Author: admin

  • These 5 Venus missions could launch in the next decade to study Earth’s ‘evil twin’

    These 5 Venus missions could launch in the next decade to study Earth’s ‘evil twin’

    Venus just lost its last active spacecraft, but more might be coming in a few years.

    The Japanese Aerospace Exploration Agency’s Akatsuki mission orbiting Venus was declared dead last week after engineers spent more than a year trying to get in…

    Continue Reading

  • A Legal and Compliance Framework for Mobile Device Policies – Publications

    A Legal and Compliance Framework for Mobile Device Policies – Publications


    Report




    November 04, 2025

    Asia’s digital environment—particularly China’s mobile-first business culture and evolving regulatory landscape—is necessitating global companies to rethink Bring Your Own Device (BYOD) programs. Traditional “one device fits all” models often fail in practice. The emerging standard involves a more sophisticated approach: role-based access, tightly governed through mobile device management and containerization and supplemented by clean device protocols for high-risk travel.

    Unlike many commentaries that focus solely on government access narratives, this Insight emphasizes the practical governance challenges facing multinational organizations in Asia. These challenges include maintaining auditability, effectively separating personal and corporate data, and ensuring defensible internal investigations in environments where platforms such as WeChat are essential to day-to-day business.

    We expect Asia’s mobile governance landscape to evolve significantly in the next 12–24 months, driven by regulator scrutiny, digital forensics expectations, and platform-driven business practices. The rise of AI-driven workplace tools and messaging-to-CRM integrations will further elevate mobile governance risks and expectations.

    ASIA’S MOBILE REALITIES: A UNIQUE OPERATIONAL LANDSCAPE

    Multinational companies operating in Asia must navigate a complex mobile environment defined by several key factors:

    • Platform Dependency: Social and messaging platforms, particularly WeChat in China, are deeply integrated into business workflows for external communications with clients, partners, and government bodies.
    • High Mobility: A highly mobile workforce, coupled with frequent cross-border travel, creates significant data residency and transfer challenges.
    • Strict Privacy Laws: Many jurisdictions have robust data privacy laws that grant employees significant rights and limit employer monitoring.
    • Consent Revocation: In key markets such as Japan and South Korea employees can revoke consent for device monitoring, creating significant hurdles for digital forensics and legal holds.

    WHY THIS MATTERS NOW

    Recent regulatory developments across Asia have increased scrutiny of mobile devices, creating a complex environment for multinational corporations. While corporate device ownership does not eliminate lawful access risk, the key question is whether the enterprise retains control and can enforce audit, investigation, and data protection rules. Regulators in China, Korea, financial hubs, and Southeast Asia increasingly request evidence of mobile governance maturity in investigations and cybersecurity reviews.

    The primary challenges for many companies are often operational, not just regulatory. The reliance on mobile platforms for business, coupled with stricter data security and privacy laws, creates a challenging landscape. Companies that fail to adapt risk data breaches, compliance failures, and operational disruptions. The key is to move beyond a purely defensive posture and implement a practical, risk-based approach that enables the business while protecting sensitive information.

    TOP 5 RISKS TO GLOBAL ENTERPRISES

    • Data Commingling on WeChat and Other Platforms: The use of personal apps like WeChat for business purposes blurs the lines between personal and corporate data, creating significant challenges for internal investigations, data preservation, and compliance. For regulated sectors, this also raises recordkeeping and archiving obligations that may be difficult to satisfy when business communications occur on personal messaging platforms.
    • Defensible Investigations and Evidence Integrity: If a device has been accessed by third parties or contains a mix of personal and corporate data, its evidentiary value in an internal investigation or litigation can be compromised. When corporate data sits in personal WeChat accounts, companies often cannot preserve evidence without capturing irrelevant private content. This can delay investigations, create privacy disputes, and undermine the enforceability of compliance programs. Furthermore, these challenges can complicate employee discipline and termination disputes when the key evidence resides on a personal device. Companies must be able to demonstrate chain of custody for mobile data in investigations and regulatory scrutiny.
    • Employee Privacy and Labor Law Violations: Many Asian jurisdictions have strict employee privacy laws that limit an employer’s ability to monitor or wipe personal devices, even when used for work. Failure to obtain proper consent can lead to legal challenges.
    • Cross-Border Data Transfer Violations: Mobile devices that cross borders can trigger complex data transfer rules under regulations such as China’s Personal Information Protection Law (PIPL) and Europe’s General Data Protection Regulation (GDPR). A device inspection in one country may be considered a data transfer, creating compliance obligations.
    • IP Theft and Corporate Espionage: Mobile devices are a primary target for intellectual property theft. A weak mobile device policy can expose a company’s most valuable trade secrets and other sensitive information.

    CHINA: BALANCING SECURITY CONCERNS WITH COMMERCIAL REALITIES

    China presents a unique challenge for mobile device policies due to a fundamental tension between security and operational necessity. While regulatory developments rightly prompt companies to reassess their risk exposure, this exists alongside an equally important operational reality.

    China’s business environment is deeply mobile-centric, with WeChat, QR codes, and mobile payments being essential to daily operations. Business communications with external parties—including clients, distributors, and even government agencies—often rely on local platforms like WeChat. For employees based in China, working without a mobile device is often simply not practical.

    This creates what one general counsel recently described to us as a “forced choice” between operational effectiveness and maximum data security. The real challenge is not how to avoid all mobile device use, but how to manage the commingling of personal and corporate data on platforms like WeChat while accounting for the possibility that devices may be subject to inspection. WeChat Work (Enterprise WeChat) improves separation but does not fully resolve evidentiary and retention concerns, especially for external communications.

    A successful China mobile device strategy must acknowledge both dimensions of this challenge and focus on practical solutions such as containerization, role-based access, and clear policies for the use of personal apps for business.

    ASIA COMPARATOR INSIGHTS: KEY CONSIDERATIONS

    Japan: Strong employee privacy protections. Employers have limited rights to monitor or wipe personal devices. Works council consultation may be required for new policies. Crucially, employees can revoke consent, which can severely hamper digital forensic investigations and legal hold preservation efforts.

    South Korea: Similar to Japan, with a strong emphasis on employee consent. Broad monitoring of personal devices is generally not permissible. As in Japan, the revocable nature of employee consent can complicate ongoing monitoring programs and create significant challenges for evidence collection in internal investigations.

    Taiwan: Employee privacy protections similar to other East Asian jurisdictions. Clear consent requirements for device monitoring and data access.

    Singapore: More employer-friendly than Japan or South Korea, but still requires a clear legal basis for processing employee data. The Personal Data Protection Act governs the collection, use, and disclosure of personal data.

    Vietnam: Evolving cybersecurity laws with a focus on data localization. Authorities have broad powers to request information.

    Thailand: The Cybersecurity Act allows for government access to digital data in certain situations.

    India: India remains generally BYOD-friendly, but emerging cybersecurity and data rules require DPIA-style reviews and cross-border transfer safeguards.

    KEY TECHNOLOGY DEFINITIONS

    • MDM (Mobile Device Management): Software that allows IT to remotely manage, monitor, and secure mobile devices across the organization.
    • MAM (Mobile Application Management): Controls specific to applications rather than the entire device, allowing management of corporate apps while leaving personal apps untouched.
    • Containerization: Creates a secure, encrypted “container” on a device that separates corporate data from personal data, allowing independent management and wiping of corporate data.

    Against this backdrop, companies should adopt a structured and defensible mobile governance model tailored to role sensitivity and jurisdictional risk.

    RECOMMENDED CONTROLS: A TIERED APPROACH

    Employee Tier

    Device Policy

    Key Controls

    Tier 1: High-Risk (senior executives, R&D, access to core IP)

    Company-Issued Device Only

    • No personal use

    • Limited app installations

    • Enhanced security monitoring

    • Clean device travel protocol

    Tier 2: Medium-Risk (sales, marketing, access to customer data)

    Company-Issued or Approved BYOD

    • Containerization for all corporate data

    • Strict data loss prevention rules

    • Regular security training

    Tier 3: Low-Risk (administrative, access to email/calendar only)

    BYOD with MDM/MAM

    • Basic security policies (e.g., passcode)

    • Ability to remotely wipe corporate data

    • Employee consent for monitoring

    (See examples and policy templates available upon request)

    TECHNICAL LIMITATIONS IN HIGH-RISK ENVIRONMENTS

    While MDM and containerization provide strong controls for managing corporate data and enforcing security policies, companies should understand their limitations in certain scenarios. When devices are subject to inspection by state actors with sophisticated capabilities, technical controls like containerization may not prevent access to encrypted corporate data. Additionally, in internal investigations involving potential data breaches or compliance violations, attribution can be challenging when multiple parties may have had access to a device.

    These limitations underscore why role-based device policies and clean device protocols for high-risk travel remain important complementary controls, particularly for executives and employees with access to highly sensitive information. The goal is not to achieve perfect security—which may not be possible—but to implement defensible, risk-appropriate controls that can be explained to regulators and stakeholders.

    A Note on Device Inspections in China: In July 2024, China’s Ministry of State Security implemented provisions that expand the administrative powers of state security officers to inspect electronic devices as part of national security enforcement activities. This development, along with similar trends in other Asian jurisdictions, represents a legitimate and significant concern that companies must factor into their mobile device policies. While lawful access powers apply to both personal and corporate devices, recent changes heighten the need for disciplined governance models.

    HOW WE CAN HELP

    Our team advises leading multinationals on China and Asia mobile governance, WeChat policies, and cross-border forensic readiness. We help clients move from high-level policy statements to defensible operational programs.

    We deliver:

    • Role-Tiered Device Policy Frameworks: Operational models that define device policies by employee tier (executives, commercial teams, administrative staff) with specific controls for each level
    • WeChat Governance Programs: Technical and policy frameworks for managing WeChat business use, including WeChat Work integration, archiving solutions, and external communication protocols
    • Clean Device Travel Protocols: Executive and R&D travel playbooks for high-risk jurisdictions, including device provisioning, data segregation, and re-entry procedures
    • Asia Forensic Readiness Assessments: Cross-border investigation protocols that balance PIPL, GDPR, and employment law requirements, with jurisdiction-specific consent frameworks
    • BYOD Readiness Assessments: Comprehensive evaluations of current mobile device policies against Asia regulatory requirements and operational realities
    • Cross-Border Data Transfer Strategies: China PIPL compliance roadmaps for mobile data flows, including security assessment filings and standard contract implementations
    • Employee Consent and Works Council Toolkits: Japan- and Korea-specific frameworks addressing revocable consent challenges and works council consultation requirements
    • MDM/MAM Policy Templates: Technical policy frameworks for MDM, containerization, and virtual desktop infrastructure deployments
    • Employee Training and Awareness Programs: Customized training modules for employees on mobile device security, WeChat governance, data protection obligations, and incident reporting procedures tailored to Asia operations
    • Mobile Device Incident Response Plans: Comprehensive response protocols for lost, stolen, or compromised devices, including notification procedures, forensic preservation, regulatory reporting, and business continuity measures

    Continue Reading

  • AI Studio Obsidian Launches With Imagine Entertainment Partnership

    AI Studio Obsidian Launches With Imagine Entertainment Partnership

    Obsidian, launching this week with Imagine Entertainment as a key partner, is an AI-powered studio start-up. But its founders say that’s not the full picture: Their venture, they say, is focused on using technology to empower creatives to…

    Continue Reading

  • Maternal and Neonatal Outcomes in Pregnant Women Vaccinated Against CO

    Maternal and Neonatal Outcomes in Pregnant Women Vaccinated Against CO

    Introduction

    Significant progress was made in combating COVID-19 by early 2022, marked by a decline in daily reported cases and a nearly 27.9% reduction in hospitalizations. These improvements are largely credited to the broad application of…

    Continue Reading

  • DIVEVOLK Drops SeaTouch 4 Max V2 with Pro-Level Upgrades!

    DIVEVOLK Drops SeaTouch 4 Max V2 with Pro-Level Upgrades!

    SHENZHEN, China, Nov. 04, 2025 (GLOBE NEWSWIRE) — DIVEVOLK, a leader in underwater imaging and diving technology, today announced the launch of the SeaTouch 4 Max Platinum V2, a significant upgrade to its flagship underwater smartphone…

    Continue Reading

  • Squire Patton Boggs Advises on Financing of Battery Energy Storage System in Sweden | 11 | 2025 | News

    Squire Patton Boggs Advises on Financing of Battery Energy Storage System in Sweden | 11 | 2025 | News

    Squire Patton Boggs has advised Ånge Storage Solution AB and its parent company Delta Ange Holding s.r.o., on a cross-border financing provided by PPF banka a.s. related to the construction and operation of the 70-MW/160-MWh battery energy storage system (BESS) in Sweden.

    The BESS project, located in Ånge municipality in Vasternorrland County, will be one of the largest energy storage sites in Scandinavia. The project will contribute to ensuring flexibility and grid stability to grid operators in Sweden.

    The project is a joint venture of a developer of utility-scale BESS Delta Capacity and WOOD & Company, a leading European investment bank and asset manager. It is part of WOOD & Company Renewables Subfund.

    The Squire Patton Boggs team advising on this transaction was led by Corporate partner Radek Janeček in Prague, and included of counsel Marek Hrubes and associate Aneta Vesela.

    “We are pleased to support our client on this important financing that will allow them to deliver essential energy storage capacity, one of the largest in the region,” said Radek Janecek. “Battery storage is critical for balancing renewable energy and ensuring grid stability.”

    Continue Reading

  • Busting myths about the HPV vaccine – Sanford Health News

    1. Busting myths about the HPV vaccine  Sanford Health News
    2. HPV vaccination: Expanding eligibility to decrease cancer recurrence  IDSA
    3. Cervical cancer could become ‘rare disease’ through long-term effectiveness of vaccine  STV News
    4. Do Vaccines Really…

    Continue Reading

  • Just a moment…

    Just a moment…

    Continue Reading

  • Chrome Expands Autofill to Passports, Licenses, and VINs – TechRepublic

    1. Chrome Expands Autofill to Passports, Licenses, and VINs  TechRepublic
    2. Chrome now helps you fill in passport, driver’s license, vehicle information and more.  blog.google
    3. Google Chrome can now fill in passport and driving license details and…

    Continue Reading

  • CME Group October Volume Hits New Record of 26.3 Million Contracts, Up 8% Year Over Year

    CME Group October Volume Hits New Record of 26.3 Million Contracts, Up 8% Year Over Year

    • Metals ADV increased 165% with records in Micro Gold, Micro Silver, 1-Ounce Gold futures and Gold options
    • Cryptocurrency ADV grew 226%, driven by Micro Ether futures
    • Record monthly ADV reached in soybean futures and options

    CHICAGO, Nov. 4, 2025 /PRNewswire/ — CME Group, the world’s leading derivatives marketplace, today reported its highest October average daily volume (ADV) on record at 26.3 million contracts, an increase of 8% year-over-year. The company’s previous October ADV record was set in 2023 with 25.2 million contracts. Market statistics are available in greater detail at https://cmegroupinc.gcs-web.com/monthly-volume.

    October 2025 ADV across asset classes includes:

    Additional October 2025 product highlights compared to October 2024:

    • Interest Rate ADV
      • 30 Day Fed Funds futures ADV increased 49% to 572,000 contracts
    • Equity Index ADV increased 28%
      • Micro E-mini Nasdaq 100 futures ADV increased 37% to 1.7 million contracts
      • Micro E-mini S&P 500 futures ADV increased 37% to 1.2 million contracts
    • Energy ADV increased 1%
      • Henry Hub Natural Gas options ADV increased 31% to 317,000 contracts
    • Agricultural ADV increased 5%
      • Record Soybean futures ADV of 400,000 contracts
      • Record Soybean options ADV of 138,000 contracts
    • Metals ADV increased 165%
      • Record Micro Gold futures ADV of 704,000 contracts
      • Record Gold options ADV of 156,000 contracts
      • Record Micro Silver futures ADV of 96,000 contracts
      • Record 1-Ounce Gold futures ADV of 80,000 contracts
    • Cryptocurrency ADV increased 226%
      • Micro Ether futures ADV increased 583% to 222,000 contracts
      • Micro Bitcoin futures ADV increased 60% to 80,000 contracts
      • Ether futures ADV increased 357% to 24,000 contracts
    • Micro Products ADV
      • Micro E-mini Equity Index futures and options ADV of 3.1 million contracts represented 41% of overall Equity Index ADV and Micro WTI Crude Oil futures accounted for 2.2% of overall Energy ADV
    • International ADV increased 13% to 8.2 million contracts, with EMEA ADV up 9% to 5.9 million contracts, APAC ADV up 29% to 2 million contracts and Latin America ADV up 22% to 164,000 contracts
    • BrokerTec U.S. Repo average daily notional value (ADNV) increased 24% to a record $392 billion
    • Customer average collateral balances to meet performance bond requirements for rolling 3-months ending September 2025 were $135 billion for cash collateral and $156.2 billion for non-cash collateral

    As the world’s leading derivatives marketplace, CME Group (www.cmegroup.com) enables clients to trade futures, options, cash and OTC markets, optimize portfolios, and analyze data – empowering market participants worldwide to efficiently manage risk and capture opportunities. CME Group exchanges offer the widest range of global benchmark products across all major asset classes based on interest ratesequity indexesforeign exchange, cryptocurrenciesenergyagricultural products and metals.  The company offers futures and options on futures trading through the CME Globex platform, fixed income trading via BrokerTec and foreign exchange trading on the EBS platform.  In addition, it operates one of the world’s leading central counterparty clearing providers, CME Clearing. 

    CME Group, the Globe logo, CME, Chicago Mercantile Exchange, Globex, and E-mini are trademarks of Chicago Mercantile Exchange Inc.  CBOT and Chicago Board of Trade are trademarks of Board of Trade of the City of Chicago, Inc.  NYMEX, New York Mercantile Exchange and ClearPort are trademarks of New York Mercantile Exchange, Inc.  COMEX is a trademark of Commodity Exchange, Inc. BrokerTec is a trademark of BrokerTec Americas LLC and EBS is a trademark of EBS Group LTD. The S&P 500 Index is a product of S&P Dow Jones Indices LLC (“S&P DJI”). “S&P®”, “S&P 500®”, “SPY®”, “SPX®”, US 500 and The 500 are trademarks of Standard & Poor’s Financial Services LLC; Dow Jones®, DJIA® and Dow Jones Industrial Average are service and/or trademarks of Dow Jones Trademark Holdings LLC. These trademarks have been licensed for use by Chicago Mercantile Exchange Inc. Futures contracts based on the S&P 500 Index are not sponsored, endorsed, marketed, or promoted by S&P DJI, and S&P DJI makes no representation regarding the advisability of investing in such products. All other trademarks are the property of their respective owners. 

    CME-G

    SOURCE CME Group

    Continue Reading