Search

Clear all

Refine your search

10 results found

Article

Tiang & Partners | Hong Kong | 10 Jun 2019

Aviation Finance & Leasing in Hong Kong

A structured guide to aviation finance & leasing in Hong Kong

Article

Tiang & Partners | Hong Kong | 30 May 2019

Insurance considerations for aircraft financing and leasing in Hong Kong

This article covers the primary insurance and liability considerations for aircraft financing and leasing in Hong Kong.

Article

Tiang & Partners | Hong Kong | 30 May 2019

Aircraft repossession and enforcement of security in Hong Kong

This article covers the basics of aircraft repossession and the enforcement of aircraft security interests in Hong Kong.

Article

Tiang & Partners | Hong Kong | 30 May 2019

Creating and registering security interests over aircraft in Hong Kong

This quick guide outlines the major formalities and procedures to create and register security interests over aircraft in Hong Kong.

Article

Tiang & Partners | China | 17 Mar 2019

China's spectacular foreign investment transformation

As part of the ongoing reform of China’s regulation of foreign investment, the National People’s Congress approved a new Foreign Investment Law

Article

Tiang & Partners | Asia-Pacific | 18 Feb 2019

Bribery and corruption in M&A - Do you really know what you're buying?

The 2018 Transparency International Corruption Perceptions Index a number of countries in Asia were found to be high risk for corruption, including

Article

Tiang & Partners | China | 31 Jul 2017

R&C Total Retail Survey seminar - 10 key trends characterising the recent development of China’s eCommerce market

Today, China’s Retail and Consumer (R&C) market is characterised by its mobile-first consumer behaviour, vibrant social commerce adoption, and a

Article

Tiang & Partners | China | 31 May 2017

China Cybersecurity Law - 6 key points to help minimise risks and localise policies and procedures

The new China Cybersecurity Law (CSL) is set to take effect on 1 June 2017, putting more emphasis on personal information security, cybercrime

Previous page 1 Next page