We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.
In cooperation with Association of Corporate Counsel
  Request new password

Search results

Order by most recent / most popular / relevance

Results: 1-10 of 198

International trade sanctions - finding a path through the thicket

  • Mills & Reeve LLP
  • -
  • European Union, United Kingdom
  • -
  • November 20 2014

We have noticed an upturn in requests for our technology clients to supply to parts of the world affected by international trade sanctions. This is a

European Commission takes action to control exports of cybersecurity tools

  • Norton Rose Fulbright LLP
  • -
  • European Union
  • -
  • November 17 2014

On 22 October 2014, the European Commission (the Commission) adopted a Delegated Regulation updating the European Union (the EU) list of dual-use

DDTC now on snail mail only after systems hacked

  • Bryan Cave LLP
  • -
  • China, USA
  • -
  • November 17 2014

According to various news reports, like this one, the latest federal agency to have been hacked is the State Department. The suspected attack was

Major breakthrough in the Information Technology Agreement expansion talks

  • Katten Muchin Rosenman LLP
  • -
  • China, USA
  • -
  • November 14 2014

The Office of the United States Trade Representative and the Ministry of Commerce of the People's Republic of China announced on November 10, 2014

The Lame Duck has arrived: what to expect

  • Mintz Levin Cohn Ferris Glovsky and Popeo PC
  • -
  • USA
  • -
  • November 11 2014

In the great tradition of American democracy dating back to the election of the First Congress in 1778, voters cast their ballots last week, giving

EU moves ahead on intrusion software; BIS holds back

  • Bryan Cave LLP
  • -
  • European Union
  • -
  • November 11 2014

On October 22, the European Commission amended its List of Dual Use Items to include controls on "intrusion software" which the Wassenaar Plenary

The value of understanding international encryption regulation

  • Steptoe & Johnson LLP
  • -
  • USA
  • -
  • November 4 2014

Encryption technology offers both substantial benefits (by protecting the confidentiality, authenticity, and integrity of business and personal

Beyond borders: the power to block the international flow of digital files

  • Holland & Knight LLP
  • -
  • USA
  • -
  • November 3 2014

With the advance of digital technology, courts are being forced to deal with the legal ramifications beyond the borders of the United States. In a

EU political update: 27 - 31 October 2014

  • Clifford Chance LLP
  • -
  • China, European Union
  • -
  • October 27 2014

On 23 October 2014, the European Council appointed the new European Commission for its mandate starting 1 November 2014 and ending 31 October 2019

5 compliance “hot spots” for technology companies under export controls and sanctions laws

  • Latham & Watkins LLP
  • -
  • USA
  • -
  • October 23 2014

For decades, the US Government has used trade controls export controls as well as trade and economic sanctions to advance national security and