Services in China

Data Security

In today´s world, online communication is the backbone of any international enterprise. As the influence of online communication on society grows, so does internet regulation. Sino-German companies have to comply with China´s Cyber Security Law (CSL) and the EU General Data Protection Regulation (GDPR). Non-compliance with these regulations can lead to heavy fines. These regulations apply in a variety of circumstances: be it international e-commerce, sending out newsletters or transferring data between your company´s branches in both regions.

Ecovis Beijing is your expert in international company structures and cross-border financial transactions. For more than ten years, we enjoy the trust of Chinese and German embassies and chambers of commerce. Our legal team makes sure that your company is fully compliant with the relevant regulations in China and Germany. Many companies underestimate the human factor in implementing data security. Cyber criminals target your employees through phishing attacks and social engineering. If employees use company flash drives and laptops in private, they might introduce malware into your company network. Our IT team helps secure your communication systems and train your staff to safeguard your company´s data.

 

Legal Team

GDPR Legal Audit

  • Detailed Compliance Check
  • Legal Health Audit
  • Document/Declaration Drafting
  • Data-Flow Analysis
  • Personal Data Protection Guidance
  • Recommendation Reports

CSL Legal Audit

  • Detailed Compliance Check
  • Online Activities Audit
  • Data-Localization Check
  • Document Drafting Assistance
  • Data-Flow Analysis
  • Personal Data Protection Guidance
  • Recommendation Reports

 

IT team

Technology Consulting

  • IT-Security Health Check
  • Multi-Location Communication Audit
  • Network-Mapping/-Enhancing
  • Independent Technology Choice Advice
  • IT-Security Supervisory Services
  • Secure Data/ Communications
  • Recommendation Reports

Employee Empowerment

  • Social Engineering Protection
  • Employee Training Guidelines
  • Create Data-Security Awareness
  • IT-Staff Training Advisory