top of page
Address: 22/F, Bupa Centre, 141 Connaught Road West, Sai Ying Pun, Western District, Hong Kong | Tel: +852 2388 3899 | Enquiry: contact-us@rs-lawyers.com.hk

Articles
Anna Lau
Jun 4, 2021
2020 Review & 2021 Outlook Anti-Corruption Laws in Hong Kong
“Reject every form of corruption which diverts resources from the poor.” —Pope Francis INTRODUCTION With China being a signatory to the...
Anna Lau
May 28, 2021
2020 Review & 2021 Outlook of Personal Data & Privacy Laws in Hong Kong
“There is a saying that if you get something for free, you should know that you are the product. It was never more true than in the case...
Anna Lau
May 21, 2021
2020 Review & 2021 Outlook of the Crypto Markets Around the World
“When I first heard about Bitcoin, I thought it was impossible. How can you have a purely digital currency? Can’t I just copy your hard...
Stefan Schmierer
May 12, 2021
SPACs To Replace IPOs, Hong Kong Exploring Listing Regime
Also called a blank-check company, SPACs (Special Purpose Acquisition Companies) are shell firms that list on a stock exchange. They have...
Anna Lau
May 11, 2021
關於草擬網絡安全危機管理應變計劃的指引 -六大關鍵因素和六大關鍵步驟
引言 縱觀全球,網絡攻擊不斷激增,對機構來說,制定適用的網絡安全危機管理應變計劃(「應變計劃」),能帶來生死截然不同的結果。 應變計劃,機構的資訊技術團隊可倚靠的一套工具和指引,可幫助找出(觀察)網絡安全威脅,進行定位,及在消除(行動)網絡安全威脅後恢復正常。...
Anna Lau
May 11, 2021
網絡安全及法例的最新情況:5G給殭屍網絡攻擊提供機會 -在5G網絡中,機構可以怎樣防禦殭屍網絡攻擊並減低相關風險?
人類相互連接日漸緊密,每個人都有責任保護網絡空間。」- Newton Lee 「有研究估計,網絡罪行將每年給世界造成六萬億美元損失。損失之大,使創新和投資的誘因有減低的危險,而且比全球所有毒品交易的總和都要賺錢」- David Kennedy 引言...
Anna Lau
May 10, 2021
A Victim’s Guide to Recovering Money from Cybercrime in Hong Kong - How to File a Police Complaint
“Justice without force is powerless; force without justice is tyrannical.” - Blaise Pascal Introduction Most people upon the realization...
Anna Lau
May 10, 2021
A Guide to Drafting a Cybersecurity Crisis Management Response Plan - The 6 Key Elements and Steps
“The secret of crisis management is not good vs. bad, it’s preventing the bad from getting worse.” - Andy Gilman Introduction With the...
Anna Lau
May 10, 2021
Latest Cybersecurity & Law Update: 5G Enabled BotNet Attack - How Organizations Can Defend and Mitig
“As the world is increasingly interconnected, everyone shares the responsibility of securing cyberspace.” - Newton Lee “By some...
bottom of page