CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Data Laws
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Data Laws

Didi signage logo on building showing ride hailing app ruling on China data laws
Data PrivacyNews

China Fines Leading Ride Hailing App Didi $1.2 Billion in Ruling That Clarifies Violations of Data Laws

July 25, 2022
Ride hailing giant Didi's exile into the wilderness appears to be ending, and the Chinese government's harsh wave of regulatory crackdowns has taken sharper focus, as the investigation has concluded and a fine of $1.2 billion has been announced.
Read More
A smartphone with the Tencent logo in a clenched hand against China flag showing suspension of new apps under data laws
Data PrivacyNews

China’s New Data Laws Force Tencent to Submit New Apps & Updates for Government Approval

November 29, 2021
One of China's biggest tech companies has been told to pause any rollout of new apps. Tencent is now subject to added scrutiny from the government after multiple instances of running afoul of the country's new data laws.
Read More
Tiananmen Square in China showing Chinese data laws
Data ProtectionInsights

Chinese Data Laws and Ambitions Pose Strategic Risks

July 19, 2021
China's new data laws formalizes a legal architecture for Chinese government control over domestic data; a basis for the CCP to claim – and claim oversight over – information, including that of private companies.
Read More

Latest

World map on a technological background showing data privacy laws and cross-border data sharing

Navigating Evolving Data Privacy Laws and Cross-Border Data Sharing

Boy using phone in bed at night showing cyber safety and end-to-end encryption

UK Government Wrestles With Balance Between Child Cyber Safety and Legitimate End-to-End Encryption Purposes as Agencies Endorse Client-Side Scanning

Cisco logo on a wall showing network breach due to voice phishing and MFA fatigue

Cisco Network Breach Traced Back To Compromised Personal Google Account; Sophisticated Attacker Used Combination of Voice Phishing and MFA Fatigue

Empty control center showing cybersecurity workforce gap and DevSecOps divide

Stop Fretting About Hiring Security Specialists

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results