China Security Bill Calls for ‘Cyber Sovereignty’

China intends to build a national cyber safety net as part of a sweeping security bill being considered by the country’s top lawmaking body.

The provision on “cyber sovereignty” was added to the second draft of the security law, which also stressed the need to safeguard the security of “industries and key areas important to the national economy,” according to a text of the document posted Wednesday on the website of the National People’s Congress. The new proposal, which was reviewed last month by the body’s Standing Committee, also adds language about protecting the country from risks to the financial system.
Chinese President Xi Jinping is seeking to shore up security as the Communist Party faces an increasingly complex series of challenges at home and abroad. The National People’s Congress in December began deliberating a new national security law to replace one from 1993 that was more narrowly focused on preventing spying.

The bill includes economic, financial, food, culture, environment, and energy matters into the realm of national security and emphasizes the importance of upholding Communist Party rule. The latest draft stresses the need for “cultural security” and improving socialist education to prevent the “infiltration of unhealthy culture.”

The language conflicts with efforts to create a multicultural society, said Zhan Zhongle, a law professor at Peking University.

“Cultural security should not be a legal term, because it contradicts cultural integration which is a universally accepted idea,” Zhan said.

The proposal has been released for public consideration until June 5. The new passages on cybersecurity fit with a broad national strategy, reported by Bloomberg News in December, to purge most foreign technology from banks, state-owned enterprises and the military by 2020. Chinese regulators suspended the implementation of the guidelines for banks, a person familiar with the matter said last month, after trade groups from Europe, Japan and the US protested.

The proposal also for the first time highlighted the responsibilities of Chinese territories such as Hong Kong and Macau in ensuring national security. “Safeguarding China’s sovereignty, unity and territorial integrity is the joint obligation of all Chinese people including the ones in Hong Kong, Macau and Taiwan,” it said.

The addition comes after the Occupy Central pro-democracy protests in Hong Kong last year that closed off key business districts for more than two months.

“The draft law makes a specific point of Hong Kong because what happened last year has caused concern among the leadership,” Zhan said.

Bloomberg:

 

« The Coming Cyberpeace
What a Cyber War Arsenal Looks Like »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

X-act Forensics

X-act Forensics

X-act forensics are computer forensic experts with experience in cases of computer fraud, intellectual property theft, and social networking cases.

Oxford BioChronometrics

Oxford BioChronometrics

By building profiles based on electronically Defined Natural Attributes, or e-DNA, Oxford BioChronometrics protects digital networks, communities, individuals and other online assets from fraud.

VerSprite

VerSprite

VerSprite is a specialist information security consulting firm. We provide organizations with detection across all their attack surfaces and deliver critical insight into all possible attack methods.

ESL Bangladesh

ESL Bangladesh

ESL is the Largest IT Infrastructure & Telecom Service Provider in Bangladesh.

Ntirety

Ntirety

Ntirety Managed Security Services offer enterprise businesses the advanced tools, processes, and support to ensure your infrastructure, networks, and mission-critical applications are secure.

Blueskytec (BST)

Blueskytec (BST)

Blueskytec has applied its experience of over three decades of working in the field of embedded systems and encryption to provide a scalable and appropriate technology for cyber-physical devices.

Greylock Partners

Greylock Partners

Greylock Partners is a leading venture capital firm based in Silicon Valley. We invest in all sectors of enterprise software technology including applications, cloud/SaaS, networking and security.

CyberCX

CyberCX

CyberCX provides services from strategic consulting, security testing and training to world-class managed services and engineering solutions.

DataPassports

DataPassports

DataPassports is a data-centric security and privacy solution that enforces privacy and security from end-to-end with transparent protection of data at the source.

Greenberg Traurig (GT)

Greenberg Traurig (GT)

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East.

Antares NetlogiX

Antares NetlogiX

Antares Netlogix are a leading Austrian service provider for IT security, critical infrastructures and managed security services.

KeyData Associates

KeyData Associates

KeyData is a recognized leader in cybersecurity services specializing in Identity and Access Management (IAM), Customer Identity & Access Management (CIAM) and Privileged Access Management (PAM).

r00tz Asylum

r00tz Asylum

r00tz Asylum is a nonprofit dedicated to teaching kids around the world how to love being white-hat hackers.

Ostendio

Ostendio

Ostendio is a cybersecurity and information management solutions provider that develops affordable compliance solutions for digital health companies and other regulated entities.

ISO WISH

ISO WISH

Take your Business to the Next Level with ISO Certification in UAE.

Seers

Seers

Seers is the world’s leading privacy & consent management platform for companies worldwide. Trusted by over 50,000+ businesses.