The effectiveness of electronic signatures and relevant risk prevention methods

The newly revised “Counterespionage Law” will come into effect on July 1, 2023. It has expanded the definition of espionage, adding espionage acts of "joining espionage organizations and their agents", and "network attacks, intrusion, interference, control, destruction and other activities against state organs, secret related units or key Information infrastructure". At the same time, the scope of protected objects has…

Read More

Caution, the “Counterespionage Law” has been revised!

The newly revised “Counterespionage Law” will come into effect on July 1, 2023. It has expanded the definition of espionage, adding espionage acts of "joining espionage organizations and their agents", and "network attacks, intrusion, interference, control, destruction and other activities against state organs, secret related units or key Information infrastructure". At the same time, the scope of protected objects has…

Read More

Whether an agreed non-assignable debt could be assigned?

An effective transfer of debt usually requires four factors: 1) there is a valid debt; 2) the debt has assignability; 3) there is an effective debt assignment agreement; and 4) the debtor is notified. Otherwise, the assignment of debt shall not have any effect on the debtor. Therefore, as long as the debt has assignability, and it is not prohibited…

Read More

Blind Spots related to the special working hour systems

There are 3 categories of working hour system, which are the standard working hours, the flexible working hours arrangement, and the comprehensive calculation regarding working hours, among which, the latter two could be implemented upon the approval of the labor administrative department, and they are generally referred to as the special working hour systems. The “Notice on Issuing the Measures…

Read More

Should a one-person company and its shareholder be joint defendants?

Company A sued Company B for a dispute over the sales contract and applied to add Company B's shareholder, Company C, as a joint defendant. Company C defended that Company A had abused its right of prosecution, because the dispute between Company A and Company B had no business with Company C. Article 63 of the “Company Law” stipulates that,…

Read More

How to design a better layoff plan?

In January 2023, ByteDance downsized the company for 10%. In March 2023, Google China initiated a layoff plan. ... In 2023, various news of "layoffs" hit the hot search from time to time. From the perspective of enterprises, a layoff plan mainly focuses on two aspects, which are the purpose and objectives of "layoffs", and the legal risks caused by…

Read More

How to determine the limitation of action for infringement?

Regarding different objects of infringement, the infringement behaviors could be divided into various categories, such as the behaviors which have infringed the right holder’s property rights (such as unauthorized possession of another person's real estate), trademark rights, or the right to life and health of individuals, and so on. Regarding the status of infringement, the infringement behaviors could be divided into…

Read More

Risks related to the use of employees’ vehicles for business

To use employees’ vehicles for business has gradually become a common phenomenon. There are various reasons, such as a company brings the proposal due to cost saving, or an employee brings the proposal for his own convenience regarding commute and cost. However, there are risks related to such arrangement. This article aims to analyze the main risks and countermeasures related to…

Read More

Does well-known trademark have a significant value?

Before the revision of the “Trademark Law” in 2013, the well-known trademark was regarded as an honorary title, which became many enterprises’ selling point in marketing. However, the function as a selling point is not the original intention of establishing the well-known trademark system in the “Trademark Law”. Therefore, in 2013, the revision of the “Trademark Law” stipulates that well-known…

Read More

How to deal with the unauthorized deletion of data by an ex-employee?

In practice, some employees may delete personal information stored in computers, mobile phones and other devices provided by their employers when leaving their posts. Such deletions are understandable, because they are aimed to protect their personal information. However, some employees may delete the data or work email stored in the server, public disk, etc. without authorization due to anger or other…

Read More