” If attackers located in country A compromise a device that was made in country B, installed in country C, and exfiltrates data to country D, which rules apply?” February 4, 2015work2Rufo Guerreschi http://www.darkreading.com/partner-perspectives/intel/the-complicated-relationship-among-security-privacy-and-legislation/a/d-id/1318921