US Asks China Not to Enforce Cybersecurity Law

The United States has asked China not to implement its new cyber security law over concerns it could damage global trade in services, a US document published recently by the World Trade Organisation.

China ushered in a tough new cyber security law in June, following years of fierce debate around the move that many foreign business groups fear will hit their ability to operate in the country.

The law requires local and overseas firms to submit to security checks and store user data within the country.

The United States, in a document submitted for debate at the WTO Services Council, said if China's new rules enter into full force in their current form, as expected by the end of 2018, they could impact cross-border services supplied through a commercial presence abroad.

"China’s measures would disrupt, deter, and in many cases, prohibit cross-border transfers of information that are routine in the ordinary course of business," it said.

"The United States has been communicating these concerns directly to high level officials and relevant authorities in China," the US document said, adding it wanted to raise awareness among WTO members about the potential impact on trade.

"We request that China refrain from issuing or implementing final measures until such concerns are addressed."

China's Ambassador to the WTO Zhang Xiangchen spoke on Tuesday at a WTO conference panel on trade protectionism, which he said was an underestimated problem that was causing a crisis at the WTO.

Asked by Reuters if the US filing showed China was guilty of protectionism, he said:

“There’s no definition of protectionism and each member has his own legitimate right to adopt a trade policy legally in the WTO system. But we have to be cautious to say which one is (legal within the (WTO) ... and which is illegal."

The two-page US document said the measures causing concern included the Cybersecurity Law adopted in November 2016.

China is seeking to require companies to store all data within China and pass security reviews, fitting China's ethos of "cyber sovereignty", the idea that states should be permitted to govern and monitor their own cyberspace, controlling incoming and outgoing data flows.

"The impact of the measures would fall disproportionately on foreign service suppliers operating in China, as these suppliers must routinely transfer data back to headquarters and other affiliates," the US document said.

"Companies located outside of China supplying services on a cross-border basis would be severely affected, as they must depend on access to data from their customers in China."

China maintains a strict censorship regime, banning access to foreign news outlets, search engines and social media including Google and Facebook.

US News:

You Might Also Read:

China's Great Wall Into Russian Cybersecurity:

Here Comes China’s Crypto-Currency:

 

« China Disrupts WhatsApp
Healthcare Suffers Most Cyber Security Incidents »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Varonis

Varonis

Varonis provide a security software platform to let organizations track, visualize, analyze and protect their unstructured data.

Fieldfisher

Fieldfisher

Fieldfisher's Technology, Outsourcing & Privacy Group has class-leading expertise in privacy, data & cybersecurity, digital media, big data, the cloud, mobile payments and mobile apps.

Cofense

Cofense

Cofense (formerly PhishMe) is a leading provider of human-driven phishing defense solutions.

Seavus

Seavus

Seavus is a software development and consulting company with a proven track-record in providing successful enterprise-wide business solutions including Managed Security Services.

RIGCERT

RIGCERT

RIGCERT provides training, audit and certification services for multiple fields including Information Security.

Networks Unlimited

Networks Unlimited

Networks Unlimited is a leading value-added distributor in Africa, providing technology solutions with a focus on security, networking, enterprise systems management and cloud technologies.

Cyber Intelligence House (CIH)

Cyber Intelligence House (CIH)

Cyber Intelligence House provides risk exposure solutions for a wide range of audiences including companies, government agencies, regulators, investors, law enforcement and consumers.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

Digitpol

Digitpol

Digitpol’s Cyber Crime Investigation experts investigate hacking incidents, ransomware, extortion and conduct security audits and IT upgrades.

BrainStorm

BrainStorm

BrainStorm Threat Defense takes a new human-focused approach to security awareness that traditional training lacks. It’s a cutting-edge platform to make your users more security savvy.

StackGen

StackGen

StackGen (formerly appCD) automatically generates Infrastructure from Code (IfC) based on application code with golden standards applied.

Mitra Informatics Integration (MII)

Mitra Informatics Integration (MII)

Mitra Informatics Integration is the information communication technology solution business of the Metrodata Group.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.

Tuskira

Tuskira

Tuskira is a Preemptive Cyber Defense & Response Platform powered by Agentic AI, designed to go beyond traditional vulnerability management.

SafetyDetectives

SafetyDetectives

SafetyDetectives' mission is to give our readers accurate and valuable information so they can make informed decisions about staying safe, secure and protected on the internet.

Siemba Inc

Siemba Inc

Siemba’s Continuous Threat Exposure Management (CTEM) platform unifies PenTest as a Service, Vulnerability Assessments, Autonomous Pentesting and Attack Surface Mapping delivering actionable insights