SlideShare a Scribd company logo
1 of 43
INTERNET
POLICIES
AND REGULATIONS
IN CHINA
COMM_2383: NEW MEDIA NEW ASIA - GROUP IV - BRYAN URBSAITIS - ASSIGNMENT 2_TEAM PROJECT - DUE & SUBMISSION DATE: 07/08/2017
Tran Quoc Khanh - s3575466
Nguyen Thi Tuyet Mai - s3618989
Nguyen Luong Cao Nhan - s3634660
Mai Trung Nghia - s3594475
T A B L E
O F
C O N T E N T
Internet architecture and infrastructure
Digital copyright laws and practices
Privacy and surveillance
1
Content regulation and filtering
2
3
4
5
6
Introduction
Conclusion and Prediction
1.
I N T R O
D U C
T I O N
2008
Largest
population on the
internet
2015
649
million
users
2016
50% of
China’s
population
had internet
connectivity
( China Power 2016 )
The growth of mobile internet
80%Use of smartphones and tablets to connect
( CNN 2015 )
2.
A R C H I
T E C
T U R E
( OWNED BY PRC )
http://slideplayer.com/slide/6250936/
2.
I N F R A
S T R U C
T U R E
SOURCE ADDRESS
VALIDATION ARCHITECTURE
BELT AND ROAD
INITIATIVE
BACKBONE
IPv6
( Vamien 2013 )
( China Daily 2016
)
( Sunny 2013 )
3.
D I G I T A L
C O P Y R I G H T
L A W S
A N D
P R A C T I C E S
WHAT IS
“COPYRIGHT”?
A form of
INTELLECTUAL
PROPERTY
RIGHTS
and PROTECTION
(Hungarian Intellectual Property Office, 2015)
https://www.bing.com
https://www.gov.uk/copyright
7 September
1990
DATE OF TEXT 1 January
1991
ENTRY TO FORCE
1 April
2010
LAST AMENDMENT
(Wipo 2010)
I N
T H E
P A S T
1949 Using Soviet model
1978 Implementing the reform and opening policy
“A book taken from another was not a stolen book”
(Wei 2017)
Berne Convention
The Universal
Copyright
Convention
The Universal
Copyright Convention
nen.wikipedia.org
http://www.ibna.ir
http://www.simplynotes.in
The copyright arises in China as soon as an
original work is created, even in most cases
where the work is created outside of China
(China IPR Helpdesk 2012)
http://www.china-ihelpdesk.eu/
A T
T H E
P R E S E N T
Copyrights that
are projected
under the
Copyright Law
in China
Publication
Authorship
Exhibition
Broadcast or
cinema screening
Communication through
information network
Presentation
Other rights to be
enjoyed by
copyright owners
The FACT that….
90%
456 million
Music and literature copyright infringement is widely
regarded as one of the highest in the world (Chiara 2015)
https://www.bing.com
The FACT that….
1 billion dollars
(Chiara 2015)
www.bing.com
3.
T H E
G O V E R N M E N T ‘ S
P R A C T I C E S
- Authorising the copyright administration
- Raising the amount of penalty
- Specialising intellectual property
divisions
(Chiara 2015)
4.
P R I
V A C Y
Zhang Xinbao: “privacy is a legal right, by which citizens”
Wang Liming: ““enjoyed by a person”
Variety Relationship
Human need
Self-evaluation
4.
S U R V E I L
L A N C E
Chinese cafes, hotels and other businesses are asked to set up surveillance technology
ENHANCE
THE SECURITY
BREAK
CRIMINAL CASES
thedailysheeple.com
4.
C O N T E N T
R E G U L A T I O N S
A N D
F I L T E R I N G
The Universal
Copyright
Convention
CHINA’S GREAT FIREWALL
http://thatbluebook.com.ng
WHAT IS CHINA’S GREAT FIREWALL?
- A combination of technological and legislative action
- Control, regulate and censor Chinese domestic Internet
- The size and sophistication of the Chinese government's program
Garry, Jennifer & Margaret, 2013
CHINA’S GREAT FIREWALL
These actions include but not limited to:
➢ Criminalizing certain online speech and activities.
➢ Blocking and banning selected websites, news outlets, applications and softwares.
➢ Filtering out keywords in search engine results.
➢ Arresting journalists, activists, reporters and bloggers.
➢ Limiting cross-border internet traffic via IP or URL filtering.
CHINA’S GREAT FIREWALL ORIGIN
2003
Golden shield project
- Security management, criminal information
- Supervisor information, traffic management
information
HOW THE CCP CENSORED THE INTERNET?
Packet filtering
Connection reset
Distributed Denial of Service attacks (DDOS)
BLOCKED IN CHINA
What on the Internet is blocked in China ?
http://www.bbc.com/news/worl
d-asia-china-23094994
BLOCKED IN CHINA
What on the Internet is blocked in China ?
http://www.bbc.com/news/worl
d-asia-china-23094994
BLOCKED IN CHINA - POLITICAL
“COMMUNISM”
“DEMOCRACY”
http://www.bbc.com/news/worl
d-asia-china-23094994
BLOCKED IN CHINA - POLITICAL
“4th June, 1989”, “Tiananmen square protest”,
“Tank Man”
(Source: Wikipedia. Image by Widener)
“Tibet Independence”,
“Dalai Lama”, “Taiwan
Independence”.
BLOCKED IN CHINA - RELIGIOUS
http://www.bbc.com/news/worl
d-asia-china-23094994
BLOCKED IN CHINA - MEDIA
Most of Google, Yahoo, Twitter and
Facebook are blocked in China
Banning of VPN applications
Hollywood censorship
http://thesocialmediamonthly.com
6.
C O N C L U S I O N
A N D
P R E D I C T I O N
CHINA’S INTERNET IS NOT FREE
The chilling effect on
private and public
discussion,
particularly online,
generated by
cybersecurity and
foreign NGO laws.
Increased internet
surveillance.
Heavy sentences
handed down to
human rights lawyers,
microbloggers,
grassroots activists,
and religious believers.
7.
R E F E R E N C E S
- Branigan, T 2011, “China Boosts Internet Surveillance”, [online] The Guardian, Viewed: 07 August 2017,
<https://www.theguardian.com/world/2011/jul/26/china-boosts-internet-surveillance>
- Chiara, F 2015, “What you need to know about copyright law in China”, D’Andrea & Partners, viewed 04 August 2017, <http://www.dandreapartners.com/what-
you-need-to-know-about-copyright-law-in-china/>.
- China IPR Helpdesk 2012, “Copyright Protection in China, a guide for European SMEs”, China IPR, viewed 04 August 2017, <http://www.china-
iprhelpdesk.eu/sites/all/docs/publications/EN_Copyright_guide_Aug_2010.pdf>.
- China pushing to build internet infrastructure for Belt and Road Initiatives. (2017). China Daily. [online] Available at:
http://www.chinadaily.com.cn/business/3rdWuzhenWorldInternetConference/2016-11/19/content_27428755.htm [Accessed 6 Aug. 2017].
- Hungarian Intellectual Property Office 2015, “Definition of Copyright”, Hungarian Intellectual Property Office, viewed 01 August 2017,
<https://www.sztnh.gov.hu/en/copyrights-and-related-rights/basics/definition-of-copyright>.
- King, G, Pan, J & Roberts, M.E, 2013, “How Censorship in China Allows Government Criticism but Silences Collective Expression”,The American Political
Science Review, Vol. 107, No. 2, pp. 326, viewed 3rd August 2017, <http://dx.doi.org.ezproxy.lib.rmit.edu.au/10.1017/S0003055413000014>.
- Limer, E. (2013). China's Internet Architecture Gives the Rest of Us a Run for Our Money. [online] Gizmodo.com. Available at:
http://gizmodo.com/5989809/chinas-internet-architecture-gives-the-rest-of-us-a-run-for-our-money [Accessed 6 Aug. 2017].
- McKalin, V. (2017). China's Internet Architecture Puts Everyone Else to Shame. [online] Mobile & Apps. Available at:
http://www.mobilenapps.com/articles/7856/20130311/chinas-internet-architecture-puts-everyone-shame.htm [Accessed 6 Aug. 2017].
- McKirdy, E. (2015). China's online users more than double entire U.S. population. CNN, [online] p.1. Available at:
http://edition.cnn.com/2015/02/03/world/china-internet-growth-2014/index.html [Accessed 6 Aug. 2017].
- PUIU, T. (2017). China's next-generation internet infrastructure tightens security. [online] ZME Science. Available at:
http://www.zmescience.com/research/technology/chinas-next-generation-internet-infrastructure-tightens-security/ [Accessed 6 Aug. 2017].
- Wang, H. & SpringerLink, 2011. Protecting Privacy in China A Research on China's Privacy Standards and the Possibility of Establishing the Right to Privacy
and the Information Privacy Protection Legislation in Modern China, Berlin, Heidelberg: Springer Berlin Heidelberg : Imprint: Springer., Viewed: 7 August
2017, <https://link-springer-com.ezproxy.lib.rmit.edu.au/content/pdf/10.1007%2F978-3-642-21750-0.pdf>
- Wei, J 2007, “Evaluating China’s Copyright protection situation”, The Journal of China Universities of Posts and Telecommunications, vol. 14, sub. 1, pp. 1-3,
<http://www.sciencedirect.com/science/article/pii/S100588850860028X>.
- Wipo 2010, “Copyright law of the People’s republic of China of February 26, 2010”, Wipo Lex, viewed 01 August 2017,
<http://www.wipo.int/wipolex/en/details.jsp?id=6062>.
THANK YOU FOR YOUR
LISTENING

More Related Content

What's hot (14)

Internet censorship and monitor's impact on free expression in china
Internet censorship and monitor's impact on free expression in chinaInternet censorship and monitor's impact on free expression in china
Internet censorship and monitor's impact on free expression in china
 
05 the blockchain technology 2019
05 the blockchain technology 201905 the blockchain technology 2019
05 the blockchain technology 2019
 
05 the blockchain technology 2019 summer
05 the blockchain technology 2019 summer05 the blockchain technology 2019 summer
05 the blockchain technology 2019 summer
 
Ap comparative brazil privacy
Ap comparative brazil privacyAp comparative brazil privacy
Ap comparative brazil privacy
 
SOPA
SOPASOPA
SOPA
 
LSNTAP Video and Other Cutting Edge Tech to Reach Clients
LSNTAP Video and Other Cutting Edge Tech to Reach ClientsLSNTAP Video and Other Cutting Edge Tech to Reach Clients
LSNTAP Video and Other Cutting Edge Tech to Reach Clients
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Unintended Consequences: The Internet Regulation
Unintended Consequences: The Internet RegulationUnintended Consequences: The Internet Regulation
Unintended Consequences: The Internet Regulation
 
Access and Digital Divide
Access and Digital DivideAccess and Digital Divide
Access and Digital Divide
 
PechaWeb 2.0 and surveillance
PechaWeb 2.0 and surveillancePechaWeb 2.0 and surveillance
PechaWeb 2.0 and surveillance
 
Web 2.0 and surveillance slides
Web 2.0 and surveillance slidesWeb 2.0 and surveillance slides
Web 2.0 and surveillance slides
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
The Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era PresentationThe Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era Presentation
 
Quiz - Online Regulation
Quiz - Online RegulationQuiz - Online Regulation
Quiz - Online Regulation
 

Similar to China's internet policies and regulations

Google in China | Varun Daahal
Google in China | Varun DaahalGoogle in China | Varun Daahal
Google in China | Varun DaahalVarun Daahal
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsCharles Mok
 
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxwraythallchan
 
Internet Access & Digital Divides
Internet Access & Digital DividesInternet Access & Digital Divides
Internet Access & Digital Divideshmjchung
 
LECTURE 5 - Cyberculture
LECTURE 5 - CybercultureLECTURE 5 - Cyberculture
LECTURE 5 - CybercultureKim Flintoff
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityDr David Probert
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...Emily Võ
 
Pecha kucha on_surveillance (1)
Pecha kucha on_surveillance (1)Pecha kucha on_surveillance (1)
Pecha kucha on_surveillance (1)OliverGibbs505
 
Newsletter 2 Final-2
Newsletter 2 Final-2Newsletter 2 Final-2
Newsletter 2 Final-2Jung Won Kim
 
Nuño Valenzuela - China search-market & cyber security, Search Congress 2011
Nuño Valenzuela - China search-market & cyber security, Search Congress 2011Nuño Valenzuela - China search-market & cyber security, Search Congress 2011
Nuño Valenzuela - China search-market & cyber security, Search Congress 2011ithinksearch
 
Chinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdfChinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdfaghsports
 
The great chinese firewall
The great chinese firewallThe great chinese firewall
The great chinese firewallAnca Dinculescu
 
The internet of china in the world
The internet of china in the worldThe internet of china in the world
The internet of china in the worldYanan Lu
 
The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State FilterAndrew Davies
 
State of the Internet
State of the InternetState of the Internet
State of the InternetCharles Mok
 
Open Data at the Rebellious Media Conference
Open Data at the Rebellious Media ConferenceOpen Data at the Rebellious Media Conference
Open Data at the Rebellious Media Conferencejtownend
 
"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionalsVadim Dryganov
 
As a platform for unorganised individual Chinese expression, how is today’s i...
As a platform for unorganised individual Chinese expression, how is today’s i...As a platform for unorganised individual Chinese expression, how is today’s i...
As a platform for unorganised individual Chinese expression, how is today’s i...Jeremy Webb
 

Similar to China's internet policies and regulations (20)

Google in China | Varun Daahal
Google in China | Varun DaahalGoogle in China | Varun Daahal
Google in China | Varun Daahal
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two Systems
 
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
 
Internet Access & Digital Divides
Internet Access & Digital DividesInternet Access & Digital Divides
Internet Access & Digital Divides
 
LECTURE 5 - Cyberculture
LECTURE 5 - CybercultureLECTURE 5 - Cyberculture
LECTURE 5 - Cyberculture
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
 
China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...China’s Internet Security _Dichotomy of National Security and Human Rights in...
China’s Internet Security _Dichotomy of National Security and Human Rights in...
 
Pecha kucha on_surveillance (1)
Pecha kucha on_surveillance (1)Pecha kucha on_surveillance (1)
Pecha kucha on_surveillance (1)
 
Promise perils io_t
Promise perils io_tPromise perils io_t
Promise perils io_t
 
Newsletter 2 Final-2
Newsletter 2 Final-2Newsletter 2 Final-2
Newsletter 2 Final-2
 
Nuño Valenzuela - China search-market & cyber security, Search Congress 2011
Nuño Valenzuela - China search-market & cyber security, Search Congress 2011Nuño Valenzuela - China search-market & cyber security, Search Congress 2011
Nuño Valenzuela - China search-market & cyber security, Search Congress 2011
 
Chinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdfChinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdf
 
The great chinese firewall
The great chinese firewallThe great chinese firewall
The great chinese firewall
 
The internet of china in the world
The internet of china in the worldThe internet of china in the world
The internet of china in the world
 
The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State Filter
 
State of the Internet
State of the InternetState of the Internet
State of the Internet
 
Open Data at the Rebellious Media Conference
Open Data at the Rebellious Media ConferenceOpen Data at the Rebellious Media Conference
Open Data at the Rebellious Media Conference
 
"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals
 
As a platform for unorganised individual Chinese expression, how is today’s i...
As a platform for unorganised individual Chinese expression, how is today’s i...As a platform for unorganised individual Chinese expression, how is today’s i...
As a platform for unorganised individual Chinese expression, how is today’s i...
 
Policy primer
Policy primerPolicy primer
Policy primer
 

Recently uploaded

Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...lizamodels9
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 

Recently uploaded (20)

Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 

China's internet policies and regulations

  • 1. INTERNET POLICIES AND REGULATIONS IN CHINA COMM_2383: NEW MEDIA NEW ASIA - GROUP IV - BRYAN URBSAITIS - ASSIGNMENT 2_TEAM PROJECT - DUE & SUBMISSION DATE: 07/08/2017 Tran Quoc Khanh - s3575466 Nguyen Thi Tuyet Mai - s3618989 Nguyen Luong Cao Nhan - s3634660 Mai Trung Nghia - s3594475
  • 2. T A B L E O F C O N T E N T Internet architecture and infrastructure Digital copyright laws and practices Privacy and surveillance 1 Content regulation and filtering 2 3 4 5 6 Introduction Conclusion and Prediction
  • 3. 1. I N T R O D U C T I O N
  • 4.
  • 5. 2008 Largest population on the internet 2015 649 million users 2016 50% of China’s population had internet connectivity ( China Power 2016 )
  • 6. The growth of mobile internet 80%Use of smartphones and tablets to connect ( CNN 2015 )
  • 7. 2. A R C H I T E C T U R E
  • 8. ( OWNED BY PRC ) http://slideplayer.com/slide/6250936/
  • 9. 2. I N F R A S T R U C T U R E
  • 10. SOURCE ADDRESS VALIDATION ARCHITECTURE BELT AND ROAD INITIATIVE BACKBONE IPv6 ( Vamien 2013 ) ( China Daily 2016 ) ( Sunny 2013 )
  • 11. 3. D I G I T A L C O P Y R I G H T L A W S A N D P R A C T I C E S
  • 12. WHAT IS “COPYRIGHT”? A form of INTELLECTUAL PROPERTY RIGHTS and PROTECTION (Hungarian Intellectual Property Office, 2015) https://www.bing.com
  • 14. 7 September 1990 DATE OF TEXT 1 January 1991 ENTRY TO FORCE 1 April 2010 LAST AMENDMENT (Wipo 2010)
  • 15. I N T H E P A S T 1949 Using Soviet model 1978 Implementing the reform and opening policy “A book taken from another was not a stolen book” (Wei 2017)
  • 16. Berne Convention The Universal Copyright Convention The Universal Copyright Convention nen.wikipedia.org http://www.ibna.ir http://www.simplynotes.in
  • 17. The copyright arises in China as soon as an original work is created, even in most cases where the work is created outside of China (China IPR Helpdesk 2012) http://www.china-ihelpdesk.eu/
  • 18. A T T H E P R E S E N T Copyrights that are projected under the Copyright Law in China Publication Authorship Exhibition Broadcast or cinema screening Communication through information network Presentation Other rights to be enjoyed by copyright owners
  • 19. The FACT that…. 90% 456 million Music and literature copyright infringement is widely regarded as one of the highest in the world (Chiara 2015) https://www.bing.com
  • 20. The FACT that…. 1 billion dollars (Chiara 2015) www.bing.com
  • 21. 3. T H E G O V E R N M E N T ‘ S P R A C T I C E S
  • 22. - Authorising the copyright administration - Raising the amount of penalty - Specialising intellectual property divisions (Chiara 2015)
  • 23. 4. P R I V A C Y
  • 24. Zhang Xinbao: “privacy is a legal right, by which citizens” Wang Liming: ““enjoyed by a person” Variety Relationship Human need Self-evaluation
  • 25. 4. S U R V E I L L A N C E
  • 26. Chinese cafes, hotels and other businesses are asked to set up surveillance technology ENHANCE THE SECURITY BREAK CRIMINAL CASES thedailysheeple.com
  • 27. 4. C O N T E N T R E G U L A T I O N S A N D F I L T E R I N G
  • 28. The Universal Copyright Convention CHINA’S GREAT FIREWALL http://thatbluebook.com.ng
  • 29. WHAT IS CHINA’S GREAT FIREWALL? - A combination of technological and legislative action - Control, regulate and censor Chinese domestic Internet - The size and sophistication of the Chinese government's program Garry, Jennifer & Margaret, 2013
  • 30. CHINA’S GREAT FIREWALL These actions include but not limited to: ➢ Criminalizing certain online speech and activities. ➢ Blocking and banning selected websites, news outlets, applications and softwares. ➢ Filtering out keywords in search engine results. ➢ Arresting journalists, activists, reporters and bloggers. ➢ Limiting cross-border internet traffic via IP or URL filtering.
  • 31. CHINA’S GREAT FIREWALL ORIGIN 2003 Golden shield project - Security management, criminal information - Supervisor information, traffic management information
  • 32. HOW THE CCP CENSORED THE INTERNET? Packet filtering Connection reset Distributed Denial of Service attacks (DDOS)
  • 33. BLOCKED IN CHINA What on the Internet is blocked in China ? http://www.bbc.com/news/worl d-asia-china-23094994
  • 34. BLOCKED IN CHINA What on the Internet is blocked in China ? http://www.bbc.com/news/worl d-asia-china-23094994
  • 35. BLOCKED IN CHINA - POLITICAL “COMMUNISM” “DEMOCRACY” http://www.bbc.com/news/worl d-asia-china-23094994
  • 36. BLOCKED IN CHINA - POLITICAL “4th June, 1989”, “Tiananmen square protest”, “Tank Man” (Source: Wikipedia. Image by Widener) “Tibet Independence”, “Dalai Lama”, “Taiwan Independence”.
  • 37. BLOCKED IN CHINA - RELIGIOUS http://www.bbc.com/news/worl d-asia-china-23094994
  • 38. BLOCKED IN CHINA - MEDIA Most of Google, Yahoo, Twitter and Facebook are blocked in China Banning of VPN applications Hollywood censorship http://thesocialmediamonthly.com
  • 39. 6. C O N C L U S I O N A N D P R E D I C T I O N
  • 40. CHINA’S INTERNET IS NOT FREE The chilling effect on private and public discussion, particularly online, generated by cybersecurity and foreign NGO laws. Increased internet surveillance. Heavy sentences handed down to human rights lawyers, microbloggers, grassroots activists, and religious believers.
  • 41. 7. R E F E R E N C E S
  • 42. - Branigan, T 2011, “China Boosts Internet Surveillance”, [online] The Guardian, Viewed: 07 August 2017, <https://www.theguardian.com/world/2011/jul/26/china-boosts-internet-surveillance> - Chiara, F 2015, “What you need to know about copyright law in China”, D’Andrea & Partners, viewed 04 August 2017, <http://www.dandreapartners.com/what- you-need-to-know-about-copyright-law-in-china/>. - China IPR Helpdesk 2012, “Copyright Protection in China, a guide for European SMEs”, China IPR, viewed 04 August 2017, <http://www.china- iprhelpdesk.eu/sites/all/docs/publications/EN_Copyright_guide_Aug_2010.pdf>. - China pushing to build internet infrastructure for Belt and Road Initiatives. (2017). China Daily. [online] Available at: http://www.chinadaily.com.cn/business/3rdWuzhenWorldInternetConference/2016-11/19/content_27428755.htm [Accessed 6 Aug. 2017]. - Hungarian Intellectual Property Office 2015, “Definition of Copyright”, Hungarian Intellectual Property Office, viewed 01 August 2017, <https://www.sztnh.gov.hu/en/copyrights-and-related-rights/basics/definition-of-copyright>. - King, G, Pan, J & Roberts, M.E, 2013, “How Censorship in China Allows Government Criticism but Silences Collective Expression”,The American Political Science Review, Vol. 107, No. 2, pp. 326, viewed 3rd August 2017, <http://dx.doi.org.ezproxy.lib.rmit.edu.au/10.1017/S0003055413000014>. - Limer, E. (2013). China's Internet Architecture Gives the Rest of Us a Run for Our Money. [online] Gizmodo.com. Available at: http://gizmodo.com/5989809/chinas-internet-architecture-gives-the-rest-of-us-a-run-for-our-money [Accessed 6 Aug. 2017]. - McKalin, V. (2017). China's Internet Architecture Puts Everyone Else to Shame. [online] Mobile & Apps. Available at: http://www.mobilenapps.com/articles/7856/20130311/chinas-internet-architecture-puts-everyone-shame.htm [Accessed 6 Aug. 2017]. - McKirdy, E. (2015). China's online users more than double entire U.S. population. CNN, [online] p.1. Available at: http://edition.cnn.com/2015/02/03/world/china-internet-growth-2014/index.html [Accessed 6 Aug. 2017]. - PUIU, T. (2017). China's next-generation internet infrastructure tightens security. [online] ZME Science. Available at: http://www.zmescience.com/research/technology/chinas-next-generation-internet-infrastructure-tightens-security/ [Accessed 6 Aug. 2017]. - Wang, H. & SpringerLink, 2011. Protecting Privacy in China A Research on China's Privacy Standards and the Possibility of Establishing the Right to Privacy and the Information Privacy Protection Legislation in Modern China, Berlin, Heidelberg: Springer Berlin Heidelberg : Imprint: Springer., Viewed: 7 August 2017, <https://link-springer-com.ezproxy.lib.rmit.edu.au/content/pdf/10.1007%2F978-3-642-21750-0.pdf> - Wei, J 2007, “Evaluating China’s Copyright protection situation”, The Journal of China Universities of Posts and Telecommunications, vol. 14, sub. 1, pp. 1-3, <http://www.sciencedirect.com/science/article/pii/S100588850860028X>. - Wipo 2010, “Copyright law of the People’s republic of China of February 26, 2010”, Wipo Lex, viewed 01 August 2017, <http://www.wipo.int/wipolex/en/details.jsp?id=6062>.
  • 43. THANK YOU FOR YOUR LISTENING