China Security Bill Calls for ‘Cyber Sovereignty’

China intends to build a national cyber safety net as part of a sweeping security bill being considered by the country’s top lawmaking body.

The provision on “cyber sovereignty” was added to the second draft of the security law, which also stressed the need to safeguard the security of “industries and key areas important to the national economy,” according to a text of the document posted Wednesday on the website of the National People’s Congress. The new proposal, which was reviewed last month by the body’s Standing Committee, also adds language about protecting the country from risks to the financial system.
Chinese President Xi Jinping is seeking to shore up security as the Communist Party faces an increasingly complex series of challenges at home and abroad. The National People’s Congress in December began deliberating a new national security law to replace one from 1993 that was more narrowly focused on preventing spying.

The bill includes economic, financial, food, culture, environment, and energy matters into the realm of national security and emphasizes the importance of upholding Communist Party rule. The latest draft stresses the need for “cultural security” and improving socialist education to prevent the “infiltration of unhealthy culture.”

The language conflicts with efforts to create a multicultural society, said Zhan Zhongle, a law professor at Peking University.

“Cultural security should not be a legal term, because it contradicts cultural integration which is a universally accepted idea,” Zhan said.

The proposal has been released for public consideration until June 5. The new passages on cybersecurity fit with a broad national strategy, reported by Bloomberg News in December, to purge most foreign technology from banks, state-owned enterprises and the military by 2020. Chinese regulators suspended the implementation of the guidelines for banks, a person familiar with the matter said last month, after trade groups from Europe, Japan and the US protested.

The proposal also for the first time highlighted the responsibilities of Chinese territories such as Hong Kong and Macau in ensuring national security. “Safeguarding China’s sovereignty, unity and territorial integrity is the joint obligation of all Chinese people including the ones in Hong Kong, Macau and Taiwan,” it said.

The addition comes after the Occupy Central pro-democracy protests in Hong Kong last year that closed off key business districts for more than two months.

“The draft law makes a specific point of Hong Kong because what happened last year has caused concern among the leadership,” Zhan said.

Bloomberg:

 

« The Coming Cyberpeace
What a Cyber War Arsenal Looks Like »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

F-Secure

F-Secure

F-Secure defends enterprises and consumers against everything from opportunistic ransomware infections to advanced cyber attacks.

Forensic Control

Forensic Control

Forensic Control specialise in providing simple & straightforward Cyber Security to organisations, helping them assess, prevent and respond to cyber threats.

TSUNAMI

TSUNAMI

The TSUNAMi center focuses on software and system security and how trustworthy software can be built from COTS software components.

Texplained

Texplained

Texplained specializes in security audits of microchips to identify vulnerabilities and protect against invasive cyber attacks.

Data Security Council of India (DSCI)

Data Security Council of India (DSCI)

DSCI is a premier industry body on cyber security and data protection in India, committed to making the cyberspace safe, secure and trusted.

Cyber Security Austria (CSA)

Cyber Security Austria (CSA)

Cyber Security Austria (CSA) is an independent non-profit association with the aim to address security issues in the area of IT/cyber security of critical/strategic infrastructures in Austria.

RCDevs

RCDevs

RCDevs is an award-winning Software company providing security solutions designed for modern enterprise technologies and suited for SMEs to large corporations.

BeyondTrust

BeyondTrust

BeyondTrust is a leader in Privileged Access Management, offering a seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

Scythe

Scythe

SCYTHE is a next generation red team platform for continuous and realistic enterprise risk assessments.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

ImpactQA

ImpactQA

ImpactQA is a global leading software testing & QA consulting company. Ten years of excellence. Delivering unmatched services & digital transformation to SMEs & Fortune 500 companies.

Cubro Network Visibility

Cubro Network Visibility

Cubro network visibility solutions remove network monitoring ‘blind spots’ to provide enhanced visibility and control of all data transiting a company’s network.

Cloud4C

Cloud4C

Cloud4C is a leading automation-driven, application focused cloud Managed Services Provider.

Fibernet

Fibernet

Fibernet's innovative solutions in the fields of cybersecurity and fiber optics range from telecommunications infrastructure to small business cybersecurity.

Pango

Pango

Pango is a leading provider of digital consumer security solutions.