SlideShare a Scribd company logo
Reproduced with permission from Privacy & Security Law Report, 17 PRA 194, 10/10/2017. Copyright ஽ 2017 by
The Bureau of National Affairs, Inc. (800-372-1033) http://www.bna.com
Cybersecurity
Strengthening the Great Cyber-Wall of China—An Effort in Protecting
the Masses in Cyberspace or Keeping Out the Foreigners?
China’s Cybersecurity Law
China’s recent cybersecurity laws have been cited by the government as internet and per-
sonal data protection milestones, while being viewed with suspicion by foreign multination-
als as potentially increasing compliance costs. The one certain thing is that the Chinese gov-
ernment is succeeding in exercising more control and oversight over cyberspace, the au-
thors write.
BY BENJAMIN CHEONG AND TERRANCE TONG
Introduction
The flurry of legislative reforms in China in recent
months saw the recurring theme of national security
dominating the Chinese cybersecurity agenda. Extend-
ing the notion of national security to the cyberspace, re-
cent cybersecurity-related legislative developments set
the stage for China’s increasingly complex web of cy-
bersecurity regulations and demonstrate the govern-
ment’s resolve to tighten its control over the internet
and cyber activities. These laws have been lauded by
Beijing as milestones in the protection of China’s cyber-
space and personal data of Chinese citizens, while be-
ing viewed with suspicion by foreign multinational
companies as potentially increasing compliance costs,
leaving them vulnerable to industrial espionage and
giving Chinese companies an unfair advantage.
This article will briefly analyse the scope of these
newly promulgated laws and their relevant implement-
ing regulations, how they are likely to be implemented
and address the impact of these laws and regulations
for multinationals operating in or seeking to expand
their footprint into China.
The Complicated Web of
Cyber-Govenance
The Anti-Terrorism Law The Anti-Terrorism Law
(ATL), which came into effect on Jan. 1, 2016, was in-
troduced to ‘‘prevent and punish terrorist activities,
strengthen counter-terrorism efforts and to safeguard
the security of the state, the public and the lives and
properties of the people’’. Although the ATL seeks pri-
marily to safeguard against terrorism and prevent ter-
rorist activities generally, certain provisions of the ATL
imposes statutory obligations specifically on telecom-
munications operators and internet service providers.
At the outset, it should be noted that the terms ‘‘tele-
communications operators’’ and ‘‘internet service pro-
viders’’ are not defined within the ATL, and can poten-
tially take on a wide enough interpretation to include
any companies or businesses providing telecommunica-
tions, internet or any ancillary services.
Under Article 18 of the ATL, telecommunications op-
erators and internet service providers have a specific
Benjamin Cheong is a partner as Rajah Tann
Singapore LLC in Singapore where he is a
member of the technology, media, and tele-
communications practice and data protection
and cybersecurity practice.
Terrance Tong is a trainee solicitor at PK
Wong & Associates LLC in Singapore.
COPYRIGHT ஽ 2017 BY THE BUREAU OF NATIONAL AFFAIRS, INC. ISSN 1538-3423
Privacy and Security
Law Report®
obligation to ‘‘provide technical support assistance to
public security organs and state security organs’’ in the
course of prevention and investigation of terrorist ac-
tivities.
Article 19 of the ATL also requires these companies
to implement network security and information content
monitoring systems, so as to actively monitor and pre-
vent the dissemination of information with terrorist or
extremist content. This is coupled with the obligation to
disclose such content to the relevant state authorities
and to conduct user identifications before provision of
services.
Non-compliance with the ATL could also attract stiff
fines of up to 500,000 RMB ($75,270) and even personal
liabilities for managers or personnel who are respon-
sible for their companies’ contravention of the ATL,
which may result in such persons being detained.
In light of the broad requirements of the ATL, there
are wide ranging implications beyond the potential cost
of compliance. One such implication would be that mul-
tinational companies operating in China will have to
bear the risk of their valuable intellectual property
rights being compromised when compelled under the
ATL to provide technical assistance in the form of dis-
closure of technical data and decryption technology.
The Chinese government has, however, given the re-
assurance that this legislation ‘‘accords with the actual
work needed to fight terrorism which is basically in line
with what other major countries in the world do. This
will not affect the normal operation of tech companies
and they have nothing to fear in terms of having ‘‘back-
doors’’ installed or losing intellectual property rights’’.
This will remain to be seen once the Chinese authorities
start enforcing the ATL.
The National Intelligence Law In the same vein, the
National Intelligence Law (IL), which came into effect
on June 28, 2017, seeks to bolster national intelligence
efforts for the purposes of preserving national interests
and security. However, unlike the ATL which imposes
statutory obligations on telecommunications operators
and internet service providers in China, the IL gives the
relevant authorities sweeping powers to monitor both
foreign and domestic individuals and companies.
More specifically, Articles 10 to 17 of the IL confers
upon Chinese intelligence institutions extensive powers
in the course of carrying out intelligence efforts. These
institutions are authorized to use all necessary means to
carry out espionage, domestically and abroad, and to
compel relevant organizations or citizens to provide
necessary assistance in the course of carrying out such
efforts.
The IL further empowers relevant intelligence institu-
tions to, amongst other things:
(i) enter relevant restricted areas and venues, learn
from and question relevant institutions, organizations,
and individuals;
(ii) use or lawfully request, the use of transportation,
communications tools, premises and/or buildings be-
longing to any state organs, organizations or individu-
als; and
(iii) when necessary, set up relevant work sites, equip-
ment, and facilities.
As with the ATL, there is a real risk that valuable in-
tellectual property rights such as trade secrets belong-
ing to companies operating in China may be compro-
mised if it is assessed by the authorities to be necessary
for the purposes of carrying out espionage. Individuals
who are in violation of the IL or found to have ob-
structed national intelligence efforts may, under Article
28, be detained up to 15 days.
Companies operating in China may find it a relief to
note that Articles 26 and 27 of the IL provide for mea-
sures that aim to safeguard against the abuse of powers,
requiring intelligence institutions to put in place proper
procedures and channels for anonymous complaints of
abuses of power. However, the practical effect of the
measures will in a large part also depend on its imple-
mentation, and it remains to be seen if it will in fact
achieve its stated purpose.
The Cybersecurity Law The Cybersecurity Law (CSL),
which came into effect on June 1, 2017, is one of the
most important and comprehensive piece of legislation
that seeks to consolidate China’s regulation of cyber ac-
tivities. The primary purpose of the legislation is to
safeguard China’s cyberspace sovereignty, national se-
curity and the societal public interest. This is to be
achieved through the CSL’s focus on ‘‘personal’’ and
‘‘critical’’ data, and a tiered system of network security
provisions.
Various data privacy and cybersecurity obligations
are imposed on ‘‘network operators,’’ which is broadly
defined as ‘‘network owners, managers, and network
service providers’’ of ‘‘systems comprised of computers
and other information terminals and related equip-
ment’’ that gather, store, transmit, exchange, and pro-
cess information’’. This definition not only covers tele-
communication, wireless communication, and internet
service providers but could ostensibly cover every orga-
nization or business that owns or operates IT networks
in China.
The general cybersecurity obligation is found under
Article 21 of the CSL which stipulates key duties that
network operators are to perform. This includes formu-
lating internal security management systems, adopting
appropriate technological measures to prevent viruses
and malwares, monitoring of network operational sta-
tus, and storage of network logs for at least six months.
Chapter IV of the CSL also governs and sets out the rule
on usage, collection and transfer of personal data be-
longing to Chinese citizens.
In addition, the CSL imposes three specific sets of ob-
ligations:
(i) Restrictions on network products and services;
(ii) Obligations imposed on Network Operators; and
(iii) Obligations imposed on Critical Information In-
frastructure Operators (CII Operators).
Restrictions on Network Products and Services
All ‘‘critical network equipment’’ and ‘‘specialised
network security products’’ must comply with
government-issued standards of security. Further, un-
der Article 23, these network products and services
must be subject to an inspection and certification pro-
cess before the sale or provision of the products or
services.
These terms are not specifically defined in the CSL.
However, a catalogue detailing specifically which prod-
ucts and services would be subject to Articles 22 and 23
was published jointly on June 9, 2017 (the Catalogue)
by the Cyberspace Administration of China (CAC), the
Ministry of Industry and Information Technology
(MIIT), the Ministry of Public Security (MPS), and the
Certification and Accreditation Administration (CNCA).
2
10-10-17 COPYRIGHT ஽ 2017 BY THE BUREAU OF NATIONAL AFFAIRS, INC. PVLR ISSN 1538-3423
The Catalogue sets out the first batch of equipment and
products that are covered, which includes very common
items such as ‘‘routers, switches, servers (rack-
mounted), and the dedicated products for cybersecurity
include integrated data backup, firewall (hardware),
web application firewall, intrusion detection system, in-
trusion defense system, security isolation and informa-
tion exchange products (gatekeepers), anti-spam mail
products, network audit systems, network vulnerability
scanning product, security data system, and website re-
covery products (hardware)’’.
Such requirements, however, have raised legitimate
concerns regarding (a) the extent to which information
technology (hardware and software) products must be
‘‘certified’’ for security by the Chinese authorities be-
fore they can be sold in China; (b) whether the certifi-
cation would require companies to provide the source
code and other intellectual property relating to their
products; and (c) whether these requirements would
create market barriers to entry for products offered by
non-Chinese companies.
Obligations Imposed on Network Operators
Whilst a slew of obligations is imposed on network
operators, it is Article 28 of the CSL which raises the
red flag. The provision compels network operators to
provide ‘‘technical support and assistance’’ to state
authorities. As with both the ATL and IL, this may po-
tentially include the granting of state access to confi-
dential data, in the course of the preservation of na-
tional security or investigations of crimes. The cir-
cumstances under which network operators may be
compelled to provide technical assistance remains
largely unclear.
On the other hand, one of the most important im-
provements to the overall legal protection of personal
information is brought about by the CSL. This is be-
cause China does not have an overarching data protec-
tion law, and the CSL contains very detailed data pro-
tection obligations which bind network operators. In
particular, network operators are required:
(i) to inform and obtain consent from the users when
collecting their personal information;
(ii) to collect and use personal information in a legal
and proper manner;
(iii) not to steal or use other illegal means to obtain
personal information;
(iv) to gather and store personal information in ac-
cordance with the law, administrative regulations and
their agreements with users;
(v) not disclose, tamper with or destroy collected
personal information;
(vi) to allow users to request that their personal in-
formation is destroyed in circumstances where the net-
work operator has violated the laws; and
(vii) ensure that all personal information obtained is
kept confidential.
Additional Obligations Imposed on CII Operators
The CSL adopts a tiered regulatory approach, which
means that all obligations imposed on CII Operators
will be in addition to the obligations generally im-
posed on network operators. CII Operators are de-
fined broadly as operators that provide services that,
if lost or destroyed, would endanger China’s national
security and national welfare. The CSL elaborates CII
as companies operating, or providing services, in the
following sectors: public telecommunications and in-
formation services, power and energy, transportation,
irrigation, finance, public services, and e-government.
Specific operational security obligations are set out in
Articles 31 to 39 and are mandatory for CII Operators.
The Chinese government also actively encourages all
network operators to voluntarily comply with these ad-
ditional obligations. Article 34, for instance, requires
the establishment and maintenance of a higher level of
data security measures. This includes, amongst others,
obligations such as the setting up of specialised security
management bodies, periodically conducting network
security technical training and education, and conduct-
ing disaster recovery backups. However, the specific
scope of these measures is contemplated to be set out
by implementing regulations, which have not yet been
released.
Penalties
Chapter VI of the CSL sets out in detail the penalties
for contravention and non-compliance. Network op-
erators and CII Operators in breach of their obliga-
tions may be liable for a fine of up to 100,000 RMB
($150,540) and directly responsible managers or per-
sonnel may also be personally liable for a fine of up to
100,000 RMB ($150,540). Article 67 of the CSL also
criminalises the establishment of website or commu-
nications group for the commission of unlawful and
criminal activities, allowing detention of up to 5 days
and/or a fine of up to 15,000 RMB ($2,258), and where
circumstances are deemed serious, a detention period
of up to 15 days and/or a fine of up to 500,000
($75,270).
Measures on Security Review of Network Products
and Services CII Operators who are procuring services
or network products that could potentially have an im-
pact on China’s national security will also have to un-
dergo a separate procurement-related cybersecurity re-
view as mandated under Article 35 of the CSL.
The Measures on Security Review of Network Prod-
ucts and Services (the Security Review Measures),
which took effect from 1 June 2017, offering guidance
on how a security review will be conducted has been
published by the CAC. The Security Review Measures
stipulate that all important network products and ser-
vices which are procured for use in network systems
that concern national security will be subject to a secu-
rity review.
Draft Measures on Security Assessment of Outbound
Transmission of Personal Information and Important
Data Additionally, CII Operators are subject to a data lo-
calisation obligation to store personal information of
Chinese citizens or other important data gathered as a
result of operations conducted within Chinese territo-
ries. Article 37 of the CSL further restricts data export
and stipulates that such data shall not be transferred
out of China unless ‘‘truly necessary’’ for business
needs, and subject to appropriate security assessment
by the relevant state departments.
On May 19, 2017, the CAC released a further revised
draft Measures on Security Assessment of Outbound
Transmission of Personal Information and Important
Data (Draft Outbound Transmission Measures).
In the Draft Outbound Transmission Measures, ‘‘per-
sonal information’’ is defined very broadly as ‘‘all the
information recorded in electronic form or otherwise,
which can be used, solely or together with other infor-
mation, to determine the identity of a natural person,
3
PRIVACY & SECURITY LAW REPORT ISSN 1538-3423 BNA 10-10-17
including but not limited to the name, date of birth, ID
card number, personal biometric information, address
and phone number of the natural person’’. ‘‘Outbound
Transmission’’ is defined as ‘‘providing overseas insti-
tutions, organizations and individuals with the personal
information and important data generated or collected
by network operators during their operation within the
territory of China’’.
A two-tier assessment procedure is envisaged under
the Draft Outbound Transmission Measures: self-
assessment and regulatory assessment.
Article 12 of the Measures requires the network op-
erators to conduct security assessment on the outbound
transmission of data at least once a year. In case of any
changes to the data receiver, any major changes to the
purpose, scope, quantity and type of the outbound
transmission of data, or any major security events of the
data receiver or the outbound transmission of data, an-
other security
assessment shall be conducted without delay.
The following issues should be considered when con-
ducting such security assessment:
(i) necessity of the outbound transmission of data;
(ii) personal information involved, including the
quantity, scope, type and sensitivity of personal infor-
mation, as well as whether the owner of personal infor-
mation agrees to transmit his personal information
abroad;
(iii) important data involved, including the quantity,
scope, type and sensitivity of important data;
(iv) security protection measures and capability of
the data receiver, as well as the network security envi-
ronment of the country or region where the date re-
ceiver is located;
(v) risks of leakage, damage, tampering and abuse of
the data after being transmitted abroad and further
transferred;
(vi) risks to national security, social and public inter-
ests, and personal legitimate interests arising from the
outbound transmission of data and gathering the out-
bound data; and
(vii) other important matters to be assessed.
The Draft Outbound Transmission Measures provide
that a network operator shall report to its industrial au-
thority or regulator to arrange for security assessment
to determine whether the data shall be allowed to trans-
mitted abroad in the following circumstances:
(i) the data to be transmitted abroad contains or con-
tains in aggregate more than 500,000 users’ personal in-
formation;
(ii) the quantity of the data to be transmitted abroad
is more than 1,000 gigabytes;
(iii) the data to be transmitted abroad contains data
relating to nuclear facilities, chemical biology, defense
industry, population and health, as well as the data of
large-scale project activities, marine environment and
sensitive geographic information etc.;
(iv) the data to be transmitted abroad contains sys-
tem vulnerabilities, security protection and other net-
work security information of critical information re-
garding to the infrastructure;
(v) an infrastructure operator of the critical informa-
tion provides personal information and important data
abroad; or
(vi) other data which may affect national security,
and social and public interests, and are necessary for
assessment as determined by the industrial authority or
regulator.
Under the following three circumstances, the data shall
not be transmitted abroad:
(i) the outbound transmission of personal informa-
tion fails to be approved by the owner of personal infor-
mation, or may jeopardise personal interests;
(ii) the outbound transmission of data causes secu-
rity risks to the nation’s politics, economy, technology
and national defense, which may affect national secu-
rity and jeopardise social and public interests; or
(iii) other data which are prohibited from being
transmitted abroad as determined by relevant authori-
ties.
While the Draft Outbound Transmission Measures are
helpful to clarify that outbound transmission of data is
allowed if such data transmission is approved by the
user, and if it is necessary and carries no harm to the
national security and social and public interests, the
fact that the ambiguous terms ‘‘other data which may
affect national security, and social and public interests’’
and Љ other data which are prohibited from being trans-
mitted abroad as determined by relevant authorities’’
contained in these measures still give rise to unpredict-
ability and business uncertainty.
Critiques of the Laws
Generally, the laws grant extensive regulatory pow-
ers to the Chinese government and its organs. The
sheer scope of the law, coupled with the vague and am-
biguous drafting, renders compliance incredibly diffi-
cult. The broad drafting of the laws has been raised as
a key concern for business risk and uncertainty, par-
ticularly for foreign multinational companies operating
in China.
Firstly, the invasive measures and vague wording of
the laws sparks fear that the Chinese authorities may
compel foreign multinational companies to hand over
confidential data or open back doors within their prod-
uct offerings in the name of ‘‘national security’’ or
‘‘counter terrorism’’. It is submitted that the law goes
beyond what is necessary to secure the internet and fur-
ther tightens China’s already heavily regulated cyber
space.
Each of the laws discussed above contains provisions
allowing state authorities to compel specified entities to
allow state access to confidential data and provide tech-
nical assistance (presumably such as decryption) to
state authorities, subjecting companies to close moni-
toring and surveillance. While the laws will undoubt-
edly strengthen cybersecurity, the risk of the laws being
used as a tool for achieving objectives that are merely
tangential to cybersecurity remains real.
Secondly, the CSL and its implementing regulations
present an indirect form of protectionism in favor of lo-
cal Chinese companies. The restriction on network
products and services entail high compliance cost re-
quiring foreign companies and manufactures seeking to
provide such products and services to modify existing
offerings to comply with the government issued stan-
dards. There is also significant risk that foreign prod-
ucts or services that are uncertified or unable to meet
the issued standards could be completely cut off from
the Chinese market, in favor of local companies.
Similarly, the data-localisation and data export obli-
gation effectively forces foreign companies to store data
in China, which can result in a duplication of services
4
10-10-17 COPYRIGHT ஽ 2017 BY THE BUREAU OF NATIONAL AFFAIRS, INC. PVLR ISSN 1538-3423
and high operational cost. The importance of data in
this global economy is indubitably clear. Global compa-
nies are increasingly using such data analytics to under-
stand customers’ preferences, streamline internal busi-
ness processes and increase efficiency. Restrictive data
policies will make data analytics more expensive, put-
ting foreign companies at a disadvantage as compared
to local companies, since these companies will no lon-
ger be able to conduct data analytics cost-effectively on
a global basis. In order to comply, foreign companies
have the option of contracting with local cloud service
providers in China or build their own data centers, ei-
ther of which involves high outlays. This requirement
benefits largely local Chinese companies offering cloud
and storage services such as Alibaba Group Holding
Ltd.’s AliYun, but is particularly onerous for small-
medium sized enterprises that do not possess the deep
pockets to comply.
Thirdly, from a human rights perspective, elements
of the laws are said to further solidify the government’s
control over the Internet, which is already subject to the
country’s Great Firewall. Elements such as the crimi-
nalisation of the use of the Internet for unlawful or
criminal activities, and the obligation on operators to
prevent the dissemination of ‘‘terrorist’’ or ‘‘extremist’’
content are likely to further restrict online freedom in
China. Noting that the laws also provide for personal li-
abilities to be imposed on directly responsible manag-
ers or personnel in a wide array of circumstances, the
Chinese government would effectively have another
tool to suppress and crack down on dissidents.
Compliance With These Laws Moving forward, for-
eign companies will have to conduct a cost and benefit
analysis to decide whether it is worthwhile to continue
operating in, or expand operations into, China. Not-
withstanding the seemingly insurmountable task of
compliance, the Chinese market and its promise for
growth is far too huge to be ignored.
At the outset, it would be prudent for foreign compa-
nies operating in China to assess whether they are sub-
ject to the relevant laws and ancillary regulations, and
determine the extent of compliance required. This will
require foreign companies to consider whether they fall
under an enforcement priority. As a rule of the thumb,
given the broad drafting and vague definitions em-
ployed in the laws, companies in the technology-related
sectors should take the stance that it will more likely
than not be subject to the obligations.
Preparing for compliance will require a review of cur-
rent business practices and internal processes, includ-
ing data localisation, and a security review. Foreign
companies already operating in China should have been
accustomed to restrictive internet controls given the re-
quirements imposed under the Golden Shield Project
(known as China’s Great Firewall). These companies
should also take the opportunity to assess potential
gaps in their existing cybersecurity policies and proce-
dures. This may include taking further measures for
data categorisation and segregation, server localisation,
review of its existing standard terms and conditions of
service offerings, and putting in place appropriate inter-
nal cybersecurity policies amongst others. The compli-
ance route will inevitably involve foreign companies in-
curring significant cost outlays, particularly if the com-
pany requires major overhaul to its practices and
processes.
Large multinational companies are already moving to
comply with the laws with Apple announcing its plans
to build its first Chinese data center in partnership with
a local Chinese data management company, while Ama-
zon.com Inc. and Microsoft Corp. already have data
centers in China. Other companies such as Airbnb Inc.
and South Korean company, AmorePacific Corp., are
either shifting data collected from its Chinese opera-
tions to local Chinese servers, or relocating its
e-commerce systems to China.
Foreign multinational companies should also be
minded to recognise that the Chinese legal systems are
fundamentally different from the Anglo-Saxon legal
system familiar to most in the Western world. A plain
reading of the relevant laws and implementing regula-
tions will not be sufficient to understand or determine
the precise ambit of the obligations. Rather, the key to
compliance is to understand the government’s motiva-
tions and regulatory approach. This will require con-
stant strategic engagement with the relevant state au-
thorities to help understand and mitigate the impact of
the laws.
Conclusion
Short of the detailed implementing regulations that
have yet been fully released by the relevant state au-
thorities, the true overall impact of the laws remains to
be seen. Guidelines and implementing regulations will
continue to be rolled out as state authorities look to-
wards facilitating the implementation of cybersecurity
measures. While the state of cybersecurity regulation in
China remains in a flux, one thing that is certain is that
the Chinese government is succeeding in its desire to
exercise more control and oversight over the cyber-
space.
BY BENJAMIN CHEONG AND TERRANCE TONG
To contact the editor responsible for this story: Don-
ald Aplin at daplin@bna.com
5
PRIVACY & SECURITY LAW REPORT ISSN 1538-3423 BNA 10-10-17

More Related Content

What's hot

Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of Pakistan
Shahzaib Mahesar
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lanka
Vishni Ganepola
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
Md.Azizul hakim Anik
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
Russ Dutcher, CBRM,CORM,CDPS
 
ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)
franciscronje
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
Shahid Jamal Tubrazy
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
Nilima Tariq
 
Cyber law
Cyber lawCyber law
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
Jim Ayson
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
Singhania2015
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 
electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)
Alison - Free Online Learning
 
Cyber law
Cyber lawCyber law
it act
it act it act
it act
9535814851
 
It act 2000
It act 2000It act 2000
It act 2000
Jaipal Dhobale
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
Avinash Katariya
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
anthony4web
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
Yogendra Wagh
 
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESSPRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
pattok
 

What's hot (20)

Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of Pakistan
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lanka
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
Cyber law
Cyber lawCyber law
Cyber law
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)
 
Cyber law
Cyber lawCyber law
Cyber law
 
it act
it act it act
it act
 
It act 2000
It act 2000It act 2000
It act 2000
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESSPRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
PRIVACY AND SECURITY POLICIES THAT ENCOURAGE EBUSINESS
 

Similar to Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Masses in Cyberspace or Keeping Out the Foreigners?

What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore?
Abraham Vergis
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
Joe Orlando
 
Cyber law and cyber-crime
Cyber law and cyber-crimeCyber law and cyber-crime
Cyber law and cyber-crime
Russ Dutcher, CBRM,CORM,CDPS
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
Palavesa Krishnan
 
Spice Route Legal Data Protection & Privacy Update
Spice Route Legal Data Protection & Privacy UpdateSpice Route Legal Data Protection & Privacy Update
Spice Route Legal Data Protection & Privacy Update
Mathew Chacko
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
BharatMunjal4
 
Network service providers retain records for various lengths of time.pdf
Network service providers retain records for various lengths of time.pdfNetwork service providers retain records for various lengths of time.pdf
Network service providers retain records for various lengths of time.pdf
eyevision3
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
David Cunningham
 
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security EventIsrael Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
Barry Schuman
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
Neeraj Aarora
 
What are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdfWhat are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdf
Riley Claire
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internet
guesta5c32a
 
Sookman primetime presentation
Sookman primetime presentationSookman primetime presentation
Sookman primetime presentation
bsookman
 
Cyber security laws
Cyber security lawsCyber security laws
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
Mahua Narayan
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
pronab Kurmi
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
Lance Michalson
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
Aldrin SuperGo
 

Similar to Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Masses in Cyberspace or Keeping Out the Foreigners? (20)

What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore?
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 
Cyber law and cyber-crime
Cyber law and cyber-crimeCyber law and cyber-crime
Cyber law and cyber-crime
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
 
Spice Route Legal Data Protection & Privacy Update
Spice Route Legal Data Protection & Privacy UpdateSpice Route Legal Data Protection & Privacy Update
Spice Route Legal Data Protection & Privacy Update
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
Network service providers retain records for various lengths of time.pdf
Network service providers retain records for various lengths of time.pdfNetwork service providers retain records for various lengths of time.pdf
Network service providers retain records for various lengths of time.pdf
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security EventIsrael Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
 
What are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdfWhat are the new laws under Canada Digital Privacy Act.pdf
What are the new laws under Canada Digital Privacy Act.pdf
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internet
 
Sookman primetime presentation
Sookman primetime presentationSookman primetime presentation
Sookman primetime presentation
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 

Recently uploaded

V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
15e6o6u
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
Parsons Behle & Latimer
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdfPedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
SunsetWestLegalGroup
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations DemystifiedSafeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
PROF. PAUL ALLIEU KAMARA
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
15e6o6u
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
RoseZubler1
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf
ssuser0dfed9
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer ComplaintsIntegrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
seoglobal20
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptxAN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
schubergbestrong
 

Recently uploaded (20)

V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdfPedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations DemystifiedSafeguarding Against Financial Crime: AML Compliance Regulations Demystified
Safeguarding Against Financial Crime: AML Compliance Regulations Demystified
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer ComplaintsIntegrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaints
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptxAN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
 

Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Masses in Cyberspace or Keeping Out the Foreigners?

  • 1. Reproduced with permission from Privacy & Security Law Report, 17 PRA 194, 10/10/2017. Copyright ஽ 2017 by The Bureau of National Affairs, Inc. (800-372-1033) http://www.bna.com Cybersecurity Strengthening the Great Cyber-Wall of China—An Effort in Protecting the Masses in Cyberspace or Keeping Out the Foreigners? China’s Cybersecurity Law China’s recent cybersecurity laws have been cited by the government as internet and per- sonal data protection milestones, while being viewed with suspicion by foreign multination- als as potentially increasing compliance costs. The one certain thing is that the Chinese gov- ernment is succeeding in exercising more control and oversight over cyberspace, the au- thors write. BY BENJAMIN CHEONG AND TERRANCE TONG Introduction The flurry of legislative reforms in China in recent months saw the recurring theme of national security dominating the Chinese cybersecurity agenda. Extend- ing the notion of national security to the cyberspace, re- cent cybersecurity-related legislative developments set the stage for China’s increasingly complex web of cy- bersecurity regulations and demonstrate the govern- ment’s resolve to tighten its control over the internet and cyber activities. These laws have been lauded by Beijing as milestones in the protection of China’s cyber- space and personal data of Chinese citizens, while be- ing viewed with suspicion by foreign multinational companies as potentially increasing compliance costs, leaving them vulnerable to industrial espionage and giving Chinese companies an unfair advantage. This article will briefly analyse the scope of these newly promulgated laws and their relevant implement- ing regulations, how they are likely to be implemented and address the impact of these laws and regulations for multinationals operating in or seeking to expand their footprint into China. The Complicated Web of Cyber-Govenance The Anti-Terrorism Law The Anti-Terrorism Law (ATL), which came into effect on Jan. 1, 2016, was in- troduced to ‘‘prevent and punish terrorist activities, strengthen counter-terrorism efforts and to safeguard the security of the state, the public and the lives and properties of the people’’. Although the ATL seeks pri- marily to safeguard against terrorism and prevent ter- rorist activities generally, certain provisions of the ATL imposes statutory obligations specifically on telecom- munications operators and internet service providers. At the outset, it should be noted that the terms ‘‘tele- communications operators’’ and ‘‘internet service pro- viders’’ are not defined within the ATL, and can poten- tially take on a wide enough interpretation to include any companies or businesses providing telecommunica- tions, internet or any ancillary services. Under Article 18 of the ATL, telecommunications op- erators and internet service providers have a specific Benjamin Cheong is a partner as Rajah Tann Singapore LLC in Singapore where he is a member of the technology, media, and tele- communications practice and data protection and cybersecurity practice. Terrance Tong is a trainee solicitor at PK Wong & Associates LLC in Singapore. COPYRIGHT ஽ 2017 BY THE BUREAU OF NATIONAL AFFAIRS, INC. ISSN 1538-3423 Privacy and Security Law Report®
  • 2. obligation to ‘‘provide technical support assistance to public security organs and state security organs’’ in the course of prevention and investigation of terrorist ac- tivities. Article 19 of the ATL also requires these companies to implement network security and information content monitoring systems, so as to actively monitor and pre- vent the dissemination of information with terrorist or extremist content. This is coupled with the obligation to disclose such content to the relevant state authorities and to conduct user identifications before provision of services. Non-compliance with the ATL could also attract stiff fines of up to 500,000 RMB ($75,270) and even personal liabilities for managers or personnel who are respon- sible for their companies’ contravention of the ATL, which may result in such persons being detained. In light of the broad requirements of the ATL, there are wide ranging implications beyond the potential cost of compliance. One such implication would be that mul- tinational companies operating in China will have to bear the risk of their valuable intellectual property rights being compromised when compelled under the ATL to provide technical assistance in the form of dis- closure of technical data and decryption technology. The Chinese government has, however, given the re- assurance that this legislation ‘‘accords with the actual work needed to fight terrorism which is basically in line with what other major countries in the world do. This will not affect the normal operation of tech companies and they have nothing to fear in terms of having ‘‘back- doors’’ installed or losing intellectual property rights’’. This will remain to be seen once the Chinese authorities start enforcing the ATL. The National Intelligence Law In the same vein, the National Intelligence Law (IL), which came into effect on June 28, 2017, seeks to bolster national intelligence efforts for the purposes of preserving national interests and security. However, unlike the ATL which imposes statutory obligations on telecommunications operators and internet service providers in China, the IL gives the relevant authorities sweeping powers to monitor both foreign and domestic individuals and companies. More specifically, Articles 10 to 17 of the IL confers upon Chinese intelligence institutions extensive powers in the course of carrying out intelligence efforts. These institutions are authorized to use all necessary means to carry out espionage, domestically and abroad, and to compel relevant organizations or citizens to provide necessary assistance in the course of carrying out such efforts. The IL further empowers relevant intelligence institu- tions to, amongst other things: (i) enter relevant restricted areas and venues, learn from and question relevant institutions, organizations, and individuals; (ii) use or lawfully request, the use of transportation, communications tools, premises and/or buildings be- longing to any state organs, organizations or individu- als; and (iii) when necessary, set up relevant work sites, equip- ment, and facilities. As with the ATL, there is a real risk that valuable in- tellectual property rights such as trade secrets belong- ing to companies operating in China may be compro- mised if it is assessed by the authorities to be necessary for the purposes of carrying out espionage. Individuals who are in violation of the IL or found to have ob- structed national intelligence efforts may, under Article 28, be detained up to 15 days. Companies operating in China may find it a relief to note that Articles 26 and 27 of the IL provide for mea- sures that aim to safeguard against the abuse of powers, requiring intelligence institutions to put in place proper procedures and channels for anonymous complaints of abuses of power. However, the practical effect of the measures will in a large part also depend on its imple- mentation, and it remains to be seen if it will in fact achieve its stated purpose. The Cybersecurity Law The Cybersecurity Law (CSL), which came into effect on June 1, 2017, is one of the most important and comprehensive piece of legislation that seeks to consolidate China’s regulation of cyber ac- tivities. The primary purpose of the legislation is to safeguard China’s cyberspace sovereignty, national se- curity and the societal public interest. This is to be achieved through the CSL’s focus on ‘‘personal’’ and ‘‘critical’’ data, and a tiered system of network security provisions. Various data privacy and cybersecurity obligations are imposed on ‘‘network operators,’’ which is broadly defined as ‘‘network owners, managers, and network service providers’’ of ‘‘systems comprised of computers and other information terminals and related equip- ment’’ that gather, store, transmit, exchange, and pro- cess information’’. This definition not only covers tele- communication, wireless communication, and internet service providers but could ostensibly cover every orga- nization or business that owns or operates IT networks in China. The general cybersecurity obligation is found under Article 21 of the CSL which stipulates key duties that network operators are to perform. This includes formu- lating internal security management systems, adopting appropriate technological measures to prevent viruses and malwares, monitoring of network operational sta- tus, and storage of network logs for at least six months. Chapter IV of the CSL also governs and sets out the rule on usage, collection and transfer of personal data be- longing to Chinese citizens. In addition, the CSL imposes three specific sets of ob- ligations: (i) Restrictions on network products and services; (ii) Obligations imposed on Network Operators; and (iii) Obligations imposed on Critical Information In- frastructure Operators (CII Operators). Restrictions on Network Products and Services All ‘‘critical network equipment’’ and ‘‘specialised network security products’’ must comply with government-issued standards of security. Further, un- der Article 23, these network products and services must be subject to an inspection and certification pro- cess before the sale or provision of the products or services. These terms are not specifically defined in the CSL. However, a catalogue detailing specifically which prod- ucts and services would be subject to Articles 22 and 23 was published jointly on June 9, 2017 (the Catalogue) by the Cyberspace Administration of China (CAC), the Ministry of Industry and Information Technology (MIIT), the Ministry of Public Security (MPS), and the Certification and Accreditation Administration (CNCA). 2 10-10-17 COPYRIGHT ஽ 2017 BY THE BUREAU OF NATIONAL AFFAIRS, INC. PVLR ISSN 1538-3423
  • 3. The Catalogue sets out the first batch of equipment and products that are covered, which includes very common items such as ‘‘routers, switches, servers (rack- mounted), and the dedicated products for cybersecurity include integrated data backup, firewall (hardware), web application firewall, intrusion detection system, in- trusion defense system, security isolation and informa- tion exchange products (gatekeepers), anti-spam mail products, network audit systems, network vulnerability scanning product, security data system, and website re- covery products (hardware)’’. Such requirements, however, have raised legitimate concerns regarding (a) the extent to which information technology (hardware and software) products must be ‘‘certified’’ for security by the Chinese authorities be- fore they can be sold in China; (b) whether the certifi- cation would require companies to provide the source code and other intellectual property relating to their products; and (c) whether these requirements would create market barriers to entry for products offered by non-Chinese companies. Obligations Imposed on Network Operators Whilst a slew of obligations is imposed on network operators, it is Article 28 of the CSL which raises the red flag. The provision compels network operators to provide ‘‘technical support and assistance’’ to state authorities. As with both the ATL and IL, this may po- tentially include the granting of state access to confi- dential data, in the course of the preservation of na- tional security or investigations of crimes. The cir- cumstances under which network operators may be compelled to provide technical assistance remains largely unclear. On the other hand, one of the most important im- provements to the overall legal protection of personal information is brought about by the CSL. This is be- cause China does not have an overarching data protec- tion law, and the CSL contains very detailed data pro- tection obligations which bind network operators. In particular, network operators are required: (i) to inform and obtain consent from the users when collecting their personal information; (ii) to collect and use personal information in a legal and proper manner; (iii) not to steal or use other illegal means to obtain personal information; (iv) to gather and store personal information in ac- cordance with the law, administrative regulations and their agreements with users; (v) not disclose, tamper with or destroy collected personal information; (vi) to allow users to request that their personal in- formation is destroyed in circumstances where the net- work operator has violated the laws; and (vii) ensure that all personal information obtained is kept confidential. Additional Obligations Imposed on CII Operators The CSL adopts a tiered regulatory approach, which means that all obligations imposed on CII Operators will be in addition to the obligations generally im- posed on network operators. CII Operators are de- fined broadly as operators that provide services that, if lost or destroyed, would endanger China’s national security and national welfare. The CSL elaborates CII as companies operating, or providing services, in the following sectors: public telecommunications and in- formation services, power and energy, transportation, irrigation, finance, public services, and e-government. Specific operational security obligations are set out in Articles 31 to 39 and are mandatory for CII Operators. The Chinese government also actively encourages all network operators to voluntarily comply with these ad- ditional obligations. Article 34, for instance, requires the establishment and maintenance of a higher level of data security measures. This includes, amongst others, obligations such as the setting up of specialised security management bodies, periodically conducting network security technical training and education, and conduct- ing disaster recovery backups. However, the specific scope of these measures is contemplated to be set out by implementing regulations, which have not yet been released. Penalties Chapter VI of the CSL sets out in detail the penalties for contravention and non-compliance. Network op- erators and CII Operators in breach of their obliga- tions may be liable for a fine of up to 100,000 RMB ($150,540) and directly responsible managers or per- sonnel may also be personally liable for a fine of up to 100,000 RMB ($150,540). Article 67 of the CSL also criminalises the establishment of website or commu- nications group for the commission of unlawful and criminal activities, allowing detention of up to 5 days and/or a fine of up to 15,000 RMB ($2,258), and where circumstances are deemed serious, a detention period of up to 15 days and/or a fine of up to 500,000 ($75,270). Measures on Security Review of Network Products and Services CII Operators who are procuring services or network products that could potentially have an im- pact on China’s national security will also have to un- dergo a separate procurement-related cybersecurity re- view as mandated under Article 35 of the CSL. The Measures on Security Review of Network Prod- ucts and Services (the Security Review Measures), which took effect from 1 June 2017, offering guidance on how a security review will be conducted has been published by the CAC. The Security Review Measures stipulate that all important network products and ser- vices which are procured for use in network systems that concern national security will be subject to a secu- rity review. Draft Measures on Security Assessment of Outbound Transmission of Personal Information and Important Data Additionally, CII Operators are subject to a data lo- calisation obligation to store personal information of Chinese citizens or other important data gathered as a result of operations conducted within Chinese territo- ries. Article 37 of the CSL further restricts data export and stipulates that such data shall not be transferred out of China unless ‘‘truly necessary’’ for business needs, and subject to appropriate security assessment by the relevant state departments. On May 19, 2017, the CAC released a further revised draft Measures on Security Assessment of Outbound Transmission of Personal Information and Important Data (Draft Outbound Transmission Measures). In the Draft Outbound Transmission Measures, ‘‘per- sonal information’’ is defined very broadly as ‘‘all the information recorded in electronic form or otherwise, which can be used, solely or together with other infor- mation, to determine the identity of a natural person, 3 PRIVACY & SECURITY LAW REPORT ISSN 1538-3423 BNA 10-10-17
  • 4. including but not limited to the name, date of birth, ID card number, personal biometric information, address and phone number of the natural person’’. ‘‘Outbound Transmission’’ is defined as ‘‘providing overseas insti- tutions, organizations and individuals with the personal information and important data generated or collected by network operators during their operation within the territory of China’’. A two-tier assessment procedure is envisaged under the Draft Outbound Transmission Measures: self- assessment and regulatory assessment. Article 12 of the Measures requires the network op- erators to conduct security assessment on the outbound transmission of data at least once a year. In case of any changes to the data receiver, any major changes to the purpose, scope, quantity and type of the outbound transmission of data, or any major security events of the data receiver or the outbound transmission of data, an- other security assessment shall be conducted without delay. The following issues should be considered when con- ducting such security assessment: (i) necessity of the outbound transmission of data; (ii) personal information involved, including the quantity, scope, type and sensitivity of personal infor- mation, as well as whether the owner of personal infor- mation agrees to transmit his personal information abroad; (iii) important data involved, including the quantity, scope, type and sensitivity of important data; (iv) security protection measures and capability of the data receiver, as well as the network security envi- ronment of the country or region where the date re- ceiver is located; (v) risks of leakage, damage, tampering and abuse of the data after being transmitted abroad and further transferred; (vi) risks to national security, social and public inter- ests, and personal legitimate interests arising from the outbound transmission of data and gathering the out- bound data; and (vii) other important matters to be assessed. The Draft Outbound Transmission Measures provide that a network operator shall report to its industrial au- thority or regulator to arrange for security assessment to determine whether the data shall be allowed to trans- mitted abroad in the following circumstances: (i) the data to be transmitted abroad contains or con- tains in aggregate more than 500,000 users’ personal in- formation; (ii) the quantity of the data to be transmitted abroad is more than 1,000 gigabytes; (iii) the data to be transmitted abroad contains data relating to nuclear facilities, chemical biology, defense industry, population and health, as well as the data of large-scale project activities, marine environment and sensitive geographic information etc.; (iv) the data to be transmitted abroad contains sys- tem vulnerabilities, security protection and other net- work security information of critical information re- garding to the infrastructure; (v) an infrastructure operator of the critical informa- tion provides personal information and important data abroad; or (vi) other data which may affect national security, and social and public interests, and are necessary for assessment as determined by the industrial authority or regulator. Under the following three circumstances, the data shall not be transmitted abroad: (i) the outbound transmission of personal informa- tion fails to be approved by the owner of personal infor- mation, or may jeopardise personal interests; (ii) the outbound transmission of data causes secu- rity risks to the nation’s politics, economy, technology and national defense, which may affect national secu- rity and jeopardise social and public interests; or (iii) other data which are prohibited from being transmitted abroad as determined by relevant authori- ties. While the Draft Outbound Transmission Measures are helpful to clarify that outbound transmission of data is allowed if such data transmission is approved by the user, and if it is necessary and carries no harm to the national security and social and public interests, the fact that the ambiguous terms ‘‘other data which may affect national security, and social and public interests’’ and Љ other data which are prohibited from being trans- mitted abroad as determined by relevant authorities’’ contained in these measures still give rise to unpredict- ability and business uncertainty. Critiques of the Laws Generally, the laws grant extensive regulatory pow- ers to the Chinese government and its organs. The sheer scope of the law, coupled with the vague and am- biguous drafting, renders compliance incredibly diffi- cult. The broad drafting of the laws has been raised as a key concern for business risk and uncertainty, par- ticularly for foreign multinational companies operating in China. Firstly, the invasive measures and vague wording of the laws sparks fear that the Chinese authorities may compel foreign multinational companies to hand over confidential data or open back doors within their prod- uct offerings in the name of ‘‘national security’’ or ‘‘counter terrorism’’. It is submitted that the law goes beyond what is necessary to secure the internet and fur- ther tightens China’s already heavily regulated cyber space. Each of the laws discussed above contains provisions allowing state authorities to compel specified entities to allow state access to confidential data and provide tech- nical assistance (presumably such as decryption) to state authorities, subjecting companies to close moni- toring and surveillance. While the laws will undoubt- edly strengthen cybersecurity, the risk of the laws being used as a tool for achieving objectives that are merely tangential to cybersecurity remains real. Secondly, the CSL and its implementing regulations present an indirect form of protectionism in favor of lo- cal Chinese companies. The restriction on network products and services entail high compliance cost re- quiring foreign companies and manufactures seeking to provide such products and services to modify existing offerings to comply with the government issued stan- dards. There is also significant risk that foreign prod- ucts or services that are uncertified or unable to meet the issued standards could be completely cut off from the Chinese market, in favor of local companies. Similarly, the data-localisation and data export obli- gation effectively forces foreign companies to store data in China, which can result in a duplication of services 4 10-10-17 COPYRIGHT ஽ 2017 BY THE BUREAU OF NATIONAL AFFAIRS, INC. PVLR ISSN 1538-3423
  • 5. and high operational cost. The importance of data in this global economy is indubitably clear. Global compa- nies are increasingly using such data analytics to under- stand customers’ preferences, streamline internal busi- ness processes and increase efficiency. Restrictive data policies will make data analytics more expensive, put- ting foreign companies at a disadvantage as compared to local companies, since these companies will no lon- ger be able to conduct data analytics cost-effectively on a global basis. In order to comply, foreign companies have the option of contracting with local cloud service providers in China or build their own data centers, ei- ther of which involves high outlays. This requirement benefits largely local Chinese companies offering cloud and storage services such as Alibaba Group Holding Ltd.’s AliYun, but is particularly onerous for small- medium sized enterprises that do not possess the deep pockets to comply. Thirdly, from a human rights perspective, elements of the laws are said to further solidify the government’s control over the Internet, which is already subject to the country’s Great Firewall. Elements such as the crimi- nalisation of the use of the Internet for unlawful or criminal activities, and the obligation on operators to prevent the dissemination of ‘‘terrorist’’ or ‘‘extremist’’ content are likely to further restrict online freedom in China. Noting that the laws also provide for personal li- abilities to be imposed on directly responsible manag- ers or personnel in a wide array of circumstances, the Chinese government would effectively have another tool to suppress and crack down on dissidents. Compliance With These Laws Moving forward, for- eign companies will have to conduct a cost and benefit analysis to decide whether it is worthwhile to continue operating in, or expand operations into, China. Not- withstanding the seemingly insurmountable task of compliance, the Chinese market and its promise for growth is far too huge to be ignored. At the outset, it would be prudent for foreign compa- nies operating in China to assess whether they are sub- ject to the relevant laws and ancillary regulations, and determine the extent of compliance required. This will require foreign companies to consider whether they fall under an enforcement priority. As a rule of the thumb, given the broad drafting and vague definitions em- ployed in the laws, companies in the technology-related sectors should take the stance that it will more likely than not be subject to the obligations. Preparing for compliance will require a review of cur- rent business practices and internal processes, includ- ing data localisation, and a security review. Foreign companies already operating in China should have been accustomed to restrictive internet controls given the re- quirements imposed under the Golden Shield Project (known as China’s Great Firewall). These companies should also take the opportunity to assess potential gaps in their existing cybersecurity policies and proce- dures. This may include taking further measures for data categorisation and segregation, server localisation, review of its existing standard terms and conditions of service offerings, and putting in place appropriate inter- nal cybersecurity policies amongst others. The compli- ance route will inevitably involve foreign companies in- curring significant cost outlays, particularly if the com- pany requires major overhaul to its practices and processes. Large multinational companies are already moving to comply with the laws with Apple announcing its plans to build its first Chinese data center in partnership with a local Chinese data management company, while Ama- zon.com Inc. and Microsoft Corp. already have data centers in China. Other companies such as Airbnb Inc. and South Korean company, AmorePacific Corp., are either shifting data collected from its Chinese opera- tions to local Chinese servers, or relocating its e-commerce systems to China. Foreign multinational companies should also be minded to recognise that the Chinese legal systems are fundamentally different from the Anglo-Saxon legal system familiar to most in the Western world. A plain reading of the relevant laws and implementing regula- tions will not be sufficient to understand or determine the precise ambit of the obligations. Rather, the key to compliance is to understand the government’s motiva- tions and regulatory approach. This will require con- stant strategic engagement with the relevant state au- thorities to help understand and mitigate the impact of the laws. Conclusion Short of the detailed implementing regulations that have yet been fully released by the relevant state au- thorities, the true overall impact of the laws remains to be seen. Guidelines and implementing regulations will continue to be rolled out as state authorities look to- wards facilitating the implementation of cybersecurity measures. While the state of cybersecurity regulation in China remains in a flux, one thing that is certain is that the Chinese government is succeeding in its desire to exercise more control and oversight over the cyber- space. BY BENJAMIN CHEONG AND TERRANCE TONG To contact the editor responsible for this story: Don- ald Aplin at daplin@bna.com 5 PRIVACY & SECURITY LAW REPORT ISSN 1538-3423 BNA 10-10-17