China Drafts New Law To Safeguard Its Cyberspace Sovereignty

China Drafts New Law

State media in China today revealed that its parliament has published a draft law that will “safeguard national cyberspace sovereignty,” as well as “security and development.” It is widely agreed that once accepted, the new law will consolidate government control over digital data and consequently have significant consequences for international and multinational companies doing business in China, as well as Internet service providers operating within the country.

According to an article released by Reuters this morning, the European Union Chamber of Commerce in China is “worried” about the development, in spite of the fact that the law has been a subject of discussion and debate for months. The main concern is, says Chamber president, Joerg Wuttke, that the language used in the draft legislation is so vague it isn’t clear how the law will be enforced.

Reuters also states that the East Asia director of Amnesty International, Nicholas Bequelin believes the law will “institutionalize censorship practices” that have never been previously formulated in an explicit manner. For instance, it will give the Government legal power to instantly cut Internet access in the event of “sudden” incidents if authorities felt order needed to be maintained. This is exactly what it did for ten months after about 200 people died in Urumqi in ethic riots during 2009.

It is understood that the draft law will be far-reaching, and will not only improve privacy protection from cyber attack and hackers, but will also increase the power of the government to secure records and prevent publication and distribution of information that is seen as illegal in Chinese law. This will effectively enable the authorities to regulation information flow to the people.

The draft legislation, dated Monday July 6, 2015, aims, amongst other things, to ensure that anyone using messaging apps via the Internet in China must use real names. It states that all network equipment must be approved according to government testing standards, and all data collected by Internet Service Providers within China must be stored on Chinese territory. It also states that data stored in other countries for business purposes must be approved by the Chinese government. This will undoubtedly affect moves by Chinese e-commerce companies like Aliyun to expand their cloud services out of China.

According to a report in the South China Morning Post today, the Chinese government has identified cybersecurity as “a particularly irksome” element when it comes to certain economic partners, including the US that is opposed to many proposed rules as unfair to Silicon Valley companies.

The Chinese parliament has said government agencies will provide guidelines that will help network security, particularly for those “critical industries” like energy, finance, transport and telecoms, as well as national military and defense, and government administration. It has also announced that it will accept feedback on the draft legislation until August 5, 2015.

Earlier this month, on July 1, China’s parliament passed another sweeping national security law that has tightened control by government through the broad spectrum of life as it relates to culture, politics, the economy, the environment, technology, and the military. Essentially this law aims to ensure that all key information and infrastructure systems are both controllable and secure. The new draft legislation is the next step.

By Penny Swift

Yuliya Melnik
Heroku or AWS Cloud infrastructures are gradually starting to penetrate into an increasing number of areas and various businesses. And this is not surprising because such a ploy allows you to improve internal processes, protect ...
The all-new Stellar Repair for MS SQL – an Efficient Tool to Fix SQL Database Corruption
Efficient Tool to Fix SQL Database Corruption SQL database corruption is not uncommon. There are many reasons for SQL database corruption, such as virus infection, bugs in the SQL Server, errors during updates, abrupt system ...
JK Chelladurai
Usage-Based Pricing We are now in an era where many businesses are flipping their business model and shifting from subscription-based pricing to usage-based models, to better cater to the modern ‘pay-as-you-consume’ buyer. So what exactly ...
Dana Gardner
Just as cloud computing initially seeped into organizations under the cloak of shadow IT, application programming interface (API) adoption has often followed an organic, inexact, and unaudited path. IT leaders know they’re benefiting from APIs -- ...
Harish Chauhan
Adopting a Multi-cloud Strategy Cloud has been in existence since 2006 when Amazon Web Service (AWS1) first announced its cloud services for enterprise customers. Two years later, Google launched App Engine, followed by Alibaba and ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.