US Asks China Not to Enforce Cybersecurity Law

The United States has asked China not to implement its new cyber security law over concerns it could damage global trade in services, a US document published recently by the World Trade Organisation.

China ushered in a tough new cyber security law in June, following years of fierce debate around the move that many foreign business groups fear will hit their ability to operate in the country.

The law requires local and overseas firms to submit to security checks and store user data within the country.

The United States, in a document submitted for debate at the WTO Services Council, said if China's new rules enter into full force in their current form, as expected by the end of 2018, they could impact cross-border services supplied through a commercial presence abroad.

"China’s measures would disrupt, deter, and in many cases, prohibit cross-border transfers of information that are routine in the ordinary course of business," it said.

"The United States has been communicating these concerns directly to high level officials and relevant authorities in China," the US document said, adding it wanted to raise awareness among WTO members about the potential impact on trade.

"We request that China refrain from issuing or implementing final measures until such concerns are addressed."

China's Ambassador to the WTO Zhang Xiangchen spoke on Tuesday at a WTO conference panel on trade protectionism, which he said was an underestimated problem that was causing a crisis at the WTO.

Asked by Reuters if the US filing showed China was guilty of protectionism, he said:

“There’s no definition of protectionism and each member has his own legitimate right to adopt a trade policy legally in the WTO system. But we have to be cautious to say which one is (legal within the (WTO) ... and which is illegal."

The two-page US document said the measures causing concern included the Cybersecurity Law adopted in November 2016.

China is seeking to require companies to store all data within China and pass security reviews, fitting China's ethos of "cyber sovereignty", the idea that states should be permitted to govern and monitor their own cyberspace, controlling incoming and outgoing data flows.

"The impact of the measures would fall disproportionately on foreign service suppliers operating in China, as these suppliers must routinely transfer data back to headquarters and other affiliates," the US document said.

"Companies located outside of China supplying services on a cross-border basis would be severely affected, as they must depend on access to data from their customers in China."

China maintains a strict censorship regime, banning access to foreign news outlets, search engines and social media including Google and Facebook.

US News:

You Might Also Read:

China's Great Wall Into Russian Cybersecurity:

Here Comes China’s Crypto-Currency:

 

« China Disrupts WhatsApp
Healthcare Suffers Most Cyber Security Incidents »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSR Privacy Solutions

CSR Privacy Solutions

CSR Privacy Solutions is a leading provider of privacy regulatory compliance programs for small and medium sized businesses.

Cyber Security Centre - University of Hertfordshire

Cyber Security Centre - University of Hertfordshire

The Cyber Security Centre provides training, teaching and research in the fast paced topics of cyber security and digital forensics.

Telefonica Tech

Telefonica Tech

Telefónica Cyber Security Tech is focused on the prevention, detection and appropriate response to security incidents aimed at protecting your digital services.

Ground Labs

Ground Labs

Ground Labs is a security software company dedicated to making sensitive data discovery products that help organisations prevent sensitive data loss.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

Clavister

Clavister

Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments.

Norwest Venture Partners (NVP)

Norwest Venture Partners (NVP)

Norwest Venture Partners offer entrepreneurs a broad range of services to help them build their businesses at every stage of growth. Key sectors include AI, Infrastructure, SaaS and Security.

Securd

Securd

Securd takes opportunities away from your cyber adversaries. Cloud-delivered zero-trust DNS firewall and web filtering protection keep your business network and remote employees safe.

Sentor Managed Security Services

Sentor Managed Security Services

Sentor Managed Security Services is a cybersecurity company that enables organizations to exist in a digitally connected world.

Gotham Digital Science (GDS)

Gotham Digital Science (GDS)

Gotham Digital Science is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management.

Guardsman Cyber Intelligence (GCI)

Guardsman Cyber Intelligence (GCI)

GCI provides proven cyber intelligence solutions to protect your business against ever present physical and digital threats shadowing your online business.

Blattner Technologies

Blattner Technologies

Blattner Technologies mission is to be the leading provider of predictive transformation services and tools in the Data Analytics, Artificial Intelligence and Machine Learning industry.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

Increase Your Skills (IYS)

Increase Your Skills (IYS)

Armed and ready: raise awareness of cyberattacks in your company with the Full-Service Awareness Platform from IYS – fast and effective. We help you develop a robust, sustainable security strategy.

Cynch Security

Cynch Security

Cynch Security are passionate about building a world where every business is resilient to cybersecurity risks, no matter what their size.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.