China Security Bill Calls for ‘Cyber Sovereignty’

China intends to build a national cyber safety net as part of a sweeping security bill being considered by the country’s top lawmaking body.

The provision on “cyber sovereignty” was added to the second draft of the security law, which also stressed the need to safeguard the security of “industries and key areas important to the national economy,” according to a text of the document posted Wednesday on the website of the National People’s Congress. The new proposal, which was reviewed last month by the body’s Standing Committee, also adds language about protecting the country from risks to the financial system.
Chinese President Xi Jinping is seeking to shore up security as the Communist Party faces an increasingly complex series of challenges at home and abroad. The National People’s Congress in December began deliberating a new national security law to replace one from 1993 that was more narrowly focused on preventing spying.

The bill includes economic, financial, food, culture, environment, and energy matters into the realm of national security and emphasizes the importance of upholding Communist Party rule. The latest draft stresses the need for “cultural security” and improving socialist education to prevent the “infiltration of unhealthy culture.”

The language conflicts with efforts to create a multicultural society, said Zhan Zhongle, a law professor at Peking University.

“Cultural security should not be a legal term, because it contradicts cultural integration which is a universally accepted idea,” Zhan said.

The proposal has been released for public consideration until June 5. The new passages on cybersecurity fit with a broad national strategy, reported by Bloomberg News in December, to purge most foreign technology from banks, state-owned enterprises and the military by 2020. Chinese regulators suspended the implementation of the guidelines for banks, a person familiar with the matter said last month, after trade groups from Europe, Japan and the US protested.

The proposal also for the first time highlighted the responsibilities of Chinese territories such as Hong Kong and Macau in ensuring national security. “Safeguarding China’s sovereignty, unity and territorial integrity is the joint obligation of all Chinese people including the ones in Hong Kong, Macau and Taiwan,” it said.

The addition comes after the Occupy Central pro-democracy protests in Hong Kong last year that closed off key business districts for more than two months.

“The draft law makes a specific point of Hong Kong because what happened last year has caused concern among the leadership,” Zhan said.

Bloomberg:

 

« The Coming Cyberpeace
What a Cyber War Arsenal Looks Like »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Indelible Data

Indelible Data

Indelible Data is an established information security and technology consultancy and a Cyber Essentials Certification Body.

Site24x7

Site24x7

Site24x7 is an all-in-one performance monitoring solution for Networks, Websites, Servers and Applications.

ISGroup (Information Security Group)

ISGroup (Information Security Group)

ISGroup services include network penetration testing, Web application penetration testing, ethical hacking, vulnerability assessments, code review and associated training.

Mitek Systems

Mitek Systems

Mitek's global mobile capture and identity verification technology optimizes the digital user experience for thousands of financial services organizations.

Oak Ridge National Laboratory (ORNL)

Oak Ridge National Laboratory (ORNL)

ORNL conducts basic and applied research and development in key areas of science for energy, advanced materials, supercomputing and national security including cybersecurity.

Secudos

Secudos

SECUDOS is an innovative appliance technology and services provider focused on IT security and compliance.

Verifi

Verifi

Verifi is an award-winning provider of end-to-end payment protection and risk management solutions.

Trusted Objects

Trusted Objects

Trusted Object's mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

Consensys

Consensys

ConsenSys is a global blockchain company. We develop enterprise applications, invest in startups, build developer tools, and offer blockchain education.

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

Digitpol

Digitpol

Digitpol’s Cyber Crime Investigation experts investigate hacking incidents, ransomware, extortion and conduct security audits and IT upgrades.

Theta432

Theta432

THETA432 is a cybersecurity firm that provides 24/7/365 managed prevention, detection, response, Hybrid SOC, cyber defense monitoring services with dynamically defined defense (3D™).

Mailinblack

Mailinblack

Mailinblack protects your organisation against email threats with an innovative solution that meets your security requirements.

Entech

Entech

Entech is a managed IT service provider. We work behind the scenes on your network to ensure data security and integrity.

Liberty Technology

Liberty Technology

Liberty Technology has a host of highly trained, certified experts who assist our clients with immediate remote support as well as on-site service.