Tech, Data, Telecoms & Media updates


Contributed by AnJie Law Firm
Personal data protection under newly issued Civil Code
  • China
  • 14 August 2020

While the new Civil Code largely restates the existing Chinese laws on privacy and personal information protection, it applies these laws more broadly and makes it easier for individuals to take civil action in relation to breaches. As such, privacy and personal information protection laws are likely to be enforced more often and more broadly in China from 2021 onwards. Companies that process personal information in China should ensure that their existing privacy practices comply with the new Civil Code.

European Union

Contributed by Eversheds Sutherland (International) LLP
Cybersecurity in healthcare sector – Q&A on data breaches in relation to medical devices
  • European Union
  • 14 August 2020

The use of connected medical devices has changed the way in which the healthcare sector works. However, the various benefits based on the advance of connected healthcare come with an increased flow of personal data, whether in hospitals or between different market players in the healthcare industry, which has led to an increased risk of cybersecurity incidents and personal data breaches.


Contributed by Ichino Brugnatelli e Associati Studio Legale
Data Protection Authority updates FAQs regarding contact tracing
  • Italy
  • 14 August 2020

The Data Protection Authority recently updated its FAQs regarding personal data processing in the face of the COVID-19 emergency, providing some important clarifications on contact tracing and medical data processing based on mobile app technology more generally. This article examines the data protection implications of contact tracing apps at national and regional levels, in medical applications and private enterprise.


Contributed by Walder Wyss
Importance of IT security measures in banking relationships: clients may bear risk of being hacked
  • Switzerland
  • 14 August 2020

The Federal Supreme Court recently issued a ruling addressing the liability of a securities trading company when hackers break into and use a client's email account to send transfer orders. This case is a stark reminder of the importance for anyone using online accounts and online (email) communications to properly secure their IT systems against hackers and other malevolent third parties. In case of any suspicious activity, it is necessary to immediately assess the situation and react accordingly.