Serious Privacy Podcast: Trick or Treat? PIPL is Scary (with Graham Webster)

This week on serious privacy, Paul Breitbarth and K Royal Re-examine the Chinese Personal Data Protection Act which came into force only a few days after the publication of this chapter. K. and I have talked about this law already in Chapter 30 Of this season, from August 31st, and during our online seminar on September 15th. However, questions continue to flood, so we decided to record a sequel. The directive coming out of China is still limited, although it seems that China’s cyberspace administration, their main regulator, is starting to advertise Some explanatory documents.

In this episode join us Graham Webster. Graham is a research researcher at Stanford Cyber ​​Policy CenterAnd Editor-in-Chief of the University DigiChina website, A great resource that provides many translations of China’s digital laws and policy documents. He is an expert on the issues at the intersection of US-China relations and advanced technology, and we are very pleased that he is joining us.

The episode of the week can be heard on our website or streamed below.

Source

This week on serious privacy, Paul Breitbarth and K Royal Re-examine the Chinese Personal Data Protection Act which came into force only a few days after the publication of this chapter. K. and I have talked about this law already in Chapter 30 Of this season, from August 31st, and during our online seminar on September 15th. However, questions continue to flood, so we decided to record a sequel. The directive coming out of China is still limited, although it seems that China’s cyberspace administration, their main regulator, is starting to advertise Some explanatory documents.

In this episode join us Graham Webster. Graham is a research researcher at Stanford Cyber ​​Policy CenterAnd Editor-in-Chief of the University DigiChina website, A great resource that provides many translations of China’s digital laws and policy documents. He is an expert on the issues at the intersection of US-China relations and advanced technology, and we are very pleased that he is joining us.

The episode of the week can be heard on our website or streamed below.

Source

More from author

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Related posts

Advertismentspot_img

Latest posts

The MOVEit Zero-Day Vulnerability: How to Respond

The zero-day vulnerability in Progress Software's MOVEit Transfer product is being exploited by the Clop ransomware gang and other copycat cybercriminal groups to expedite...

Ivanti zero-day exploited to target Norwegian government (CVE-2023-35078)

A zero-day vulnerability (CVE-2023-35078) affecting Ivanti Endpoint Manager Mobile (EPMM) has been exploited to carry out...

Apple fixed new actively exploited CVE-2023-38606 zero-daySecurity Affairs

Apple released security updates to address an actively exploited zero-day flaw in iOS, iPadOS, macOS, tvOS, watchOS, and Safari. Apple released urgent security updates to...

Want to stay up to date with the latest news?

We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!