Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Lenovo Faces Allegations Over Data Transfers to China

Lenovo Faces Allegations Over Data Transfers to China

Posted on February 17, 2026 By CWS

In a significant legal development, a U.S. law firm has initiated a class action lawsuit against Lenovo, accusing the technology giant of facilitating the transfer of sensitive personal data from American users to entities in China. This legal move raises serious privacy and national security concerns, highlighting potential violations of the Department of Justice’s (DOJ) Data Security Program.

Allegations of Privacy Violations

The lawsuit, filed by the Almeida Law Group on behalf of San Francisco resident Spencer Christy, claims that Lenovo’s website tracking infrastructure enabled the unauthorized transfer of data. According to the complaint, these actions constitute a breach of the DOJ’s Bulk Sensitive Data Transfer Rule, posing risks to both individual privacy and national security.

The legal action, brought before the U.S. District Court for the Northern District of California, seeks to represent a nationwide class of users whose interactions with Lenovo’s website were allegedly monitored and utilized since April 8, 2025. The DOJ’s security measures, codified in April 2025, specifically aim to prevent countries of concern from accessing bulk sensitive data.

Tracking Technologies Under Scrutiny

Central to the case are claims that Lenovo utilized a range of tracking tools, including pixels, cookies, and scripts, to collect detailed user information. These technologies reportedly gathered persistent identifiers such as IP addresses and advertising IDs, alongside detailed browsing information.

The complaint further alleges that Lenovo incorporated tracking from major ad-tech companies like TikTok, Meta, and Google, facilitating large-scale data collection. It is asserted that data from over 100,000 U.S. users was potentially transmitted to Lenovo entities connected to China, meeting the DOJ’s criteria for bulk data.

Legal and Regulatory Implications

In addition to the DOJ rule, the lawsuit invokes federal and state privacy laws, including the Electronic Communications Privacy Act and California privacy statutes. The complaint argues that Lenovo’s practices involved unauthorized interception and disclosure of web communications.

The legal action also references Executive Order 14117, emphasizing the risks associated with cross-border data access, such as profiling and potential coercion. Lenovo’s own privacy policies are cited, acknowledging data transfers to the Lenovo Group and China, raising questions about compliance with DOJ regulations.

As the court proceedings unfold, the case underscores the complexities of modern data flows and the potential for regulatory challenges when these intersect with international relations and privacy concerns.

Stay informed with the latest updates on cybersecurity and data privacy by following us on Google News, LinkedIn, and X.

Cyber Security News Tags:China, class action, Cybersecurity, data transfer, DoJ, Lenovo, national security, Privacy, tracking technology, U.S. law

Post navigation

Previous Post: AI Amplifies API Vulnerabilities: Increasing Threats
Next Post: Keenadu Malware Exploits Android Firmware for Data Theft

Related Posts

Threat Actors Advertising AI-Enhanced Metamorphic Crypter with Claims of Windows Defender Bypass Threat Actors Advertising AI-Enhanced Metamorphic Crypter with Claims of Windows Defender Bypass Cyber Security News
China-Nexus Hackers Actively Exploiting React2Shell Vulnerability in The Wild China-Nexus Hackers Actively Exploiting React2Shell Vulnerability in The Wild Cyber Security News
A Multi-Stage Phishing Kit Using Telegram to Harvest Credentials and Bypass Automated Detection A Multi-Stage Phishing Kit Using Telegram to Harvest Credentials and Bypass Automated Detection Cyber Security News
Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions Instagram, Facebook, and WhatsApp to Test New Premium Subscriptions Cyber Security News
New Malware Via WhatsApp Exfiltrate Contacts to Attack Server and Deploys Malware New Malware Via WhatsApp Exfiltrate Contacts to Attack Server and Deploys Malware Cyber Security News
New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malware Threat Emerges from Triton App Fork on GitHub
  • QR Codes Exploited in Rising Phishing and App Threats
  • AI Assistants Exploited as Malware Command Channels
  • How CISOs Leverage Threat Intelligence to Prevent Breaches
  • Keenadu Malware Exploits Android Firmware for Data Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malware Threat Emerges from Triton App Fork on GitHub
  • QR Codes Exploited in Rising Phishing and App Threats
  • AI Assistants Exploited as Malware Command Channels
  • How CISOs Leverage Threat Intelligence to Prevent Breaches
  • Keenadu Malware Exploits Android Firmware for Data Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News