Go to listing page

Decoding the China’s new cyber security law, in seven bullets

Decoding the China’s new cyber security law, in seven bullets

The contentious cybersecurity law is inviting widespread criticism from the tech organizations spread world over. If you take a reading of the entire document, you will realize that the entire law is nothing but a bundle of ludicrous measures squandered together with the sole aim of strengthening the control of the government over the internet, to further curb the rights to privacy and individual freedom of expression and to promote the development of an insular society that is impervious to the flow of ideas across the national borders.

As per Gartner, the Chinese market stands at a whopping $340 billion and China expects the international private players to toe to its line in return for the access to such a huge market. The measures undertaken in this law form an integral part of the sweeping push that President Xi Jinping is giving to further consolidate control over the internet in China.

Let’s look at the salient features of the new law. It –

  1. Imposes mandatory testing and certification of computer equipment.
  2. Requires companies to give government investigators full access to their data if wrong-doing is suspected.
  3. Doesn’t specify what the security reviews will entail. (Those who have been following it, know that the idea of requiring source-code disclosure was floated in drafts of several Chinese regulations last year, but later it was removed.)
  4. Requires network operators to provide “technical support” to authorities for national security and criminal investigations. (“Technical support” is also not clearly defined, but could mean providing source code, encryption or other critical intellectual property.)
  5. Requires data localization, which would force critical information infrastructure operators to store data within China’s borders. (In addition, business info and data on Chinese citizens gathered within the country to be kept on domestic servers and not be transferred abroad without permission.)
  6. Requires a large range of companies to (including instant messaging services) to require users to register with their real names and personal information.
  7. Makes censorship a matter of cybersecurity, threatening to punish companies that allow unapproved information to circulate online.

Above all, the law states that all measures undertaken are directed against the hypothetical activities that want to “overthrow the socialist system in China”. This is nothing but a hypothetical crisis being insinuated to further consolidate the hold of the government. This law further bars the foreign players from participating in critical information infrastructure sectors; the list of which has been expanded.

It doesn’t take much effort to decode the real intentions behind the law. It is repressive, reactionary, feudal and archaic in spirit that stands against the ethos of individual liberty and non-discriminatory free trade; a pillar of world trade organization that is ironically wholeheartedly supported by the export oriented China.

Cyware Publisher

Publisher

Cyware