Dawn raids: responding to regulatory investigations 27 January 2021 - Deloitte

Page created by Daryl Wheeler
 
CONTINUE READING
Dawn raids: responding to regulatory investigations 27 January 2021 - Deloitte
Dawn raids: responding to regulatory
investigations
27 January 2021
© 2021                                 1
Dawn raids: responding to regulatory investigations 27 January 2021 - Deloitte
Introduction
Deloitte Forensic and Yang Chan & Jamison LLP

     YL Cheung
     ‫‏‬                   William Tam
                         ‫‏‬                   Valarie Fung
                                             ‫‏‬                         Michael Mo
                                                                       ‫‏‬                   Catherine Leung
                                                                                           ‫‏‬

                                                                       ‫‏‬

     Partner             Partner             Partner                   Director            Senior associate
     Deloitte Forensic
     ‫‏‬                   Deloitte Forensic
                         ‫‏‬                   Yang Chan & Jamison LLP
                                             ‫‏‬                         Deloitte Forensic   Yang Chan & Jamison LLP
                                                                                           ‫‏‬

© 2021                                                                                                               2
Dawn raids: responding to regulatory investigations 27 January 2021 - Deloitte
XXXXXXXX
XXXXXXXXX
Imagine that…

 • It is 9 o'clock in the morning and you are sipping a coffee in the office, when the receptionist informs you that over 10
   officers from a regulatory authority have arrived and asked to enter the office to conduct a search.
 • What should you do?

                                                                                                   Photo credit: South China Morning Post
© 2021                                                                                                                                      3
Dawn raids: responding to regulatory investigations 27 January 2021 - Deloitte
Dawn raids
Introduction

• “Dawn raid” refers to an unexpected and
  unannounced inspection of premises by
  regulators.
• The literal meaning of the word “dawn” infers
  that the visit would usually take place in the early
  hours of the day.
• The raid is unannounced – so that the subject of
  investigation cannot do anything to impair the
  seizure of evidence by the regulatory authority.

© 2021                                                   4
Dawn raids: responding to regulatory investigations 27 January 2021 - Deloitte
Power to search and enter pursuant to a warrant
Some examples

     Police Force Ordinance                    Securities and Futures                       Prevention of Bribery                        Independent Commission
       (Cap. 232) ("PFO")                            Ordinance                                    Ordinance                            Against Corruption Ordinance
                                                                                                                                           (Cap. 204) ("ICACO")
                                                 (Cap. 571) ("SFO")                          (Cap. 201) ("POBO")

“Whenever it appears to a magistrate…      “If a magistrate is satisfied… that there   “Where… the court is satisfied that there    “If a magistrate is satisfied that… there is
    that there is a reasonable cause to    are reasonable grounds to suspect that      is reasonable cause to believe that in any    a reason to believe that there is in any
  suspect that there is in any building…    there is or is likely to be on premises…     premises…there is anything which is or     premises… anything which is or contains
any… document… which is likely to be of    any… document which may be required           contains evidence of an offence under      evidence of the commission of any of the
    value… to the investigation… such        to be produced under [the SFO], the         [the POBO], the court may by warrant       offences referred to in this section 10, he
 magistrate may by warrant directed to          magistrate may issue a warrant             directed to an investigating officer…     may by warrant directed to any officer
   any police officer empower him… to      authorizing a… police officer… to enter        empower such officer… to enter such        authorize such officer… to enter… such
 enter and if necessary to break into or         the premises…” (section 191)                    premises…” (section 17)                    premises…” (section 10B)
 forcibly enter such building…” (section
                    50(7))

© 2021                                                                                                                                                                         5
Dawn raids: responding to regulatory investigations 27 January 2021 - Deloitte
Practical tips to handle a raid

          Practical Tips

                    Instruct legal advisors

             01     It is not ideal for any company or person to handle a regulatory investigation in the absence of legal advice. In particular, lawyers
                    can advise the company or person subject to investigation on their rights and obligations throughout the dawn raid and the
                    whole investigation process, including the right to claim legal professional privilege.

© 2021                                                                                                                                                      6
Dawn raids: responding to regulatory investigations 27 January 2021 - Deloitte
Practical tips to handle a raid

          Practical Tips

                    Check the search warrant

                    You should have your lawyers to check the search warrant to ensure that:-
             02
                    •   It is issued no more than 7 days prior to the search;
                    •   There is proper description of the nature of the alleged offence;
                    •   The location stipulated in the search warrant is correct; and
                    •   The persons entering into the premises and undertaking the search are those authorized persons under the warrant.

© 2021                                                                                                                                      7
Practical tips to handle a raid

          Practical Tips

                    Claim of legal professional privilege ("LPP")

             03     Regulators cannot compel disclosure of documents which are subject to the claim of LPP. In some circumstances you may want to
                    disclose privileged documents to regulators on a "limited waiver" basis, which means that the documents are provided to the
                    regulators solely for the purpose of their investigation and the regulators cannot transfer or disclose the documents to other
                    third parties for any other derivative purposes.

© 2021                                                                                                                                               8
Practical tips to handle a raid

          Practical Tips

                    Agreement on protocol for the search

                    Before the regulators start the search in the premises, your lawyers should agree on a "search protocol" with the regulators.
             04     Under the protocol, the regulators may be willing to disclose the classes of documents they are specifically looking for, and you
                    can then indicate the location of those relevant documents to facilitate the search which will also help minimise any intervention
                    in the normal operation of the company's business.

© 2021                                                                                                                                                   9
Practical tips to handle a raid

          Practical Tips

                    Think twice before voluntarily answering questions or giving statements

             05
                    During the search, it is rather common that the regulators may ask the staff members of the company some questions. If the
                    questions are solely for the purpose of furthering the proper and effective conduct of the search, it is advisable that the
                    questions should be answered.

                    On the other hand, if the regulators ask substantive questions about the content of the investigation, you should seek legal
                    advice as to whether those questions should be answered. For example, if the raid is conducted by the SFC, they should have
                    issued the requisite notice under s.183 of the SFO.

© 2021                                                                                                                                             10
Practical tips to handle a raid

          Practical Tips

                    No right to silence

             06     If the SFC issues a notice under s.183 of the SFO to require a person who is subject to investigation or assisting in an investigation
                    to answer any questions or produce any relevant documents, the person cannot refuse to answer or produce the relevant
                    documents or otherwise he/she may be found guilty of a criminal offence.

© 2021                                                                                                                                                       11
Practical tips to handle a raid

          Practical Tips

                    Declaration of rights against self-incrimination

                    Although there is no right to silence under the SFO, there is statutory protection for any person who makes a claim to the
             07
                    privilege against self-incrimination when providing answers and/or documents. Through claiming the rights against self-
                    incrimination, the answers and/or documents produced by a person will not be admissible in evidence against the person in
                    criminal proceedings.

© 2021                                                                                                                                           12
Case study
Cheung Ka Ho Cyril v SFC [2020] HKCFI 270

          Facts

           This case is a judicial review application of a number of search warrants issued by the Magistrates authorising the SFC to search the Applicants' premises and
           the related decisions made by the SFC arising out of the execution of the search warrants. Specifically, during the course of the SFC operation:

           1. Digital devices (including mobile phones, tablets and/or computers) belonging to the Applicants were found;

           2. Where no password was required to access such devices, the SFC conducted keyword searches to check for relevant materials. Alternatively, where the
              Applicants unlocked the digital devices voluntarily, the SFC looked for relevant materials by using keyword searches or by scrolling through the contents
              to look for relevant materials;

           3. Based on the searches mentioned above, the SFC was able to identify materials contained in emails, contact lists and messaging applications that were
              relevant, or believed to be relevant, to the SFC’s investigations;

           4. The SFC requested the Applicants to provide print-outs of the relevant materials or login names/passwords to the email accounts or digital devices to
              enable the SFC to access the same, to which they either declined outright (in some instances by asserting legal professional privilege), or used various
              excuses not to provide the same;

           5. In the case of the Applicant who asserted legal professional privilege, the SFC suggested that the relevant emails and attachments thereto could be
              printed out and kept under seal for the time being pending the resolution of the legal professional privilege claim. This suggestion was rejected by the
              Applicant;

           6. In the circumstances, the SFC decided to seize various digital devices belonging to the Applicants; and

           7. The SFC issued notices under s 183(1) requiring the Applicants to provide the login names and/or passwords to various email accounts or digital devices
              (including mobile phone, tablet and computer).

© 2021                                                                                                                                                                      13
Case study
Cheung Ka Ho Cyril v SFC [2020] HKCFI 270

           Issues

             1) Whether the SFC decisions to seize various digital devices belonging to the Applicants in the course of
                execution of the search warrants and thereafter to retain them were ultra vires the SFO / the search
                warrants, unlawful and/or unconstitutional;

             2) Whether the SFC decisions to issue notices pursuant to s183(1) to the Applicants requiring them to provide
                the SFC the passwords to their e-mail accounts or digital devices were ultra vires the SFO / the search
                warrants, unlawful and/or unconstitutional; and

             3) Whether the search warrants were unlawful and invalid for want of specificity.

© 2021                                                                                                                       14
Case study
Cheung Ka Ho Cyril v SFC [2020] HKCFI 270

            Challenge to notices requiring disclosure of passwords

           The Applicants' arguments

           The s183(1) notices issued were ultra vires the SFO provisions because:

           1. They required them to produce vast amounts of materials which were irrelevant to the SFC’s investigations,
              thus falling outside the remit of any record or document which "is, or may be, relevant to the investigation"
              under s183(1)(a);

           2. To construe s 183(1)(a) as permitting the SFC to require the production of large amounts of irrelevant materials
              for the purpose of sifting would violate BL 30 and/or BORO 14, because that would give rise to a
              disproportionate restriction of the right to privacy; and

           3. The SFC has no power to access the email accounts of the Applicants under the corresponding warrants.

© 2021                                                                                                                           15
Case study
Cheung Ka Ho Cyril v SFC [2020] HKCFI 270

            Challenge to notices requiring disclosure of passwords

            Held

            Chow J rejected all of the Applicants' arguments:

            •   The judge referred to several case authorities (Reynolds v Commissioner of Police of the Metropolis [1985] 1 QB
                881 at §§890A-B; Apple Daily Ltd v ICAC (No 2) [2000] 1 HKLRD 647 at §§19-20; R (on the application of
                Paul Da Costa & Co) v Thames Magistrates Court [2002] EWHC 40 (Admin), at §§19-20; R (on the application
                of H) v Commissioners of Inland Revenue [2002] EWHC 2164 (Admin), at §§37 and 39-40; R (Faisaltex Ltd) v
                Crown Court at Preston [2009] 1 WLR 1687, at §§73-79) deciding that where a warrant authorises the seizure
                of a particular document, the officer empowered by the warrant is lawfully entitled to seize the whole file
                containing the document or the whole computer hard disk without having to separate the individual sheets or
                computer files;

            •   The judge also considered the practical reality that information, documents and records are nowadays mostly
                kept in digital or electronic forms and stored in email accounts and digital devices which (i) would almost
                inevitably contain large amounts of personal or private, but irrelevant, materials, and (ii) are often also
                protected by specific login names/IDs and passwords;

© 2021                                                                                                                            16
Case study
Cheung Ka Ho Cyril v SFC [2020] HKCFI 270

            Challenge to notices requiring disclosure of passwords

            Held (Continue)

            •   The judge arrived at the conclusion that the SFC is empowered, under s 183(1), to require the Applicants to
                provide means of access to email accounts and digital devices which contain, or are likely to contain,
                information relevant to its investigations even though the email accounts and digital devices would likely also
                contain other personal or private materials which are not relevant to the SFC’s investigations.

            •   However, the SFC has offered safeguards to protect the privacy of the Applicants by agreeing to use keyword
                searches to identify relevant materials contained in or accessible through the digital devices and/or viewing the
                contents together with the Applicants so as to minimize the chance of their personal or other information
                which is irrelevant to the SFC’s investigations being viewed by its officers. Any dispute on relevance can be
                brought to the court for determination, with the disputed materials being sealed pending the court’s decision.

© 2021                                                                                                                              17
Aims of a dawn raid
What will investigators do, and why?
 Reasons for investigation                                               Methodology
 • Investigators will only conduct a dawn raid if they have grounds      There is no “one-size-fits-all” approach but investigations will likely
    to believe wrongdoing has occurred. Common reasons include:          include some or all of the following:
      • Whistleblower allegations                                        • Review of paper/electronic documents, including emails, content
      • Tip-offs from other agencies or tax authorities                      saved to laptops/shared drives, mobile phone call records/data,
      • Findings from their own monitoring or analysis                       and any paper documents.
      • The business is linked to another investigation                     •     Transaction testing – attempts to understand
                                                                                  transactions by mapping fund flows/checking substance
 Structure of investigation

                                                                      !
                                                                                  of trading, comparing records against external sources
 • The approach will vary depending on the circumstances
     but typically investigators will have an initial hypothesis                    •   Corporate intelligence – search corporate
     of what has occurred and seek to confirm or disprove                               filings/databases and conduct network analysis to
     that theory. An investigation will usually consist of:                             identify undeclared conflicts and business
       • Initiation – identifying relevant parties/data                                 interests/relationships
       • Planning – obtaining warrants, planning raid                                   • Interviews –with key personnel, typically
       • Gathering information – likely to include interviews, seizure   including management, finance staff, sales/ procurement and
           of documents/electronic data, review of emails on servers     potentially external parties (i.e. bankers, auditors, trading partners)
       • Analysis & interpretation – detailed review of data seized,
           forensic accounting, triangulation of data points                    A dawn raid is just one step    Investigators’ methodologies
       • Reporting and closure –prosecution, report to authorities.              in a broader investigation        are constantly evolving

© 2021                                                                                                                                             18
What comes next?
Introducing the role of technology in investigations
                                                                     Technology and data to the fore
         Humans can only do so much!                                 Faced with urgent deadlines and limited resources investigators
                                                                     are leveraging new technology and data analytics.
         It’s no secret that regulators worldwide are hard-pressed
         for resources and Hong Kong is no exception. According to                        Investigations are increasingly likely to
         the most recent figures:                                                         involve the seizure of electronic evidence.

         •   The SFC has 736 professional staff                                           Police have faced scrutiny over how they
         •   The ICAC has around 1,400 staff                                              access and use data from suspects’
                                                                                          phones.
         Despite these constraints the SFC commenced
                                                                                    Regulators too will consider electronic data in
         197 investigations in 2019/20 and made 8,767
                                                                                    their work. Emails, documents and –
         requests for trading and account records – as well
                                                                                    increasingly – mobile messenger conversations
         all alongside its day-to-day regulatory and oversight
                                                                                    will be a key plank of their evidence.
         activities.
         The ICAC received 995 separate corruption allegations       In the following slides we
         in the first six months of 2020 alone.                      introduce some of the
                                                                     techniques and challenges you
         How do they fit it all in…?                                 are likely to encounter.

© 2021                                                                                                                                  19
Computer forensic data workflow
                                                         Data size after each process/segment reduces
                               Services provided
                               by Deloitte                                                                                                          Note: Please note that ESI Data
                                                                                                                                                    Identification and Legal review will
                                                                                       Concept                                                      be co-sourced by the Client and
                                                                                      Searching                                                     Deloitte team as requested.

Regulator visits premise
with search warrant

                                ESI Data                     Data                       Data                   Data                     Legal                           Data
  Dawn raid
                             Identification                Collection                Processing              Publishing                Review                         Handover

                           Identify scope,                                                                                                                         Handover of non-
                           custodians, and data                                                                                                                    privileged data to
                                                      Collect data from source    Extraction, indexing,   Publish search          Review, identify, and            relevant party
                           type
                                                      medias (i.e. PC, servers,   DeNISTing,              results on eDiscovery   tag privileged
                           (i.e. Email, user files)
                                                      mobiles) and make           deduplication, date     platform                documents on the
                                                      3 copies, for:              filtering (optional)                            eDiscovery platform
                                                                                  and keyword
                                                      • Regulator (sealed)        searching (optional)
                                                      • Client’s Legal team       of data.
                                                      (sealed)
                                                      • Deloitte as working
                                                      copy

© 2021                                                                                                                                                                              20
Challenges for data collection, preservation and analysis
                                         Computers / Servers                                                      Mobile devices
                                          Operating Systems                                                    OS and Manufacturers

                                                                                    • Various Mobile device Operating system and manufacturers
 • Various Computer Operation Systems (e.g. macOS, Windows and Linux)
                                                                                      (e.g. Apple, Windows, BlackBerry, Samsung, Lenovo and Huawei)

                                         Data Storage Sources                                                  Connection Issues

• Different Data Storage Sources                                                   • Right Cable
  (e.g. Desktops, laptops, servers, network-attached storages and Cloud storage)
                                                                                   • Right Driver
• Different interfaces
• Different hard disk types

                                    Decryption, Wiping & Decoding                                          Decryption and Decoding

• Decryption (e.g. DiskCryptor, TrueCrypt, BitLocker and VeraCrypt)                 • Customized Data Encoding in App level

• Wiping software (e.g. Eraser and CCleaner)                                        • A large number of Apps

                                                                                    • MDM device control and encryption

 © 2021                                                                                                                                               21
Technology-enhanced workflow
Text Mining, Visual Analytics & Machine Learning
                                     Conceptual Analytics
                                     • Process collected data from multiple device and server sources into the analytics platform. Conduct text mining, entity
                                       extraction and conceptual analysis.
                                     • Run keywords on dataset. In addition to results, the platform will identify, categorise and organize thematically and
                                       semantically similar content.
                                     • This will allow us to refine understanding of the document population based on its actual content, uncover related
                                       themes, and refine our search parameters.

                                     Communications Analysis
                                     • Focus search and assessment based on communication parameters.
                                     • Visualisation allows analysis to identify outlier communications: external communications on topics or documentation of
                                       concern.
                                     • Focus specifically on communications between known entities, then apply additional filtering (such as the search term)
                                       to remove “noise.”

                                     Technology Assisted Document Review
                                     • The above steps will determine a potentially relevant population for review.
                                     • Using identified documentation from Conceptual and Communications Analysis, we will program an instance of Machine
                                       Learning to categorise the population by proximity to the issue.
                                     • Documents scored most likely relevant are reviewed first; review decision by the subject expert are fed back to the
                                       machine to continuously update the machine learning algorithm.

© 2021                                                                                                                                                           22
Responding to a dawn raid
How to minimise disruption and recover quickly

    i     Preparation is essential. Have key phone numbers on hand and circulate a
          written protocol to relevant staff so they know in advance how to respond
                                                                                      Shadow investigation
                                                                                      You may conduct your own internal investigation parallel to
                                                                                      regulators. This is a "shadow investigation“. The aim is to understand
 Dealing with investigators during a raid
                                                                                      what investigators are likely to find so you can prepare for the
 • Immediately seek legal advice and have internal/external counsel
                                                                                      outcome.
    attend onsite when investigators arrive.
                                                                                             •External investigators and lawyers can help, and would
 • Cooperate fully with investigators – provide a separate
                                                                                             typically support your own legal counsel and possibly an
    room and IT support when they are onsite.
                                                                                                  independent investigation committee formed of non-
 • Accompany them during the raid to understand what
                                                                                                  executive directors/audit committee.
    they are seizing and where it came from. This will
                                                                                                   •You may identify issues that warrant internal
    help you piece together what they might be doing.
                                                                                                   disciplinary action, even if external regulators decide to
 • If they want original documents, ask if you can make
                                                                                                   take no formal steps against the company/employees.
    copies to avoid business disruption. Keep a log of data
                                                                                                •If the allegations/investigation are public, results of
    and documents that they take.
                                                                                                your shadow investigation could inform your response
 • If they seize laptops/mobile devices, ask via your lawyers
                                                                                           to shareholders, media and other stakeholders (though be
    if a forensic consultant can image the devices so you have
                                                                                           careful not to comment about live ICAC/SFC investigations –
    details of the information available to investigators.
                                                                                           take legal advice on any statement issued).
 • Remember they are human! Offer tea and coffee, show them
    where the bathrooms are, exchange name cards (this will also                         A shadow investigation may uncover the failures in internal controls that led to
                                                                                        problems, and form the basis for remediation. Remediation will help avoid future
    help you identify the officers involved). Order breakfast or lunch                     problems and may aid your defence in any regulatory or legal proceedings.
    – a hungry investigator is a grumpy investigator.

© 2021                                                                                                                                                                      23
Recap – who will investigate and why?
Understanding Hong Kong authorities

         There are several agencies in Hong Kong with the power to launch investigations into businesses and individuals. They have
         varying degrees of power and separate (though sometimes overlapping) remits. This slide recaps some of the main authorities
         you are likely to encounter in an investigation or dawn raid and the range of powers they have.

                 Agency                          Remit                                  Requires search warrants?                               Can make arrests?

         Independent              Fight corruption through law             No, has the power to search without a warrant (Section      Yes , can arrest a person suspected of
         Commission Against       enforcement, prevention and              10C of the ICAC Ordinance).                                 breaching an offence under the three
         Corruption (“ICAC”)      community education.                                                                                 anti-corruption ordinances it enforces.
         Securities and Futures   Strengthen and protect the integrity     Yes, for forcible entry, search/seizure of documents,       No. The SFC typically refers cases to the
         Commission (“SFC”)       and soundness of HK's securities and     prohibition of document destruction. Has power to           Commercial Crime Bureau of the Hong
                                  futures markets.                         interview and demand “reasonable assistance” without        Kong Police Force if an arrest is
                                                                           a warrant.                                                  required.
         Competition Commission   To prohibit conduct that prevents,       Yes, to enter and search premises. Has power to require     No. May refer cases to Hong Kong
         (“CC”)                   restricts or distorts competition, and   people to answer questions and produce documents.           Police Force if it considers that a crime
                                  to prohibit mergers that substantially                                                               has been committed.
                                  lessen competition in Hong Kong.
         Hong Kong Police Force   Law enforcement and investigation of     Generally yes but not if cases can be related to national   Yes.
         (“police”)               criminal matters.                        security or are extremely urgent.

© 2021                                                                                                                                                                             24
Disclaimer

Disclaimer
Any material or explanation (including but not limited to presentation slides or verbal explanation) (collectively “Material”) provided hereunder serves as a general
guide instead of a basis for decision making and shall not be construed as any advice, opinion or recommendation given by Yang Chan & Jamison LLP (“YCJ”) or Deloitte
Advisory (Hong Kong) Limited (“DAHK”) on the presentation. In addition, the Material will be limited by the time available and by the information made available to
YCJ/DAHK and you should not consider the Material as being comprehensive as YCJ/DAHK may not become aware of all facts or information. Accordingly, YCJ/DAHK
will not be in a position to make a representation, and will not make a representation as to the accuracy, completeness and sufficiency of the Material. You will rely on
the contents of the Material at your own risk. This Material shall be kept confidential and any person other than YCJ/DAHK’s authorized personnel shall not, in any way,
retain, use or disseminate this Material without YCJ/DAHK’s prior written consent. All duties and liabilities (including without limitation, those arising from negligence
or otherwise) to all parties, including you are specifically disclaimed. All copyrights and other intellectual property rights contained in the Material are reserved by
YCJ/DAHK. For the avoidance of doubt, the Material contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or their
related entities (collectively, the “Deloitte Network”) is, by means of the Material, rendering professional advice or services. Before making any decision or taking any
action that may affect your finances or your business, you should consult a qualified professional adviser. No entity in the Deloitte Network shall be responsible for any
loss whatsoever sustained by any person who relies on the Material.

The speakers’ views, comments and speech are personal and do not constitute any position or opinion of YCJ/DAHK or otherwise represent YCJ/DAHK, or partners,
principals, members, owners, directors, employees thereof. YCJ/DAHK does not endorse and is not responsible for any such personal expression in whatever form.
Please take the view as the speaker's own only.

© 2021                                                                                                                                                                  25
Any questions?

     YL Cheung
     ‫‏‬                             William Tam
                                   ‫‏‬                          Valarie Fung
                                                              ‫‏‬                                 Michael Mo
                                                                                                ‫‏‬                           Catherine Leung
                                                                                                                            ‫‏‬

                                                                                                ‫‏‬

     Partner                       Partner                    Partner                           Director                    Senior associate
     Deloitte Forensic
     ‫‏‬                             Deloitte Forensic
                                   ‫‏‬                          Yang Chan & Jamison LLP
                                                              ‫‏‬                                 Deloitte Forensic           Yang Chan & Jamison LLP
                                                                                                                            ‫‏‬

     T: +852 28526775
     ‫‏‬                             T: +86 755 33538308
                                   ‫‏‬                          T: +852 28525829
                                                              ‫‏‬                                 T: +852 22387227
                                                                                                ‫‏‬                           T: +852 28521984
                                                                                                                            ‫‏‬

     E: ylcheung@deloitte.com.hk
     ‫‏‬                             E: witam@deloitte.com.cn
                                   ‫‏‬                          E: valariefung@deloittelegal.com.hk E: wamo@deloitte.com.hk
                                                              ‫‏‬                                 ‫‏‬                           E: cathleung@deloittelegal.com.hk
                                                                                                                            ‫‏‬

© 2021                                                                                                                                                          26
You can also read