China Security Bill Calls for ‘Cyber Sovereignty’

China intends to build a national cyber safety net as part of a sweeping security bill being considered by the country’s top lawmaking body.

The provision on “cyber sovereignty” was added to the second draft of the security law, which also stressed the need to safeguard the security of “industries and key areas important to the national economy,” according to a text of the document posted Wednesday on the website of the National People’s Congress. The new proposal, which was reviewed last month by the body’s Standing Committee, also adds language about protecting the country from risks to the financial system.
Chinese President Xi Jinping is seeking to shore up security as the Communist Party faces an increasingly complex series of challenges at home and abroad. The National People’s Congress in December began deliberating a new national security law to replace one from 1993 that was more narrowly focused on preventing spying.

The bill includes economic, financial, food, culture, environment, and energy matters into the realm of national security and emphasizes the importance of upholding Communist Party rule. The latest draft stresses the need for “cultural security” and improving socialist education to prevent the “infiltration of unhealthy culture.”

The language conflicts with efforts to create a multicultural society, said Zhan Zhongle, a law professor at Peking University.

“Cultural security should not be a legal term, because it contradicts cultural integration which is a universally accepted idea,” Zhan said.

The proposal has been released for public consideration until June 5. The new passages on cybersecurity fit with a broad national strategy, reported by Bloomberg News in December, to purge most foreign technology from banks, state-owned enterprises and the military by 2020. Chinese regulators suspended the implementation of the guidelines for banks, a person familiar with the matter said last month, after trade groups from Europe, Japan and the US protested.

The proposal also for the first time highlighted the responsibilities of Chinese territories such as Hong Kong and Macau in ensuring national security. “Safeguarding China’s sovereignty, unity and territorial integrity is the joint obligation of all Chinese people including the ones in Hong Kong, Macau and Taiwan,” it said.

The addition comes after the Occupy Central pro-democracy protests in Hong Kong last year that closed off key business districts for more than two months.

“The draft law makes a specific point of Hong Kong because what happened last year has caused concern among the leadership,” Zhan said.

Bloomberg:

 

« The Coming Cyberpeace
What a Cyber War Arsenal Looks Like »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ExaGrid Systems

ExaGrid Systems

ExaGrid provides Tiered Backup Storage with a unique disk-cache Landing Zone, long-term retention repository, and scale-out architecture.

Cyber Together

Cyber Together

Cyber Together is dedicated to advancing the cyber security industry by giving businesses access to Israel’s leaders, innovators and great minds in the field of cyber security.

Verimatrix

Verimatrix

Verimatrix is a global provider of innovative cybersecurity solutions that protect content, devices, software and applications.

Baffin Bay Networks

Baffin Bay Networks

Baffin Bay Networks operates globally distributed Threat Protection Centers™, offering DDoS protection, Web Application Protection and Threat Inspection.

Touchstone Security

Touchstone Security

Touchstone Security is a company with a passion for technology, a hyper-focus on cybersecurity, and a special affinity for cloud technology.

Aversafe

Aversafe

Aversafe provides individuals, employers and certificate issuers around the world with a first line of defense against credential fraud.

StoneLock

StoneLock

StoneLock is a trusted leader in the design and manufacture of facial recognition software and technology.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

Lupovis

Lupovis

Lupovis is an AI-based deception solution that deploys active decoys turning your network from a flock of sheep to a pack of wolves where the hunter becomes the hunted.

Questex Asia Total Security Conference

Questex Asia Total Security Conference

Questex Asia’s Total Security Conferences is one of the industry’s most prestigious and engaging forums for the region's top information security leaders and business decision-makers.

KingsGuard Solutions

KingsGuard Solutions

KingsGuard Solutions is a San Diego Cybersecurity company that specializes in complex and innovative security solutions for companies throughout Southern California.

IT Solutions Consulting

IT Solutions Consulting

IT Solutions is a full-service IT partner providing managed services and other information technology solutions nationwide.

InnovateHer

InnovateHer

At InnovateHer, our vision is to make the tech sector more equitable, by increasing diversity across the spectrum and creating more inclusive workplaces.

Entitle

Entitle

Entitle's SaaS-based platform automates how permissions are managed, enabling organizations to eliminate bottlenecks and implement robust cloud least privilege access.

Cyber Qubits

Cyber Qubits

Cyber Qubits is a cybersecurity training and consulting company focused on developing the next generation of cybersecurity professionals.

Custocy

Custocy

Custocy is a unique collaborative AI technology that identifies sophisticated and unknown (zero-day) attacks.