US Asks China Not to Enforce Cybersecurity Law

The United States has asked China not to implement its new cyber security law over concerns it could damage global trade in services, a US document published recently by the World Trade Organisation.

China ushered in a tough new cyber security law in June, following years of fierce debate around the move that many foreign business groups fear will hit their ability to operate in the country.

The law requires local and overseas firms to submit to security checks and store user data within the country.

The United States, in a document submitted for debate at the WTO Services Council, said if China's new rules enter into full force in their current form, as expected by the end of 2018, they could impact cross-border services supplied through a commercial presence abroad.

"China’s measures would disrupt, deter, and in many cases, prohibit cross-border transfers of information that are routine in the ordinary course of business," it said.

"The United States has been communicating these concerns directly to high level officials and relevant authorities in China," the US document said, adding it wanted to raise awareness among WTO members about the potential impact on trade.

"We request that China refrain from issuing or implementing final measures until such concerns are addressed."

China's Ambassador to the WTO Zhang Xiangchen spoke on Tuesday at a WTO conference panel on trade protectionism, which he said was an underestimated problem that was causing a crisis at the WTO.

Asked by Reuters if the US filing showed China was guilty of protectionism, he said:

“There’s no definition of protectionism and each member has his own legitimate right to adopt a trade policy legally in the WTO system. But we have to be cautious to say which one is (legal within the (WTO) ... and which is illegal."

The two-page US document said the measures causing concern included the Cybersecurity Law adopted in November 2016.

China is seeking to require companies to store all data within China and pass security reviews, fitting China's ethos of "cyber sovereignty", the idea that states should be permitted to govern and monitor their own cyberspace, controlling incoming and outgoing data flows.

"The impact of the measures would fall disproportionately on foreign service suppliers operating in China, as these suppliers must routinely transfer data back to headquarters and other affiliates," the US document said.

"Companies located outside of China supplying services on a cross-border basis would be severely affected, as they must depend on access to data from their customers in China."

China maintains a strict censorship regime, banning access to foreign news outlets, search engines and social media including Google and Facebook.

US News:

You Might Also Read:

China's Great Wall Into Russian Cybersecurity:

Here Comes China’s Crypto-Currency:

 

« China Disrupts WhatsApp
Healthcare Suffers Most Cyber Security Incidents »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

SnoopWall

SnoopWall

SnoopWall is a revolutionary spyware blocking technology that defends against cyber spying, snooping, and stealing.

CloudSigma

CloudSigma

CloudSigma, a pure-cloud IaaS provider offers flexible and innovative cloud hosting solutions for companies of all sizes both in Europe and the US.

Netsparker

Netsparker

Netsparker provide a web application security scanner to automatically find security flaws in your websites, web applications and web services.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

Cyanre

Cyanre

Cyanre delivers state of the art cyber forensic services through software technologies and procedures that exceed conformities of major law enforcement agencies across the globe.

Ceerus

Ceerus

Ceerus was created to simplify the process of deploying and managing security across all the channels in an organisation.

FTAPI Software

FTAPI Software

FTAPI SecuTransfer is a software solution for end-to-end encrypted data exchange of large and sensitive data with customers and partners.

EMnify

EMnify

EMnify is a Software-as-a-Service (SaaS) company, revolutionizing cellular Internet of Things (IoT).

IP Twins

IP Twins

IP Twins offer a wide range of services related to domain names and online brand protection.

Bridgecrew

Bridgecrew

Secure public cloud infrastructure. Our platform automates security engineering, allowing teams to automatically fix configuration errors in AWS, CloudFormation and Terraform.

SDG Corp

SDG Corp

SDG is a global cybersecurity, identity governance, risk consulting and advisory firm, addressing complex security, compliance and technology needs.

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

Berezha Security Group (BSG)

Berezha Security Group (BSG)

BSG is a cybersecurity consulting firm specializing in all aspects of application security and penetration testing.

NTT Group

NTT Group

NTT offers agile, scalable technology services to bring it all together seamlessly, securely, and sustainably. We help you adopt a holistic security approach across your network, clouds, applications.

6clicks

6clicks

6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRAMP and many other standards.

Open Source Security Foundation (OpenSSF)

Open Source Security Foundation (OpenSSF)

OpenSSF is committed to collaboration and working both upstream and with existing communities to advance open source security for all.