In recent months, a series of U.S. government reports have documented U.S. policymakers’ growing concerns over Chinese government policies and programs designed to advance China’s competitive edge in a range of technologies and industries. In turn, the findings of these reports are shaping U.S. economic and national security laws and policies, as illustrated by the recent Section 301 tariff actions, national security reviews of investment by Chinese firms under the Committee on Foreign Investment in the United States (CFIUS) process, and provisions of the recently-passed John McCain National Defense Authorization Act that restrict exports of “emerging and foundational technologies” and U.S. government use of certain Chinese-made telecommunications equipment. Against this background, a report released on October 26, 2018, is likely to further increase U.S. government scrutiny of China-manufactured devices with internet connectivity features – so-called “Internet of Things” or “IoT” devices.
The Sedona Conference Publishes Commentary on Information Governance, Second Edition
The Sedona Conference® has released a Public Comment Version of its Commentary on Information Governance, Second Edition. The latest edition of this Commentary sets out 11 principles of information governance that provide a strategic framework for senior management to make decisions with respect to all information within an enterprise and accounts for changes and advances in technology and law that have occurred over the past four years. It also incorporates guidance on information governance contained in The Sedona Principles, Third Edition, which we discussed in a previous blog post. As defined in this Commentary, information governance “means an organization’s coordinated, interdisciplinary approach to satisfying information compliance requirements and managing information risks while optimizing information value.” The Commentary recognizes that information governance encompasses a variety of disciplines, including traditional records and information management, data privacy, information security, and e-discovery.
Continue reading