China Security Bill Calls for ‘Cyber Sovereignty’

China intends to build a national cyber safety net as part of a sweeping security bill being considered by the country’s top lawmaking body.

The provision on “cyber sovereignty” was added to the second draft of the security law, which also stressed the need to safeguard the security of “industries and key areas important to the national economy,” according to a text of the document posted Wednesday on the website of the National People’s Congress. The new proposal, which was reviewed last month by the body’s Standing Committee, also adds language about protecting the country from risks to the financial system.
Chinese President Xi Jinping is seeking to shore up security as the Communist Party faces an increasingly complex series of challenges at home and abroad. The National People’s Congress in December began deliberating a new national security law to replace one from 1993 that was more narrowly focused on preventing spying.

The bill includes economic, financial, food, culture, environment, and energy matters into the realm of national security and emphasizes the importance of upholding Communist Party rule. The latest draft stresses the need for “cultural security” and improving socialist education to prevent the “infiltration of unhealthy culture.”

The language conflicts with efforts to create a multicultural society, said Zhan Zhongle, a law professor at Peking University.

“Cultural security should not be a legal term, because it contradicts cultural integration which is a universally accepted idea,” Zhan said.

The proposal has been released for public consideration until June 5. The new passages on cybersecurity fit with a broad national strategy, reported by Bloomberg News in December, to purge most foreign technology from banks, state-owned enterprises and the military by 2020. Chinese regulators suspended the implementation of the guidelines for banks, a person familiar with the matter said last month, after trade groups from Europe, Japan and the US protested.

The proposal also for the first time highlighted the responsibilities of Chinese territories such as Hong Kong and Macau in ensuring national security. “Safeguarding China’s sovereignty, unity and territorial integrity is the joint obligation of all Chinese people including the ones in Hong Kong, Macau and Taiwan,” it said.

The addition comes after the Occupy Central pro-democracy protests in Hong Kong last year that closed off key business districts for more than two months.

“The draft law makes a specific point of Hong Kong because what happened last year has caused concern among the leadership,” Zhan said.

Bloomberg:

 

« The Coming Cyberpeace
What a Cyber War Arsenal Looks Like »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Securi-Tay

Securi-Tay

Securi-Tay is an information Security conference held by the Ethical Hacking Society at Abertay University, Dundee.

360 Total Security

360 Total Security

360 company is the largest provider of Internet and mobile security products in China.

Infosec (T) Ltd

Infosec (T) Ltd

Infosec (T) Limited is an independent Tanzania based consultancy specializing in IT governance, information security and IT audit.

Advisera 27001Academy

Advisera 27001Academy

Advisera is a market leader in providing documentation and online support for the implementation of business standards including ISO 27001, ISO 22301 and EU GDPR.

Blockchain Firm

Blockchain Firm

Blockchain Firm is a leading Blockchain based software solutions and service provider with our roots of expertise running deep into the technology.

StartupXseed Ventures

StartupXseed Ventures

StartupXseed Ventures is a smart capital provider for Deep Tech, B2B, Early Stage Startups. We support, NextGen Tech Entrepreneurs, who have potential to deliver the outsized growth.

Drata

Drata

Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

Robo Shadow

Robo Shadow

Robo Shadow are trying to bridge the gap between the top tier organisations that can afford everything and everyone else who has to “Make it up as they go along” when it comes to Cyber.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

CyBourn

CyBourn

Cybourn's diverse offerings include engineering, analysis, product development, assessment, and advisory services in the cybersecurity space.

AuthMind

AuthMind

Prevent your next identity-related cyberattack with the AuthMind Identity SecOps Platform. It works anywhere and deploys in minutes.

Roberts & Obradovic Law

Roberts & Obradovic Law

Roberts & Obradovic Law Group is a corporate, privacy, employment and litigation law firm.

SolidityScan

SolidityScan

SolidityScan is an advanced smart contract scanning tool designed to uncover vulnerabilities and proactively address risks within your code.

Excite Cyber

Excite Cyber

Excite Technology Services (formerly Cipherpoint) is focused on improving the security posture of our customers.

Twinstate Technologies

Twinstate Technologies

Twinstate Technologies specializes in cybersecurity, proactive IT, and hosted and on-premise voice solutions.

Mediatech

Mediatech

Mediatech, specialized in managed Cybersecurity and Cloud services, a single point of contact for your company's IT and infrastructure.