a Global Economy, 2nd Expert Committee Working Conference at the APEC Electronic Commerce Business Alliance Annual Meeting, Chengdu, Sichuan Province, December 2017 Speaker, Overview of China's New Cybersecurity Law, DataGuidance Webinar, October 26, 2017 Presenter, The APEC Cross-Border Privacy Rules System and The EU GDPR: Organizational Readiness and Implementation Challenges, IAPP-CCAI India Privacy Summit 2017, Bangalore, India, August 2017 Presenter, Cybersecurity: Risks, Liabilities and Best Practices, Seminar on Cybersecurity sponsored by the Thai Institute of Directors Association, Bangkok, July 2017 Presenter, Privacy Challenges Presented by Big Data Processing, IAPP Asia Privacy Forum 2017, Singapore, July 2017 Presenter, Amendments to Japan s Act on the Protection of Personal Information, June 29, 2017 Presenter, China s New Cybersecurity Law, 2017 Gartner Security and Risk Management Summit, National Harbor, Maryland, June 2017 Moderator for panel discussion segment, How does Japan s Amended Privacy Law Enable Cross-Border Data Flows, the Data Driven Economy, Innovation and Protection of Personal Data, Center for Information Policy Leadership Workshop on Japan s New Data Privacy Regime and How it Will Enable Cross-Border Data Flows, Innovation and Privacy Protections in the Modern Information Age, Tokyo, Japan, May 2017 Presenter, 个人信息保护立法的国际趋势 ( International Trends in Personal Information Protection Legislation ), 个人信息保护闭门会议安排 (Personal Information Protection Closed Door Forum), Beijing, May 2017 Webinar presentation, China s New Cybersecurity Law, Hunton & Williams Webinar, March 2017 Hunton & Williams LLP 3
4 Webinar presentation, China s New Cybersecurity Law, Retail Industry Leaders Association s Privacy Leaders Council, January 2017 Presenter, The APEC Cross-Border Privacy Rules System, American Chamber of Commerce of Singapore, Singapore, January 2017 Presenter, China s New Cybersecurity Law, IAPP KnowledgeNet Singapore Chapter, Singapore, January 2017 Presenter, What Privacy Means for Cybersecurity, Borderless Cyber Asia 2016 conference, co-sponsored by OASIS and Keio University, Tokyo, November 2016 Presenter, The APEC Cross-Border Privacy Rules System, KnowledgeNet Beijing Chapter, Beijing, October 2016 Presenter, Data Privacy and Cybersecurity: Standards and Protocols in the Asia Pacific Region, Bloomberg BNA Webinar, August 2016 Moderator, How to Protect Data Privacy in the Era of Big Data, 6th APEC E- Commerce Business Alliance Forum on Promoting Inclusive Trade Through Cross Border E-Commerce, Jinjiang, Fujian Province, participating as a member of the Second Expert Committee of the APEC E-Commerce Business Alliance, June 2016 Presenter, Data Privacy in China, IT Industry Cybersecurity Best Practices forum, co-sponsored by Chinalabs and United States Information Technology Office, Beijing, September 2015 Presenter, Understanding Top Legal Issues in IT Governance, IT Governance: The Time is Now Director Forum, sponsored by the Thai Institute of Directors Association and the Electronic Transaction Development Agency, Bangkok, September 2015 Panelist, Data Localization in China forum, convened by the American Chamber of Commerce, Beijing, April 2015 Speaker, The Latest Privacy Developments in China, October 24, 2013 Data Flows and Information Governance in an ediscovery Context, ediscovery Asia 2012 Conference, Singapore, November 2012 Overview of Key Privacy Developments in Asia, New York Privacy Officers' Forum, September 23, 2011 Current Developments in the Legal Framework for Data Privacy in China, 7th Annual Korea Communications Conference, May 12, 2011 Publications Co-author, Chapter 7: China, The International Comparative Legal Guide to: Data Protection 2017, 4th Edition, May 2017 Author, China s New Cybersecurity Law, Bloomberg BNA World Data Protection Report, December 2016 Author, China s New Cybersecurity Law, Privacy & Security Law Report, December 5, 2016 Author, 6 highlights of China s new cyber security law, IT ProPortal, November 23, 2016 Author, China s new Cyber Security Law: the controversies examined, Cybersecurity Practitioner, November 2016 Author, China s data localization provision is bad for the nation, IAPP s Privacy Perspectives, November 21, 2016 Hunton & Williams LLP 4
5 Co-author, China, The International Comparative Legal Guide to: Data Protection 2016, 3rd Edition, April 2016 Co-author, Chapter 7, China, The International Comparative Legal Guide to Data Protection 2015, 2nd Edition, May 2015 Co-author, Cybersecurity and Data Breach, Bloomberg BNA Privacy & Data Security Portfolio Series, February 2015 Contributor, Annual Review: Data Protection & Privacy Laws, China & Hong Kong, Financier Worldwide, November 2014 Co-author, Chapter 8, China, The International Comparative Legal Guide to Data Protection 2014, First Edition, May 2014 China: New Chinese 'privacy right' introduced as Google threatens to shut, DataGuidance, January 2010 Contributing Author, Best Practices for Mergers & Acquisitions in China, Aspatore Inside the Minds Series, 2008 Cited in Arthur Waldron, Warlordism versus Feudalism: The Revival of a Debate? 121 The China Quarterly 116, 125 n. 26 (Mar., 1990) Hunton & Williams LLP 5
Technology and data privacy Global perspectives
Technology and data privacy Global perspectives Anna Gamvros, Partner, Hong Kong Barbara Li, Partner, Beijing Ryan Berger, Partner, Vancouver 13 September 2018 Agenda Asia privacy developments HK and China
More informationGetting Your Privacy House in Order
Getting Your Privacy House in Order Lisa J. Sotto Ewa Abrams Victoria King Partner Associate General Counsel Global Privacy Officer Hunton & Williams LLP Tiffany & Co. UPS (212) 309-1223 (212) 230-5351
More informationDevelopments in Global Data Protection & Transfer: How They Impact Third-Party Contracts
Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts Rebecca Eisner Partner +1 312 701 8577 reisner@mayerbrown.com Mark Prinsley Partner +44 20 3130 3900] mprinsley@mayerbrown.com
More informationForum. Ningbo, China 25 February
2014/SOM1/SCE-COW/014 Agenda Item: 4 Telecommunications and Inform ation Working Group Strategic Plan Purpose: Consideration Submitted by: TEL Chair Forum Doc. No.: 2013/SOM3/SCE/017 SOM Steering Committee
More informationWILLIAM RM LONG Partner
Partner London +44 20 7360 3600 +44 20 7626 7937 wlong@sidley.com PRACTICES Banking and Financial Services Healthcare Privacy, Data Security and Information Law INDUSTRIES Financial Services Life Sciences
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationChief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m.
Chief Compliance Officer s (CCO s) Role in Cybersecurity Thursday, February 22 10:00 a.m. 11:00 a.m. Increased use of technologies such as mobile devices, social media and cloud computing has increased
More informationDeveloping and Implementing Data Protection Law: Malaysia and Beyond
Developing and Implementing Data Protection Law: Malaysia and Beyond Professor Abu Bakar Munir Faculty of Law, University of Malaya Malaysia K&K Advocates - Expert Panel Discussion on Data Protection Jakarta,
More informationHOT TOPICS IN DATA PRIVACY REGULATION IN RUSSIA
HOT TOPICS IN DATA PRIVACY REGULATION IN RUSSIA Ksenia Andreeva Anastasia Dergacheva Vasilisa Strizh November 27, 2018 2018 Morgan, Lewis & Bockius 2017 Morgan, Lewis & Bockius Contents News from the Russian
More informationRegional and subregional approaches to the Digital Economy: Lessons from Asia-Pacific and Latin America
Regional and subregional approaches to the Digital Economy: Lessons from Asia-Pacific and Latin America CLT 217 - Cartagena, 21 June 217 Elena Scaramuzzi - Cullen International 216 comparison digital strategies
More information20/09/2013. Global Privacy and Data Protection: Practical Risk Assessment and Governance. Topics
Global Privacy and Data Protection: Practical Risk Assessment and Governance 9 October 2013 Robert Bond, BA, CCEP, HonMIEx Head of Data Protection and Info Security, Speechly Bircham Marti Arvin, CHC-F,
More informationDeveloping Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?
Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Minnesota RIMS 39 th Annual Seminar Risk 2011-2012: Can You Hack
More information2014 Luxury & Fashion Industry Conference for Multinationals
2014 Luxury & Fashion Industry Conference for Multinationals Privacy, Data Protection, and the Impact of Social Media and Online Behavioral Advertising on the Industry Anna Gamvros, Hong Kong Francesca
More informationWorkday s Robust Privacy Program
Workday s Robust Privacy Program Workday s Robust Privacy Program Introduction Workday is a leading provider of enterprise cloud applications for human resources and finance. Founded in 2005 by Dave Duffield
More informationChina s New Cybersecurity Law
China s New Cybersecurity Law March 7, 2017 Presented by: Manuel E. Maisog Hunton & Williams LLP Beijing, China bmaisog@hunton.com Hunton & Williams Global Privacy & Cybersecurity Team Known globally for
More informationEU data security and privacy trends
EU data security and privacy trends Top issues for HR and global mobility 26 29 October 2014 Disclaimer EY refers to the global organization, and may refer to one or more, of the member firms of Ernst
More informationIn Accountable IoT We Trust
In Accountable IoT We Trust AIOTI WG3 Security & Privacy-in-IoT Taskforces, and H2020 CSA CREATE-IoT & LSPs AG Trust in IoT Arthur van der Wees Managing Director Arthur s Legal, the global tech-by-design
More informationGovernment Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security
Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:
More information21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong
Date: Time: 21 August 2015 (Friday) 2:00-5:00 p.m. Venue: N106 N108, 1/F The Hong Kong Convention and Exhibition Centre, 1 Expo Drive Wan Chai, Hong Kong The Chinese Manufacturers Industry About Vocational
More informationRoy E. Hadley, Jr. Overview. Partner. Contact Information. Education.
Roy E. Hadley, Jr. Partner Roy.Hadley@ThompsonHine.com Corporate Transactions & Securities International Privacy & Information Security Overview With a practice that is international in scope, Roy counsels
More informationGlobal Infrastructure Hub Update. G20 Infrastructure Working Group, January 2019
Global Infrastructure Hub Update G20 Infrastructure Working Group, January 2019 IWG Update Introduction Dear IWG members, After a successful 2018, we start 2019 with great enthusiasm, ready to deliver
More informationNIST UPDATES TELECOM MRAS
NIST UPDATES TELECOM MRAS ACIL Mid-Winter Meeting March 28, 2012 Jogindar Dhillon 2 Topics G-to-G Telecom/EMC MRAs Current MRAs NIST Role Various MRA activities Other activities & meetings Other programs
More informationKISH REMARKS APEC CBPR NOV 1 CYBER CONFERENCE KEIO Page 1 of 5 Revised 11/10/2016
Page 1 of 5 INTRODUCTION Jim, thank you for the kind introduction. It is an honor to join the panel. Congratulations to Dr. Murai and Dr. Tezuka for the success of the Keio Cybersecurity Center. Congratulations
More informationInvestigating Insider Threats
Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior
More informationCYBERTECH MIDWEST Indianapolis, Indiana
MIDWEST KICK-OFF EVENT October 23, 2018 CYBERTECH MIDWEST Indianapolis, Indiana KICK-OFF EVENT: Oct. 23, 2018 JW Marriott Indianapolis CONFERENCE & EXHIBITION: June 2019 MIDWEST KICK-OFF EVENT October
More informationSteps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.
Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. The cyber threats are no longer a question of if, but when, a breach will occur. It is important
More informationREGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES
REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES Port of Spain 30 September 2015 David Satola Why combatting
More informationencrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?
Data Privacy According to statistics provided by the Data Breach Level Index, hackers and thieves are stealing more than 227,000 personal records per hour as of 2017, generally targeting customer information
More informationUL and Business Continuity
UL and Business Continuity David Stowe, CBCP Business Continuity Manager APEC EPWG Workshop: Private Sector Emergency Preparedness Hotel Monterey Sendai 3 rd August 2011 2011 Underwriters Laboratories
More informationFundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment
Fundamentals of Cybersecurity/CIIP Building Capacity: Using a National Strategy & Self- Presented to: 2009 ITU Regional Cybersecurity Forum for Asia-Pacific Connecting the World Responsibly 23-25 25 September
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More informationData Governance for Smart City Management
The 4th Asia-Pacific Regional Forum on Smart Sustainable Cities and e-government 2018 Data Governance for Smart City Management July 2018 Thanh Hoa City, Vietnam Mi Kyoung Park United Nations Project Office
More informationPKFARE Corporate Profile
PKFARE Corporate Profile GLOBAL TRAVEL B2B MARKETPLACE 02 / 13 / 2018 1 About PKFARE PKFARE is an innovative global travel B2B marketplace targeting air tickets, hotels and destination products. Empowered
More informationANTICIPATE. MITIGATE. PROTECT.
ANTICIPATE. MITIGATE. PROTECT. FROM ESSENTIAL NEWS AND EXPERT ANALYSIS TO TOOLS THAT HELP YOU MAP YOUR STRATEGIES, BLOOMBERG LAW: PRIVACY & DATA SECURITY DELIVERS. Stay Connected #BloombergLaw @BloombergLaw
More informationipac Initiative Web Platform Between IP Academies for Sharing Information February 3, 2011 International Affairs Division Japan Patent Office
ipac Initiative Web Platform Between IP Academies for Sharing Information February 3, 2011 International Affairs Division Japan Patent Office 1 Introduction Asia-Pacific Economic Cooperation Framework
More informationVice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security
Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity
More information2018 China International Consumer Electronics Show (SINOCES) Invitation
2018 China International Consumer Electronics Show (SINOCES) Invitation I. Introduction China International Consumer (SINOCES) is a state-level consumer electronics show endorsed by the State Council,
More informationThe APEC Model. Global Partnership through Regional Initiatives
The APEC Model Global Partnership through Regional Initiatives Tony Beard Office of Transport Security (OTS), Department of Transport and Regional Services (DOTARS), Australia Office of Transport Security
More informationFinancial Regulations, Enforcement & Cybersecurity
Financial Regulations, Enforcement & Cybersecurity Elizabeth P. Gray May 16, 2017 Copyright 2017 by Willkie Farr & Gallagher LLP. All Rights Reserved. These course materials may not be reproduced or disseminated
More informationDisruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise
Disruptive Technologies Legal and Regulatory Aspects 16 May 2017 Investment Summit - Swiss Gobal Enterprise Legal and Regulatory Framework in Switzerland Legal and regulatory Framework: no laws or provisions
More informationMANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors
Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative
More informationMARKETING ALLIANCE MEDIA KIT 2016/17
1 MARKETING ALLIANCE MEDIA KIT 2016/17 2 Our Audience Social Media over 2.5 million C-Level Executives, NGOs, and business owners Our Magazines Featured on itunes and Google Play and promoted through our
More informationPROJECT BACKGROUND AND RATIONALE
PROJECT BACKGROUND AND RATIONALE The political agreement on the EU General Data Protection Regulation (GDPR) has been reached and the new Regulation will be on the books by the end of the first quarter
More informationClient Services Procedure Manual
Procedure: 85.00 Subject: Administration and Promotion of the Health and Safety Learning Series The Health and Safety Learning Series is a program designed and delivered by staff at WorkplaceNL to increase
More information2017/SOM3/DIA/007 Digital Trade Building Blocks
2017/SOM3/DIA/007 Digital Trade Building Blocks Submitted by: Information Technology Industry Council Dialogue on Regional Trade Agreements and Free Trade Agreements Ho Chi Minh City, Viet Nam 27 August
More informationFirst Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh.
First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh. DRAFT SUBMISSION OF [ORGANIZATION] PROJECTS/ACTIVITIES/STUDIES [Date] Objective: This
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)
COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion
More informationASEAN s Cyber Confidence Building Measures
ASEAN s Cyber Confidence Building Measures Presentation by the ASEAN Secretariat UNIDIR Cyber Stability Seminar: Preventing Cyber Conflict 10 February 2014, Geneva, Switzerland Outline ASEAN Mechanisms
More informationITU-ACMA Asia Pacific Regulators Roundtable July 2014
ITU-ACMA Asia Pacific Regulators Roundtable 2014 21-22 July 2014 Session 2: Evolution of the Regulator Addressing International Concerns Content Page Cyber Security Cross-border Data Flow Interoperability
More informationTHE MADRID PROTOCOL. A single trademark registration supports regional economic integration. A Case Study
THE MADRID PROTOCOL A single trademark registration supports regional economic integration A Case Study The Madrid Protocol: Protecting brands globally The Madrid System for the International Registration
More informationBenefits of Open Cross Border Data Flows
/SMEWG41/039 Agenda Item: 16.3 Benefits of Open Cross Border Data Flows Purpose: Information Submitted by: United States 41 st Small and Medium Enterprises Working Group Meeting Iloilo, Philippines 23-24
More informationTrend Micro Reports Record First Quarter Revenue & Operating Profit
Trend Micro Reports Record First Quarter Revenue & Operating Profit Continued strong growth in U.S and Asia highlight quarter Tokyo, Japan April 25, 2006 Trend Micro, Incorporated (TSE: 4704, NASDAQ: TMIC),
More informationMinisterial Meeting 19 th June 2015 Nuku alofa, Tonga
Asia Pacific Regional Development Forum 2015: Smartly Digital Asia Pacific Outcome of the Pacific ICT Ministerial Meeting 19 th June 2015 Nuku alofa, Tonga Presented by: Paula P. Ma u CEO, MIC, Tonga Outline
More informationEU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS
EU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS 18 May 2014 Monica Salgado Portuguese Laywer (Advogada) / Registered European Lawyer Janine Regan Solicitor Monica Salgado Monica is a Portuguese qualified
More informationSCCE ECEI 2014 EU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS. Monica Salgado JANINE REGAN CIPP/E
EU DATA PRIVACY COMPLIANCE FOR US DRIVEN PROJECTS 18 May 2014 Monica Salgado Portuguese Laywer (Advogada) / Registered European Lawyer Janine Regan Solicitor Monica Salgado Monica is a Portuguese qualified
More informationUNITED STATES OFFICE OF PERSONNEL MANAGEMENT
UNITED STATES OFFICE OF PERSONNEL MANAGEMENT TESTIMONY OF BETH F. COBERT ACTING DIRECTOR U.S. OFFICE OF PERSONNEL MANAGEMENT before the COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM UNITED STATES HOUSE
More informationPresented by AI Yuxin, Programme Officer, CSAM
The 2nd Meeting of the Technical Working Groups of the Asian and Pacific Network for Testing of Agricultural Machinery (ANTAM) Presented by AI Yuxin, Programme Officer, CSAM Launched in Bangkok in 2013,
More informationAdvancing Kyocera Philosophy Education
Management Philosophy Advancing Kyocera Philosophy Education Kyocera Philosophy Education: Basic Concept and Structure In the Kyocera Group, a variety of education programs are provided to each employee
More informationBENEFITS of MEMBERSHIP FOR YOUR INSTITUTION
PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment
More informationPRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology
PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology 24 October 2017 Content Overview of Cyber Security Law Observations on Implementation of Cyber
More informationNIST Designation of CABs: Upcoming Changes for the US and EU Review for Japan
NIST Designation of CABs: Upcoming Changes for the US and EU Review for Japan Japan MRA Workshop March 2, 2016 Presented by Ramona Saar Program Manager, NIST Version updated 2/26/2016 Topics Introduction:
More informationAction Plan Developed by. Institute of Certified Public Accountants of Uganda BACKGROUND NOTE ON ACTION PLANS
BACKGROUND NOTE ON ACTION PLANS Action Plans are developed by IFAC members and associates to address policy matters identified through their responses to the IFAC Compliance Self-Assessment Questionnaires.
More informationSafeguards on Personal Data Privacy.
Safeguards on Personal Data Privacy. Peter Koo Partner, Enterprise Risk Services Deloitte Touche Tohmatsu Maverick Tam Associate Director, Enterprise Risk Services Deloitte Touche Tohmatsu Deloitte ERS
More informationLEGISLATION UPDATE Updates on EU Data Protection Regulation, Patient Privacy and Consent 10 Things Every Bio/Pharma Need to Know Now
LEGISLATION UPDATE Updates on EU Data Protection Regulation, Patient Privacy and Consent 10 Things Every Bio/Pharma Need to Know Now CBI Global Life Science Compliance Meeting November 16, 2016 Contents
More informationCIPP/E CIPT. Data Protection Technologist (DPT) Training Bundle Official IAPP Training and Certification
CIPP/E CIPT Data Protection Technologist (DPT) Training Bundle Official IAPP Training and Certification The CIPP/E + CIPT credentials shows you ve got the knowledge to build your organization s privacy
More informationHong Kong s Personal Data (Privacy) Ordinance
Asia Privacy Bridge Forum 11 May 2016 Hong Kong s Personal Data (Privacy) Ordinance Fanny Wong Deputy Privacy Commissioner for Personal Data Hong Kong, China The Personal Data Landscape in Asia 2011 2003
More informationNATIONAL PROGRAMME Chapter 15 Telecommunication and Post. Telecommunication and Post
Introduction Telecommunication and Post The n legislation in the field of telecommunication and post is almost in full incompliance with that of the EU, except for certain legal rules on general legal
More informationAudit and Compliance Committee - Agenda
Audit and Compliance Committee - Agenda Board of Trustees Audit and Compliance Committee April 17, 2018, 1:30 2:30 p.m. President s Board Room Conference Call-In Phone #1-800-442-5794, passcode 463796
More informationCASE STUDY Institution Building in Malaysia Establishing the National SDG Council
Institution Building in Malaysia Establishing the National SDG Council Background Information Malaysia created the National SDG Council as part of the National Action Committee in December 2016, to provide
More informationThe Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationBuilding YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services
Building YOUR Privacy Program: One Size Does Not Fit All Justine Gottshall Partner, InfoLawGroup, LLP Chief Privacy Officer, Signal Jgottshall@infolawgroup.com Adam Nelson Executive Consultant Global Data
More informationTrough a cyber security lens
Trough a cyber security lens 2015 Global Audit Survey kpmg.ch/cyber What the 2015 survey tells us Short of a crisis, the issues on the audit committee s radar don t change dramatically from year to year
More informationIntroduction of APCERT APCERT
Introduction of Yurie Ito, JPCERT/CC (On behalf of the Secretariat) (Asia Pacific Computer Emergency Response Team) is a coalition of the forum of CSIRTs (Computer Security Incident Response Teams). The
More informationAon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary
Aon Client Data Privacy Summary Table of Contents Our Commitment to Data Privacy 3 Our Data Privacy Principles 4 Aon Client Data Privacy Summary 2 Our Commitment to Data Privacy Data Privacy Backdrop As
More informationNYDFS Cybersecurity Regulations
SPEAKERS NYDFS Cybersecurity Regulations Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 lsotto@hunton.com www.huntonprivacyblog.com March 9, 2017 The Privacy Team at Hunton & Williams Over 30 privacy
More informationENFORCEMENT POWERS. The EU Perspective. Olivier Proust. Associate Hunton & Williams LLP
ENFORCEMENT POWERS The EU Perspective Olivier Proust Associate Hunton & Williams LLP What is enforcement within the EU? Broad sense: Any action leading to better compliance Awareness raising activities
More informationCybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationLegal and Regulatory Developments for Privacy and Security
Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions
More informationASEAN: One Community, One Destiny.
Cambodia 2012 ASEAN: One Community, One Destiny. Chairman s Statement of The 13 th ASEAN Plus Three Foreign Ministers Meeting 10 July 2012, Phnom Penh, Cambodia 1. The 13th Meeting of the Foreign Ministers
More informationInternational Legal Regulation of Cybersecurity U.S.-German Standards Panel 2018
International Legal Regulation of Cybersecurity U.S.-German Standards Panel 2018 Dr. Dennis-Kenji Kipker University of Bremen Washington DC, 10.04.2018 Gefördert vom FKZ: 16KIS0213 bis 16KIS0216 Slide
More informationIntroduction of APCERT
Introduction of APCERT Yurie Ito, JPCERT/CC (On behalf of the APCERT Secretariat) APCERT APCERT (Asia Pacific Computer Emergency Response Team) is a coalition of the forum of CSIRTs (Computer Security
More informationBureau of Industry and Security U.S. Department of Commerce
Page 1 of 6 Bureau of Industry and Security U.S. Department of Commerce Where Industry and Security Intersect What's New Sitemap Search About Home BIS >News News Press Releases Speeches Testimony Publications
More informationAPEC Sectoral Ministerial Meetings 1997
1997/SOM1/017 APEC Sectoral Ministerial Meetings 1997 Submitted by: Canada First Senior Officials Meeting Victoria, Canada 27-28 January 1997 FINANCE - 5-6 APRIL, PHILIPPINES Status: draft agenda will
More informationCompilation of Good Practices on Enhancing Resilience of GVCs to Natural Disasters
2016/SOM3/EPWG/011 Agenda Item: 10.2 Compilation of Good Practices on Enhancing Resilience of GVCs to Natural Disasters Purpose: Information Submitted by: Japan Forum Doc. No.: 2016/SOM2/025anx16 10 th
More informationTitle of the presentation Date # EU-CHINA (Qingdao) Business and Technology Cooperation Fair
EU-CHINA (Qingdao) Business and Technology Cooperation Fair EU-CHINA Business and Technology Cooperation Fair Title of the presentation Date # Introduction The EU-China Business & Technology Cooperation
More informationCanada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?
Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY
More informationData Privacy & Protection
Data Privacy & Protection March 10, 2016 Data Breach Notification and Cybersecurity Developments in 2016 Melissa J. Krasnow, Dorsey & Whitney LLP, and Certified Information Privacy Professional/US This
More informationSymposium on Trustmark Guidelines in CBPR System
2011/SOM3/ECSG/005 Agenda Item: VII2a Symposium on Trustmark Guidelines in CBPR System Purpose: Consideration Submitted by: Viet Nam 24 th Electronic Commerce Steering Group Meeting San Francisco, United
More informationINSIDE. 2 Introduction 15 Conclusion 4 Cyber: A Top-of-Mind Concern A Message From Morrison & Foerster s Global Privacy & Data Security Chair
INSIDE 1 A Message From Morrison & Foerster s Global Privacy & Data Security Chair 12 Operational Considerations 2 Introduction 15 Conclusion 4 Cyber: A Top-of-Mind Concern 16 7 Privacy: An Area of Growing
More informationCyber Risks in the Boardroom Conference
Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks
More informationPilot Study on Big Data: Philippines. World Telecommunications/ICT Indicators Symposium (WTIS) November 2017 Hammamet, Tunisia
Pilot Study on Big Data: Philippines World Telecommunications/ICT Indicators Symposium (WTIS) 14-16 November 2017 Hammamet, Tunisia Background, Objective, Scope - In June 2016, ITU initiated a pilot project
More informationEconomy Report [CHINA] 24 rd APLMF Meeting Siem Reap, Cambodia. BeiJing, China. Report developed/approved by Position
24 rd APLMF Meeting Siem Reap, Cambodia Economy Report - 2017 [CHINA] Report developed/approved by Position Organisation Contact details Xie.Jun BeiJing, China Department of Metrology, AQSIQ No.9 Madian
More informationARRA State & Local Energy Assurance Planning & Implementation
State Energy Policy and Technology Outlook Conference February 2, 2010, Washington, DC ARRA State & Local Energy Assurance Planning & Implementation Alice Lippert Senior Technical Advisor Office of Electricity
More informationHow Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework
More informationPromoting Trade, Inclusiveness and Connectivity for Sustainable Development
Promoting Trade, Inclusiveness and Connectivity for Sustainable Development Setting the Scene CTD WORKSHOP 30 MAY 2017 1 Global Reviews of Aid for Trade Since 2007, successive Global Reviews of Aid for
More informationIPS Securex s revenue rose 36.5% to S$2.3 million in 1Q2018
IPS Securex Holdings Limited Company Registration Number: 201327639H Incorporated in the Republic of Singapore 213 Henderson Road, #04-09, Henderson Industrial Park Singapore 159553 www.ips-securex.com
More information2018 Morgan, Lewis & Bockius LLP
CYBERSECURITY, PERSONAL DATA PROTECTION, AND INTERNET REGULATION IN RUSSIA Ksenia Andreeva, Anastasia Dergacheva, Vasilisa Strizh, Brian Zimbler May 22, 2018 2018 Morgan, Lewis & Bockius LLP Content Data
More informationApplication of Big Data and Open Data to Emergency Preparedness
2016/SOM1/EPWG/004a Agenda Item: 7.1 Application of Big Data and Open Data to Emergency Preparedness Purpose: Information Submitted by: Chinese Taipei 9 th Emergency Preparedness Working Group Meeting
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More information