• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
location iconSuite 503, 5/F, St. George's Building, 2 Ice House Street, Central, Hong Kongphone-icon +852 2868 0696 linkedintwitterfacebook
OLN IP Services
OLN Online
  • ENG
    • 简
    • 繁
    • FR
    • 日本語
Oldham, Li & Nie
OLN IP Services
close-btn
OLN IP Services
Get bespoke and commercially-driven advice to your Intellectual Property
Learn More
OLN IP Services
OLN Online
close-btn
OLN Online
Powered by Oldham, Li & Nie, the law firm of choice for Hong Kong’s vibrant startup and SME community, OLN Online is a forward-looking and seamless addition to traditional legal services – a true disruptor.
Learn More
OLN IP Services
  • About
        • Awards & Rankings
        • Corporate Social Responsibility
  • Practice Areas
        • Canadian Notarization Services
        • Commercial Fraud & Asset Tracing
        • Elder Law Practice Group
        • Financial Service & Regulatory
        • Insolvency & Restructuring Law
        • Japanese Practice
        • Private Client – Estate Planning & Probate
        • Tax Advisory
        • China Practice
        • Corporate & Commercial Law
        • Employment & Business Immigration Law
        • French Practice
        • Insurance Law
        • Notarial Services
        • Regulatory Compliance, Investigations and Enforcement
        • Chinese Notary Services (CAAO)
        • Dispute Resolution
        • Family Law
        • Fund Practice
        • Intellectual Property Law
        • Personal Injury Law
        • Startups & Venture Capital
        • Canadian Notarization Services
        • China Practice
        • Chinese Notary Services (CAAO)
        • Commercial Fraud and Asset Tracing
        • Corporate and Commercial Law
        • Dispute Resolution
        • Elder Law Practice Group
        • Employment and Business Immigration Law
        • Family Law
        • Financial Service and Regulatory
        • French Practice
        • Fund Practice
        • Insolvency & Restructuring Law
        • Insurance Law
        • Intellectual Property Law
        • Japanese Practice
        • Notarial Services
        • Personal Injury Law
        • Private Client – Estate Planning and Probate
        • Regulatory Compliance, Investigations and Enforcement
        • Startups & Venture Capital
        • Tax Advisory
  • People
  • Insights
  • Offices

Suite 503, St. George's Building,
2 Ice House Street, Central, Hong Kong

Tel. +852 2868 0696 | Send Email
linkedin twitter facebook
OLN Blue

OLN

  • About
    • Awards and Rankings
    • Corporate Social Responsibility
  • Awards and Rankings
  • Block Content Examples
  • Careers
  • Client Information & Registration
  • Contact Us
  • Cookie Policy (EU)
  • Globalaw
  • Offices
  • Oldham, Li & Nie
  • OLN and the Community
  • OLN Podcasts
  • People
  • Practice Areas
  • Privacy Policy
  • Review
  • Reviews
  • Standard Terms of Engagement
  • Test Blog
  • The Firm
  • What Others Say
  • About
        • Awards & Rankings
        • Corporate Social Responsibility
  • Practice Areas
        • Canadian Notarization Services
        • Commercial Fraud & Asset Tracing
        • Elder Law Practice Group
        • Financial Service & Regulatory
        • Insolvency & Restructuring Law
        • Japanese Practice
        • Private Client – Estate Planning & Probate
        • Tax Advisory
        • China Practice
        • Corporate & Commercial Law
        • Employment & Business Immigration Law
        • French Practice
        • Insurance Law
        • Notarial Services
        • Regulatory Compliance, Investigations and Enforcement
        • Chinese Notary Services (CAAO)
        • Dispute Resolution
        • Family Law
        • Fund Practice
        • Intellectual Property Law
        • Personal Injury Law
        • Startups & Venture Capital
        • Canadian Notarization Services
        • China Practice
        • Chinese Notary Services (CAAO)
        • Commercial Fraud and Asset Tracing
        • Corporate and Commercial Law
        • Dispute Resolution
        • Elder Law Practice Group
        • Employment and Business Immigration Law
        • Family Law
        • Financial Service and Regulatory
        • French Practice
        • Fund Practice
        • Insolvency & Restructuring Law
        • Insurance Law
        • Intellectual Property Law
        • Japanese Practice
        • Notarial Services
        • Personal Injury Law
        • Private Client – Estate Planning and Probate
        • Regulatory Compliance, Investigations and Enforcement
        • Startups & Venture Capital
        • Tax Advisory
  • People
  • Insights
  • Offices

How to Tackle Email Scams

OLN Marketing

How to Tackle Email Scams

July 16, 2019 by OLN Marketing

You cannot trust anyone — “One may smile, and smile, and be a villain.”

While not everyone has heard of this quote from William Shakespeare’s famous play Hamlet, you will have to agree that it fittingly describes the Hamlet-esque story that you find in your email inbox out of the blue: his father having passed away, a Nigerian prince’s throne was usurped by his uncle and he now needs your help to transfer his funds out of Nigeria, in return you would keep a portion of the funds. All you have to do is to give him your personal details (so the Prince knows who you are), your bank account number (for you to temporarily “safekeep” his funds), and of course, to pay a fee in advance.

Yes, this is apparently a scamming technique that has been widely deployed since the 1980s, and while every year there are still people who succumb to the temptation of windfall, more and more people are aware of the reality.

Fraudsters are therefore making use of a different modus operandi in recent years, one that is more specific instead of the “spray and pray” Nigerian prince model. Also carried out by way of email scam, fraudsters would first hack email accounts or compromise computers to obtain vital information, then tailor-make the fraud scheme to deceive the email recipients into paying them.

How do email scams operate?

In many cases that we came across, the victims are mostly trading companies with business counterparts all across the globe. The diagram below illustrates how the scheme operates.

  1. There had been genuine sale of goods by the Supplier to the Victim.
  2. The Supplier then sent payment invoice (sometimes together with the bill of lading, the purchase order etc.) to the Victim via email. 
  3. The Fraudster, having hacked the Supplier’s email account, pretended to be the Supplier and send a forged payment invoice, bill of lading and purchase order by changing the bank account details and the document letterheads via email. The forged email would normally come from a fraudulent account which is strikingly similar to the Supplier’s genuine email account (e.g. changing from sales@abcengineering.com to sales@abcengineeering.com), misleading the Victim to believe that the email was from the Supplier itself. The façade is further reinforced by the Fraudster justifying the different payment details with excuses such as change in accounting policies. The Victim is of course reasonable and courteous enough not to venture too far and challenge the legitimacy of such policy.
  4. The Victim, failing to notice the subtle difference in the forged email, remitted money to the Fraudster’s bank account.
  5. The Victim would eventually realize the scam perpetrated by the Fraudster upon the Supplier’s reminder chasing for payment or its notice that money was never received. The scam might be discovered slightly earlier if the Victim sends a remittance advice to the Supplier, and then the Supplier informs the Victim that the recipient bank account is apparently not the Supplier’s bank account.
  6. By that time, it is likely that the Fraudster has dissipated the funds from its bank account, most probably to other jurisdictions.

What to do next?

  1. A complaint should be filed to the Hong Kong Police or the Joint Financial Intelligence Unit (JFIU) such that they might take action to freeze the Fraudster’s bank account in Hong Kong.
  2. At the same time, the victim should file a parallel report to the relevant authority in its jurisdiction. Certain jurisdictions have online reporting systems dedicated to cybercrimes, such as the Internet Crime Complaint Center (IC3) under the U.S.A. Federal Bureau of Investigation and the U.K. “Action Fraud” National Fraud & Cyber Crime Reporting Centre.
  3. A letter should also be issued to banks (including the sending and recipient banks), alerting them of the scam and demanding return of the defrauded fund and/or preservation of the fund in the relevant bank accounts.

The victim’s effort to recover the money is always a race against time. It is therefore always advisable to act as soon as possible, and ideally within 24 hours from the fund transfer, as thereafter the fraudster is very likely to have already dissipated the funds. If law enforcement authorities or banks have not decided to freeze the relevant accounts, the victim should seek assistance from lawyers to apply for a Mareva Injunction (i.e. asset-freezing order) on the civil route to prevent dissipation. 

If the money is successfully retained in the bank account pursuant to the injunction, civil proceedings should be commenced against the bank account holder to recover the money in equity. The fraudster is very unlikely to contest the proceedings (by this time he probably has absconded) so the victim can apply for a monetary default judgment against the fraudster unhindered. To actually recover the money, the victim then needs to apply for a garnishee order, which once granted will compel the bank to directly transfer the money from the fraudster’s bank account to the victim.

Recent case law suggests that other than the conventional way of obtaining a monetary default judgment, the victim might also seek a declaration in default to assert a proprietary claim over the funds in the fraudster’s bank account which, if succeeds, would lead to a vesting order. The bank will then be compelled to immediately transfer the money back to the victim without the need to wait for the garnishee order. 

If the money has already been dissipated by the time the injunction is obtained, the victim will have to take extra steps to “trace” the money. A discovery order for banker’s record needs to be obtained first, so that the victim can ascertain the flow of the money and track down where it was transferred to. Most of the time it would be a cross-jurisdiction transfer, which adds another obstacle to the victim’s recovery. The victim will have to engage lawyers in that jurisdiction to commence new proceedings against the new, foreign recipient of the money, and also conduct further discovery and tracing to ascertain the latest whereabouts of the money. As one may see, if the money cannot be frozen in time, the matter will be very complicated with time and costs spiraling out of control, and at the end of the day, the fraudster may still be one step ahead of the victim so that the victim cannot recover the stolen money. This is exactly why the victim is advised above to act as soon as possible.

Prevention is better than cure

It is always better to take preventative measures rather than looking out for remedies. You may check out some practical preemptive measures from the Police’s article “Tips for Smart Netizens” which is available at http://www.police.gov.hk/ppp_en/04_crime_matters/tcd/tips.html

What OLN can do for you

OLN has acted for the victims in many email scam incidents, and electronic fraud cases generally. On most occasions, OLN has successfully obtained the Mareva Injunction and recovered a substantial portion of the defrauded money (if not entirely). With extensive experience in civil litigation, we will be able to assist you in a swift and efficient manner. 

Another fitting quote by William Shakespeare in Henry VI would be appropriate to conclude this article:

“Wise men ne’er sit and wail their loss, but cheerily seek how to redress their harms.” 

This article is for information purposes only. Its contents do not constitute legal advice and readers should not regard this article as a substitute for detailed advice in individual instances.

Filed Under: Dispute Resolution

Quick way to get what you want before starting the legal fight with fellow partners and shareholders – Injunctions

July 5, 2019 by OLN Marketing

Shareholders disputes can take years to conclude whether via arbitration or the court system in HK but interim injunctions can offer quick relief even before the issuance of legal proceedings.

Injunctions can be used to maintain a board’s composition and prevent “illegal” resolutions from being passed:

  • To remain in management of the company: When 2 camps of shareholders are in a disagreement over the management of the company, often, directors are removed from the board without the appropriate number of votes or proper notice, in violation of the articles of association/shareholders agreement. One way of maintaining the status quo before the alleged breach took place is to obtain a pre-action injunction requiring the company to reconstitute the board such that those wrongfully removed are re-appointed. The victim can subsequently issue the proper proceedings to support the injunction, e.g. fraud, unfair prejudice, breach of contract. In the right circumstances, with the interim injunction in place, parties will gain leverage in subsequent settlement negotiations.
  • To prevent board/shareholders meetings from abuse: When directors do not observe terms imposed by contract or statute in holding board/shareholders meetings, an injunction can be obtained to restrain the convening of the meeting in question and the passing of specific resolutions.

Injunctions are also important tools in protecting the very assets that form the subject matter of the dispute. Often, interim injunctions effectively dispose of the dispute. 

  • To identify the wrongdoer and important evidence against the wrongdoer from an innocent third party (Norwich Pharmacal): Quite often, assistance from the Court is required to compel an innocent third party, e.g. a bank in internet fraud cases, to disclose information or documents relating to the wrongdoer and the wrongdoing.
  • To secure source of payment pending suit (Mareva): Restraining a defendant or would-be defendant from dissipating assets is a very important legal remedy in a variety of cases especially where the ownership rights of the assets in question are contested and their dissipation would effectively foreclose any chances of recovery/ enforcement, e.g. shares, cash in winding up cases.

One of the tricks lies in making the correct decision in conducting the application on an ex parte basis (i.e. where the other party is not aware of the application and is not present to argue their case) or on an inter partes basis (i.e. full notice to the other side is given).  Your legal advisor needs to strike a balance between several factors: maintaining secrecy, going for speed and running the risk of having the injunction discharged due to failure to provide full and frank disclosure.

Recent case development on anti-suit injunctions: In cross-border contractual disputes, a Hong Kong arbitration clause can form the basis of an injunction to restrain a plaintiff from continuing legal proceedings in a foreign jurisdiction (see Dickson Valora Group (Holdings) Co Ltd and another v Fan Ji Qian [2019] HKCFI 482).

If you wish to learn more about injunctions within the context of shareholders disputes or other types of litigation, please feel free to speak to our litigation partner, Eunice Chiu or stay tuned for our in-house CPD.

Eunice Chiu
+852 9169 4356 / 2186 1885
Partner, Dispute Resolution
Oldham, Li & Nie

Filed Under: Dispute Resolution

Is Internet Doxing (起底) lawful?

July 5, 2019 by OLN Marketing

Introduction

With the advent of computer technology and abundance of information on the internet readily accessible by the public at virtually no cost, it is increasingly straightforward and cost-effective for individuals and organizations to seek information about one another for various purposes, for example for due diligence by business entities on their acquisition targets in the commercial world. On the other hand, it is also increasingly common to see internet doxing (起底) activities intended for “public trial by the netizens” (網絡公審) happen on online social media platforms. (For the purposes of this article, internet doxing means searching for and publishing private or identifying information about a particular individual on the Internet).

Recently, the Privacy Commissioner for Personal Data Stephen Wong Kai-yi has revealed in a radio interview that his office received a staggering number of over 200 complaints about Police officers being the subject of internet doxing. The Commissioner criticized that certain pictures and social media posts initially shared on the internet by some police officers for purely recreational reasons have been maliciously extracted and reposted on internet forums and other social media platforms with the ulterior motive of identifying those police officers who the perpetrator regards, rightly or wrongly, as “rogue” or “dirty” cops so that they could be castigated and ridiculed by other netizens. In particular, the Commissioner seemed to be of the view that such internet doxing could potentially be illegal because of the following reasons:- (1) even though the data was retrieved from the public domain, the data was there for a restricted purpose; (2) reposting was not authorised by the author; and (3) the extraction and application of the data might have been for an ulterior motive such as criminal threat or defamation.

Insofar as these internet incidences are concerned, this article aims to examine the surrounding legal issues arising from the specific question — have we unintentionally breached the law by conducting internet doxing?

Is mere investigation of personal data lawful?

Mere investigation, i.e. searching for and collating information without publishing it on the internet is lawful so long as it is obtained legally from the internet for domestic purpose, i.e. the information collected is kept by the user itself and not subsequently shared on the internet. This domestic purpose is specifically allowed by section 52 of the Personal Data (Privacy) Ordinance (Cap. 486) (“PDPO”). It is commonplace for individuals and organizations including law firms to undertake investigative and due diligence process. For example in a commercial deal, a prudent party would usually conduct internet due diligence on their counterparties. Many individuals also collect information on the internet for example about a celebrity for recreational purpose. Such activities themselves for own reading or information shall be lawful provided always that such information is obtained in a lawful manner.

Is collating, consolidating and reporting of personal data found from public domain lawful?

What if you make a further step from mere retrieval and investigation to collate, consolidate and reporting? While the issue has never been tried at Court, there has been an investigation report published by the Office of the Privacy Commissioner for Personal Data in 2013 concerning a mobile app provider “Do No Evil” (起你底).  Do No Evil (起你底) compiled a database of various personal information of individuals collected from the public records of various government institutions where the users of the app (mainly employers) could access such information as litigation and bankruptcy records of the targeted individuals before considering hiring them. The Commissioner was of the view that the app had breached PDPO because:  (i) it was not in line with Data Protection Principle (“DPP”) 3 of the PDPO as personal data is used outside the original purpose of being available in public authorities [to be further discussed below]; (ii) data subjects had reasonable expectation of privacy. It is perhaps not surprising to note that such views were subject to legal criticism.  First, “reasonable expectation of privacy” has no place in PDPO. Even if “reasonable expectation of privacy” exists, individuals waive such expectation or cease to have such expectation when their data have lawfully and officially been published in public domain. Second, nowhere was the “original purpose” stated in those public authorities. It appears artificial to imply certain restriction over the scope of purpose. In any event, in this particular case, the mobile app provider was only required by the Commissioner to cease disclosing data. The case was not brought to the Court system for adjudication and the legal issue therefore remains unsettled.

Is reposting of personal data found from public domain lawful?

PDPO imposes onerous obligations over data users in handling personal data received from the internet. DPP3 specifies that personal data should not be used for a new purpose without the prescribed consent of the data subject. “New purpose” under this principle refers to any purpose other than the one which was originally intended for when it was provided or collected or a directly related purpose. “Prescribed consent” means the express and voluntary consent given by the data subject in writing which has not been withdrawn. The Guidance on Use of Personal Data Obtained from the Public Domain published by the Office of the Privacy Commissioner for Personal Data makes it clear that “the fact that a data subject’s personal data can be obtained from the public domain shall not be taken to mean that the data subject has given blanket consent for use of his/her personal data for whatever purposes.” This view has also now been judicially affirmed in the court case of Re Hui Kee Chun CACV 4/2012. This evinces the PDPO’s strict objective to ensure personal data is kept adequately protected from misuse and abuse. For example, if a data user extracts different pieces of personal information of the data subject (from the same source or different sources) on the internet and publishes such information in a combined form on a social media platform, such as Facebook, this may breach DPP3 as each piece of information may have been initially provided for one or more specific purposes and their combination could potentially constitute a “new purpose” forbidden by DPP3.

Furthermore, in such a case, even if the data user does not himself makes adverse comments about the individual, if there is realistic risks of harm, including identity theft, financial loss, harassment, injury to feelings of the individual (such as allowing other forum users to hurl harassing comments on the individual), the data user may also breach section 64 of the PDPO, which prohibits usage of personal data with the intent to (a) obtain gain for himself/herself or another person or (b) cause loss to the data subject or (c) if the disclosure causes psychological harm to the data subject. An offence under this section is punishable by a fine of $1,000,000 and to imprisonment for 5 years. It should be noted that this section was rarely invoked in the past.  The actual application of this section could be problematic. First, it requires investigation on the state of mind of the data user because an “intent” is required. Second, psychological harm to the victim is largely subjective. The government emphasized, prior to the promulgation of PDPO, that the court will rely on expert evidence to prove whether disclosure of information has caused psychological harm to the victim.

It may also be worth noting that there are statutory exemptions to the above position under Part VIII of the PDPO. In brief, it would be lawful if the “new purposes” are:-

  1. prevention or detection of crime (section 58);
  2. prevention of serious physical or mental harm of any person (section 59);
  3. it is required by law to do so or it is for exercising or defending a person’s legal rights in Hong Kong (section 60B);
  4. it is published by a news activity business (section 61);
  5. it is for research and statistics where the identity of the data subject is kept anonymous (section 62); and
  6. emergency situation which calls identification of an individual who is reasonably suspected to be or is involved in a life-threatening situation (section 63 C).

OLN provides a range of legislative compliance legal services. If you have any questions on the above, please contact one of the members of our Team.

Disclaimer: This article is for reference only. Nothing herein shall be construed as legal advice to any person. Oldham, Li & Nie shall not be held liable for any loss and / or damage incurred by any person acting as a result of the materials contained in this article.

Filed Under: Dispute Resolution

Amendments to the PRC Trademark Law to Combat Bad-faith Trademark Filings and Counterfeiters

June 27, 2019 by OLN Marketing

“Several Provisions for Regulating Trademark Application and Registration (“Draft for Comments”)” on 12 February 2019

The National Intellectual Property Administration, PRC (“CNIPA”) recently published “Several Provisions for Regulating Application for Registration of Trademarks (Draft for Comments)” (referred as “Draft” ) on 12 February 2019, aiming to strengthen regulation of trademark applications and registrations, and regulate bad faith trademark application and registration that seriously disorder to the market economy and trademark administration.

According to the Draft Provision listed out in Annex 1 an exhausted list of situations which are regarded as “abnormal application” for trademark registrations:

  1. Applying for registration of a trademark which is a imitation of others’ trademarks that the relevant public are familiar with, in order to ride on other’s business reputations;
  2. Pre-emptively registering a trademark which is already used by others and has a certain influence in order to abstract other’s business reputation via improper means;
  3. Pre-emptively applying for registration of a trademark that is identical with or similar to the marks/logos/names over which others have prior rights, and such existence of prior rights are known or should be known to the applicant;
  4. Applying for registration of trademarks repeatedly with obvious improper purpose;
  5. Applying for a large number of trademark registrations within a short period of time which obviously exceeds a reasonable limit;
  6. Applying for trademark registrations without intentional actual use, where there is no actual need to obtain trademarks exclusive right for goods and services;
  7. Applying for trademark registrations which violating the principle of good faith, infringing the legitimate rights and interests of others or disordering the market; and
  8. Assisting other individuals or trademark agents to perform application for trademark registrations items 1 to 7 above-mentioned.

Activity which falls within the meaning of abnormal application above mentioned shall be regulated according to the Trademark law.

Amendments to the PRC Trademark Law – passed on 23 April 2019 and will come effect on 1 November 2019

On 23 April 2019, the Standing Committee of the National People’s Congress (“NPC”) approved several amendments of the PRC Trademark Law (“2019 Trademark Law”) mainly strengthening and regulating bad faith trademark filings (the above said Draft has indeed been primarily embodied into this amendments), which is the fourth amendment of the PRC Trademark Law after the first in 1993, the second in 2001 and the third in 2013.

The swift release of 2019 Trademark Law was unexpected after a short time of the publication of the Draft. This is very likely to facilitate the trade negotiations on one of the topics relating to the protection of Intellectual property between China and the United States.

The amendments are primarily in relation to three aspects and change of six Articles:

  • Crackdown on bad faith trademark filings/filers;
  • Penalties for acts of malicious trademark registration and litigation; and
  • Rises of the statutory compensation/damages for trademark infringement.

Articles of the PRC Trademark Law amended:

Article 4: this clause “an application for trademark registration filed in bad faith without any intention to use the trademark shall be rejected.” was newly added to Article 4.

Article 19: “trademark agents shall not represent the applicant to file application for trademark registration if the trademark agents know or should know that the trademark violates Article 4.”

Article 33: “any party considers an application for trademark registration violates Articles 4 and 19.4 may oppose it within the publication period.”

Article 44: “a trademark registration that violates Articles 4 and 19.4 can be invalidated either by the TMO’s own initiative or an application for invalidation filed by any entity or individual.”

Article 63.1: “if malicious trademark infringement is serious, punitive damages is up to 5 times of the actual damages.” It is 3 times under the current Trademark Law.

Article 63.3: “if it is difficult to affirm actual lost, benefits from the infringement, and license fee, the statutory damages is up to RM¥5 million (around US$750,000)”. It is up to RM¥3 million (around US$430,000) under the current PRC Trademark Law.

Article 63.4: this clause “upon request of trademark rights owner, the Courts shall order destruction of the products bearing counterfeit trademarks, materials and tools mainly used to manufacture the counterfeit products without any compensations; or under special circumstances, the said materials and tools are prohibited to entry into business channels without any compensations” was newly added as Article 63.4.

Remark

The amendments are of concern to practitioners and true brand owners, who would benefit from these amendments. Under the amendments, applications for trademark registration filed in bad faith without any intention to use the trademark shall be rejected for registration, which shows that CNIPA takes serious actions to prevent pirated trademarks from being registered at the beginning. Besides, the increase of statutory compensation for trademark infringement may act a deterrent to trademark squatters.

In earlier 2018, CNIPA did refuse many applications that were considered as copies/imitations of others’ prior reputable trademarks. For instance, one Chinese company named “Weihai Disu Trading Ltd filed more than 300 applications for marks that fully contains others’ prior reputable trademarks. For more information about please see http://sbj.saic.gov.cn/gzdt/201801/t20180112_271756.html.

The amendments aim to help rights holders take action against bad faith trademark filers and counterfeiters. Nevertheless, this mainly depends on how the authorities implement the amendments in real cases. We are expecting more specific guidance from the implementation of the Amended Trademark Law, which is in general to be released before the effective date of 1 November 2019.

For more reference to the trend of Chinese government, please see http://english.cnipa.gov.cn/news/officialinformation/1138487.htm, after the pass of the 2019 PRC Trademark Law, Shen Changyu, head of CNIPA, said “China will continue to refine its intellectual property laws and improve its punitive damages system” on 25 April 2019.

Filed Under: Intellectual Property

Legal Update: Disclosure Obligations for Non-Hong Kong Companies effective from 1 August 2019

June 26, 2019 by OLN Marketing

Non-Hong Kong companies as defined under the Companies Ordinance (Cap. 622), in brief, those having a place of business in Hong Kong, should be aware of the new set of disclosure rules under the Non-Hong Kong Companies (Disclosure of Company Name, Place of Incorporation and Members’ Limited Liability) Regulation (Cap. 622M) (the “Regulation”), which will come into operation on 1 August 2019.

Important Changes under the Regulation

Important changes introduced by the Regulation include, inter alia,

  • sections 3(1) and (2): A non-Hong Kong company must clearly display its name and its place of incorporation at every business venue of the company in Hong Kong and they must be positioned on the premises in a way easily seen by a visitor.
  • Sections 4: A non-Hong Kong company must clearly state in legible characters its name and place of incorporation in every communication document and transaction document of the company in Hong Kong.
  • Section 5: if the liability of the members of a non-Hong Kong company is limited, the company must (a) exhibit a notice to that effect at every business venue of the company and (b) state this fact in legible characters in every communication document and transaction document in Hong Kong.
  • Section 6(2): if the non-Hong Kong company is in liquidation, it must in every of its advertisement (a) state in legible characters its name and place of incorporation and (b) where applicable, state in legible characters that the liability of its members is limited.
  • Sections 6(3) and (4): A non-Hong Kong company in liquidation, when displaying or stating its name, must  (a) if its name is in a language other than Chinese, add “(in liquidation)” after the name; (b) if its name is in Chinese, add “(正進行清盤)” after the name; or (c) if its name is in Chinese and in a language other than Chinese, add “(正進行清盤)” after the name in Chinese; and add “(in liquidation)” after the name in that other language.

Pursuant to section 8 of the Regulation, when there is a breach of any of the above requirements, the company, every responsible person of the company, and every agent of the company who authorizes or permits the contravention, commit an offence and each breach is liable to a fine at level 3.

In light of the above, it is advisable that non-Hong Kong companies in Hong Kong should begin preparing and taking necessary steps to comply with the new disclosure rules.

OLN provides a full range of company law services.  If you have any questions on the above or on any company law issues, please contact one of the members of the Company Law team or the Corporate and Commercial Law team.

Filed Under: Corporate and Commercial Law

Will US continue to treat Hong Kong as a separate territory from China from the trade and economic perspectives?

June 14, 2019 by OLN Marketing

Introduction

Very recently, US Senator Ted Cruz has introduced a bill to amend the US-Hong Kong Policy Act 1992 (the “Amendment Bill”), posing threats to trade and finance ties between Hong Kong and the US.

The purpose of this article is to explore, from a legal point of view, the US-Hong Kong Policy Act 1992 (the “Policy Act”), the Amendment Bill, as well as the potential impact to Hong Kong if any of the Amendment Bill is passed.

Background of the Policy Act

Handover of Hong Kong from Great Britain to China in 1997

Following the Sino-British Joint Declaration of 1984 (“Joint Declaration”), the US government passed the Policy Act where it is stated that in recognition of the Joint Declaration and the freedoms and rights guaranteed therein, the US shall seek to form bilateral ties and enter into agreements with Hong Kong in inter alia economic, trade and financial areas.

The legal significance of the Policy Act are as follows:-

  • declaring the official position of US vis-a-vis the status of Hong Kong pre and post 1997;
  • imposing a duty on the US Secretary of State to report to the two US congressional bodies on the conditions of Hong Kong in certain years; and
  • endorsing the Joint Declaration and seeking assurances that the Joint Declaration would be implemented both in spirit and letter.

The Policy Act

Key provisions

The Policy Act is divided in four main parts: (1) the Findings and Declarations, (2) Policy, (3) the Status of Hong Kong in US Law and (4) Reporting Provisions.

(1) In Findings and Declarations, the Act declared inter alia the continuation in force of existing agreements with Hong Kong, ICCPR and ICESC as of date of handover, the support for the Joint Declaration, and the constitution of the Hong Kong Legislature by elections.

(2) In Policy, the US guarantees the continual ties with Hong Kong in various areas of cooperation including trade, commerce, transportation, cultural and educational exchanges and in particular the recognition of passports and travel documents issued after June 30 1997 by the Hong Kong Special Administrative Region.

(3) In the Status of Hong Kong in US Law, the Policy Act declared the continual application of US laws with respect to Hong Kong as was the case prior to the handover, approving the continuation of force of all treaties and international agreements entered into between the US and Hong Kong.

(4) In Reporting Provisions, there is a requirement of reporting Hong Kong conditions to congressional committees which may affect US interest in Hong Kong. The reporting period is defined as “not later than March 31 2019, and annually thereafter through 2024”.

Apart from the above, an important point to note is that the Policy Act made provision for a Presidential Order such that the President of the US is given the power to issue an Executive Order suspending the application of the Policy Act or any part thereof if he or she determines that Hong Kong is not or has become not sufficiently autonomous.

The Amendment Bill

Timeframe for a bill to become a Law in the US

The Amendment Bill would need to undergo the following process before it becomes a Law in the US:-

  • Review by a committee before the bill is to be sent to the House or Senate floor for debate.
  • Congress debates and votes: Member of the House or Senate is to debate on the bill and propose changes or amendments before voting.
  • Presidential Action: If President signs and approves the bill, the bill is law.

While there is no set timeframe in relation to each step, with currently thousands of bills being introduced in the House and the Senate, it is expected the Amendment Bill will not be passed and implemented very shortly.

Potential implications if the Policy Act has been revoked or if there has been any amendments to the Policy Act

Hong Kong has currently been given a special status under the Policy Act to be treated separately from China including the following:-

  • The US should treat Hong Kong as a separate customs territory.
  • The US should treat Hong Kong as a separate territory in economic and trade matters, such as import quotas and certificates of origin.
  • The US should continue to support access by Hong Kong to sensitive technologies so long as the US is satisfied that such technologies are protected from improper use or export.
  • The continuation of all treaties and other international agreements entered into between the US and Hong Kong or entered into before 1 July 1997 between the US and the United Kingdom and applied to Hong Kong, unless or until terminated in accordance with the applicable law.

Without the shield of the Policy Act, Hong Kong could potentially be affected by the US-China trade war such as the implications of China-specific tariffs on goods exported from Hong Kong to the US:-

  • With the US being the Hong Kong’s second largest trading partner in the world accounting for US$42 billion or 9% of the total value in 2017 and having substantial inward direct investment in Hong Kong (the position of inward direct investment from the US amounted to US$40.5 billion at market price as at the end of 2016), the impact of the revocation of the Policy Act or any amendment to the Policy Act from the economic perspective would be far-reaching.
  • For instance, tariffs of exporting goods from Hong Kong to US could potentially face the same penal rate at 25% as applicable to exported Chinese goods in the US at present. This would hit badly on industries such as electrical machinery, telecommunications, sound recording and reproducing equipment, jewelry, and apparel, which represents Hong Kong’s major export items to the US in 2017.
  • Technology companies and companies required advanced technology from US may also take a toll as cloud-based technology,
  • Artificial Intelligence and powerful computer ships may stop being exported to Hong Kong.

Conclusion

It remains to be seen whether the Amendment Bill will be passed. Nevertheless, as the consequences of its implementation would have far-reaching detrimental impact on Hong Kong economy at least in relation to the US, close attention should be paid to its continual development.

OLN provides a full range of tax and advisory services. If you have any questions on the above or other tax questions, please contact a member of the Tax Advisory Team.

Filed Under: Tax Advisory

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 36
  • Page 37
  • Page 38
  • Page 39
  • Page 40
  • Interim pages omitted …
  • Page 52
  • Go to Next Page »

Primary Sidebar

This website uses cookies to optimise your experience and to collect information to customise content. By closing this banner, clicking a link or continuing to browse otherwise, you agree to the use of cookies. Please read the cookies section of our Privacy Policy to learn more. Learn more

Footer

OLN logo

Suite 503, 5/F, St. George's Building 2 Ice House Street, Central, Hong Kong

Tel. +852 2868 0696 | Email us
About People Offices OLN IP Services Privacy Policy
Practice Areas Insights Careers OLN Online
About Practice Areas People Insights Offices
Careers OLN IP Services OLN Online Privacy Policy Home
linkedin twitter facebook
OLN logo

© 2025 Oldham, Li & Nie. All Rights Reserved.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
OLN IP Services

Get bespoke and commercially-driven advice to your Intellectual Property
Learn More
OLN IP Services
OLN Online

Powered by Oldham, Li & Nie, the law firm of choice for Hong Kong’s vibrant startup and SME community, OLN Online is a forward-looking and seamless addition to traditional legal services – a true disruptor.
Learn More
OLN IP Services
Contact Us

Please share the details of your message here.
We will be in touch shortly.

    x