HOME

TheInfoList



OR:

The Cybersecurity Law of the People's Republic of China, (
Chinese Chinese can refer to: * Something related to China * Chinese people, people of Chinese nationality, citizenship, and/or ethnicity **''Zhonghua minzu'', the supra-ethnic concept of the Chinese nation ** List of ethnic groups in China, people of v ...
: 中华人民共和国网络安全法) commonly referred to as the Chinese Cybersecurity Law, was enacted by the National People’s Congress with the aim of increasing data protection,
data localization Data localization or data residency law requires data about a nation's citizens or residents to be collected, processed, and/or stored inside the country, often before being transferred internationally. Such data is usually transferred only after m ...
, and cybersecurity ostensibly in the interest of national security. The law is part of wider series of laws passed by the Chinese government in an effort to strengthen national security legislation. Examples of which since 2014 have included a Law on National Intelligence, the National Security of the People’s Republic of China (not to be confused with the
Hong Kong National Security Law The Hong Kong national security law, officially the Law of the People's Republic of China on Safeguarding National Security in the Hong Kong Special Administrative Region, is a piece of national security legislation concerning Hong Kong. It ...
) and laws on counter-terrorism and foreign NGO management, all passed within successive short timeframes of each other.


History

This law was enacted by the
Standing Committee of the National People's Congress The Standing Committee of the National People's Congress of the People's Republic of China (NPCSC) is the permanent body of the National People's Congress (NPC) of the People's Republic of China (PRC), which is the highest organ of state po ...
on November 7, 2016, and was implemented on June 1, 2017. It requires network operators to store select data within China and allows Chinese authorities to conduct spot-checks on a company's network operations. Cybersecurity is recognized as a basic law. This puts the law on the top of the pyramid-structured legislation on cybersecurity. The law is an evolution of the previously existent cybersecurity rules and regulations from various levels and fields, assimilating them to create a structured law at the macro-level. The law also offers principal norms on certain issues that are not immediately urgent but are of long-term importance. These norms will serve as a legal reference when new issues arise.


Provisions

The law: * Created the principle of cyberspace sovereignty * Defined the security obligations of internet products and services providers * Detailed the security obligations of
internet service provider An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privatel ...
s. * Further refined rules surrounding personal information protection * Established a security system for key information infrastructure * Instituted rules for the transnational transmission of data from critical information infrastructures. The cybersecurity law is applicable to network operators and businesses in “ critical sectors.” By critical sectors, China roughly divides the domestic businesses into networking businesses that are involved in telecommunications, information services, energy transport, water, financial services, public services, and electronic government services. Some of the most controversial sections of the law include articles 28, 35, and 37. Article 28 compels vaguely defined "network operators", (interpreted to include: social media platforms, application creators and other technology companies), to cooperate with public security organs such as the Ministry of Public Security and hand over information when requested. Article 35 is targeted at purchases of foreign software or hardware by government agencies or other "critical information infrastructure operators", requiring any hardware of software purchased to undergo review by agencies such as China's SCA or State Cryptography Administration, potentially involving the provision
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the w ...
s and other sensitive proprietary information to government agencies paving the way state theft of
intellectual property Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, c ...
or transmission to domestic competitors. Above all, the article creates further regulatory burdens for foreign technology companies operating in China, indirectly creating a more favourable playing field for domestic competitors which would naturally be more prepared to comply with the regulations. Article 37 creates the requirement of data localisation, meaning that foreign technology companies such as
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washingt ...
, Apple and
PayPal PayPal Holdings, Inc. is an American multinational financial technology company operating an online payments system in the majority of countries that support online money transfers, and serves as an electronic alternative to traditional paper ...
operating in the Chinese market are obligated to store Chinese user data on Chinese servers in mainland China providing an easier access route for Chinese intelligence and state security agencies to intercept data and communications, while expanding the power of the ruling Chinese Communist Party to target dissent and surveil citizens. The law is applicable to all businesses in China that manage their own servers or other data networks. Network operators are expected, among other things, to clarify cybersecurity responsibilities within their organization, take technical measures to safeguard network operations, prevent data leaks and theft, and report any cybersecurity incidents to both users of the network and the relevant implementing department for that sector. The law is composed of supportive subdivisions of regulations that specify the purpose of it. For instance, the
Core Infrastructure Initiative The Core Infrastructure Initiative (CII) was a project of the Linux Foundation to fund and support free and open-source software projects that are critical to the functioning of the Internet and other major information systems. The project was ann ...
(CII) Security Protection Regulations and Measures for Security Assessment of Cross-border Transfer of Personal Information and Important Data. However, the law is yet to be set in stone since China's government authorities are occupied with defining more contingent laws to better correspond with the cybersecurity law. By incorporating preexisting laws on
VPN A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The be ...
and data security into the cybersecurity law, the Chinese government reinforces its control in addition to emphasize has the need for foreign companies to comply with domestic regulations. The cybersecurity law also provides regulations and definitions on
legal liability In law, liable means "responsible or answerable in law; legally obligated". Legal liability concerns both civil law and criminal law and can arise from various areas of law, such as contracts, torts, taxes, or fines given by government agencie ...
. For different types of illegal conduct, the law sets a variety of punishments, such as fines, suspension for rectification, revocation of permits and business licenses, and others. The Law accordingly grant cybersecurity and administration authorities with rights and guidelines to carry out law enforcement on illegal acts. Although censorship affects
mainland China "Mainland China" is a geopolitical term defined as the territory governed by the People's Republic of China (including islands like Hainan or Chongming), excluding dependent territories of the PRC, and other territories within Greater China. ...
, Hong Kong and Macau are exempt under the principle of “
one country two systems "One country, two systems" is a constitutional principle of the People's Republic of China (PRC) describing the governance of the special administrative regions of Hong Kong and Macau. The constitutional principle was formulated in the earl ...
” and the maintenance of separate and independent legal systems.


Related Regulations

In July 2021, the
Cyberspace Administration of China The Cyberspace Administration of China (CAC; ) is the central internet regulator, censor, oversight, and control agency for the People's Republic of China. The office also holds the administrative title of the party's Office of the Central C ...
issued “Regulations on the Management of Security Vulnerabilities in Network Products” requiring that all vulnerabilities be reported to the
Ministry of Industry and Information Technology The Ministry of Industry and Information Technology of the Chinese government, established in March 2008, is the state agency of the People's Republic of China responsible for regulation and development of the postal service, Internet, wireless ...
(MIIT) and prohibits the public disclosure of vulnerabilities, including to overseas organizations.


Reactions

Along with the
Great Firewall The Great Firewall (''GFW''; ) is the combination of legislative actions and technologies enforced by the People's Republic of China to regulate the Internet domestically. Its role in internet censorship in China is to block access to selected for ...
, restrictions stipulated in the law have raised concerns, especially from foreign technology companies operating in China. Regarding the requirements for spot-checks and certifications, international law firms have warned that companies could be asked to provide source code, encryption, or other crucial information for review by the authorities, increasing the risk of intellectual property theft, information being lost, passed on to local competitors, or being used by the authorities themselves. The
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, t ...
warned that the law could force companies transmitting data through servers in China to submit to data surveillance and espionage. The law sparked concerns both domestically and internationally due to its phrasing and specific requirements. Foreign companies and businesses in China expressed concerns that this law might impede future investments in China, since the law requires them to "store their data on Chinese-law regulated local servers, and cooperate with Chinese national security agencies". Since its inception many foreign technology companies have already complied with the law. Apple for example, announced in 2017 that it would invest $1 billion in partnership with local cloud computing company Guizhou Cloud Big Data or GCBD to construct a new data center located in China's
Guizhou Guizhou (; formerly Kweichow) is a landlocked province in the southwest region of the People's Republic of China. Its capital and largest city is Guiyang, in the center of the province. Guizhou borders the autonomous region of Guangxi to the ...
province for the purposes of compliance. Simultaneously, the company also announced that it would transfer the operation and storage of
iCloud iCloud is a Personal cloud, cloud service from Apple Inc. launched on October 12, 2011 as a successor to MobileMe. , the service had an estimated 850 million users, up from 782 million users in 2016. iCloud enables users to sync their data to t ...
data to Mainland China. Microsoft also announced an expansion of its Azure services in partnership cloud computing company 21Vianet through investment in more servers. Meanwhile, online services, such as
Skype Skype () is a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for VoIP-based videotelephony, videoconferencing and voice calls. It also has instant messaging, file transfer, debit ...
and
WhatsApp WhatsApp (also called WhatsApp Messenger) is an internationally available freeware, cross-platform, centralized instant messaging (IM) and voice-over-IP (VoIP) service owned by American company Meta Platforms (formerly Facebook). It allows u ...
which refused to store their data locally and were either delisted from domestic app stores or restricted from further expansion. The law forces foreign technology and other companies operating within China to either invest in new server infrastructure in order to comply with the law or partner with service providers such as
Huawei Huawei Technologies Co., Ltd. ( ; ) is a Chinese multinational technology corporation headquartered in Shenzhen, Guangdong, China. It designs, develops, produces and sells telecommunications equipment, consumer electronics and various smart ...
,
Tencent Tencent Holdings Ltd. () is a Chinese multinational technology and entertainment conglomerate and holding company headquartered in Shenzhen. It is one of the highest grossing multimedia companies in the world based on revenue. It is also the w ...
, or Alibaba, which have already have server infrastructure on the ground, saving capital expenditure costs for companies. The law is widely seen to be in line with 12th Five-Year Plan (2011-2015) which aims to create domestic champions in industries such as cloud computing and big data processing. The law is seen as a boon to domestic companies and has been criticized as creating an unfair playing ground against international technology companies such as Microsoft and
Google Google LLC () is an American multinational technology company focusing on search engine technology, online advertising, cloud computing, computer software, quantum computing, e-commerce, artificial intelligence, and consumer electronics. I ...
. Supporters of the law have stated that the intention of the law is not to prohibit foreign businesses from operating in China, or boost domestic Chinese competitiveness. A study by Matthias Bauer and Hosuk Lee-Makiyama in 2015, states that data localization causes minor damage to economic growth due to inefficiencies that arise from data transfer processes and the duplication of data between several jurisdictions. The requirement for data localization is also seen as a move by Beijing to bring data under Chinese jurisdiction and make it easier to prosecute entities seen as violating China's internet laws. The president of AmCham South China, Harley Seyedin, claimed that foreign firms are facing “mass concerns” because the law has greatly increased operating costs and has had a big impact on how business is done in China. More specifically, he stated that the cyber security law continues to create “uncertainties within the investment community, and it’s resulting in, at the minimum, postponement of some R&D investment.” The law was widely criticized for limiting
freedom of speech Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The right to freedom of expression has been recogn ...
. For example, the law explicitly requires most online services operating in China to collect and verify the identity of their users, and, when required to, surrender such information to law enforcement without warrant. Activists have argued this policy dissuades people from freely expressing their thoughts online, further stifling dissent by making it easier to target and surveil dissidents.{{Cite web, url=http://www.bbc.com/zhongwen/simp/china/2015/07/150709_china_cyber_security_law, title=中国《网络安全法》草案出炉 恐加强言论管制, website=BBC 中文网, date=9 July 2015, language=zh-Hans, access-date=2018-04-14, archive-url=https://web.archive.org/web/20180508115839/http://www.bbc.com/zhongwen/simp/china/2015/07/150709_china_cyber_security_law, archive-date=2018-05-08, url-status=live


See also

* Data Security Law of the People's Republic of China *
Personal Information Protection Law of the People's Republic of China The Personal Information Protection Law of the People's Republic of China (Chinese: 中华人民共和国个人信息保护法; pinyin: ''Zhōnghuá rénmín gònghéguó gèrén xìnxī bǎohù fǎ'') referred to as the Personal Information P ...
*
List of statutes of China The following is an incomprehensive list of the statutes of China, classified and ordered according to the Ministry of Justice of the People's Republic of China. The laws in each sections are listed in chronological order of the year they were p ...
*
Law of the People's Republic of China The Law of the People's Republic of China, officially referred to as the Socialist legal system with Chinese characteristics, is the legal regime of China, with the separate legal traditions and systems of mainland China, Hong Kong, and Macau. ...
* Chinese cyberwarfare


References

Law of the People's Republic of China Cyberwarfare by China Mass surveillance 2017 in China 2017 in law