{"id":3128,"date":"2016-11-08T00:47:04","date_gmt":"2016-11-08T00:47:04","guid":{"rendered":"https:\/\/www.iuhrdf.org\/en\/2016\/11\/08\/chinas-new-cybersecurity-law-sparks-fresh-censorship-and-espionage-fears\/"},"modified":"2016-11-08T00:47:04","modified_gmt":"2016-11-08T00:47:04","slug":"chinas-new-cybersecurity-law-sparks-fresh-censorship-and-espionage-fears","status":"publish","type":"post","link":"https:\/\/iuhrdf.org\/en\/chinas-new-cybersecurity-law-sparks-fresh-censorship-and-espionage-fears\/","title":{"rendered":"China&#8217;s new cybersecurity law sparks fresh censorship and espionage fears"},"content":{"rendered":"<p>Legislation raises concerns foreign companies may need to hand over intellectual property and help security agencies in return for market access<\/p>\n<p>Reuters<br \/>\u200b\u200b\u200b\u200b\u200b\u200b\u200bMonday 7 November 2016 01.33 EST<\/p>\n<p>China adopted a controversial cybersecurity law on Monday that it said would tackle growing threats such as hacking and terrorism but has triggered concern from foreign business and rights groups.<\/p>\n<p>The legislation, passed by China\u2019s largely rubber-stamp parliament and set to come into effect in June 2017, was an \u201cobjective need\u201d of China as a major internet power, a parliamentary official said.<\/p>\n<p>Overseas critics argue it threatens to shut out foreign technology companies and includes contentious requirements for security reviews and for data to be stored on servers in China.<\/p>\n<p>Rights advocates also say the law will tighten restrictions on China\u2019s internet, already subject to the world\u2019s most sophisticated online censorship mechanism, known outside the country as the Great Firewall.<\/p>\n<p>Yang Heqing, an official on the National People\u2019s Congress standing committee, said the internet was already deeply linked to China\u2019s national security and development.<\/p>\n<p>\u201cChina is an internet power, and as one of the countries that faces the greatest internet security risks, urgently needs to establish and perfect network security legal systems,\u201d Yang said at the close of a bimonthly legislative meeting.<\/p>\n<p>More than 40 global business groups petitioned the Chinese premier, Li Keqiang, in August, urging Beijing to amend controversial sections of the law. Chinese officials have said it would not interfere with foreign business interests.<\/p>\n<p>Contentious provisions remained in the final draft of the law issued by the parliament, including requirements for \u201ccritical information infrastructure operators\u201d to store personal information and important business data in China, provide unspecified \u201ctechnical support\u201d to security agencies, and pass national security reviews.<\/p>\n<p>Those demands have raised concern within companies that fear they would have to hand over intellectual property or open back doors within products in order to operate in China\u2019s market.<\/p>\n<p>James Zimmerman, the chairman of the American Chamber of Commerce in China, called the provisions \u201cvague, ambiguous, and subject to broad interpretation by regulatory authorities\u201d.<\/p>\n<p>Human Rights Watch said elements of the law, such as criminalising the use of the internet to \u201cdamage national unity\u201d, would further restrict online freedom.<\/p>\n<p>\u201cDespite widespread international concern from corporations and rights advocates for more than a year, Chinese authorities pressed ahead with this restrictive law without making meaningful changes,\u201d Sophie Richardson, China Director at Human Rights Watch, said in an emailed statement.<\/p>\n<p>Zhao Zeliang, a director at the Cyberspace Administration of China, said every article in the law was in accordance with the rules of international trade and that China would not close the door on foreign companies.<\/p>\n<p>\u201cThey believe that [phrases such as] secure and independent control, secure and reliable, that these are signs of trade protectionism. That they are synonymous. This is a kind of misunderstanding, a kind of prejudice,\u201d Zhao said.<\/p>\n<p>Many of the provisions had been previously applied in practice, but their formal codification coincides with China\u2019s adoption of a series of other regulations on national security and foreign civil society groups.<\/p>\n<p>The law\u2019s adoption comes amid a&nbsp;<a href=\"https:\/\/www.theguardian.com\/world\/2016\/aug\/03\/christian-church-leader-hu-shigen-jailed-chinese-human-rights-crackdown\">broad crackdown by President Xi Jinping<\/a>&nbsp;on civil society, including rights lawyers and the media, which critics say is meant to quash dissent.<\/p>\n<p>Last year, Beijing adopted a sweeping national security law that aimed to make all key network infrastructure and information systems \u201csecure and controllable\u201d.<\/p>\n<p>\u201cChina\u2019s government has come to recognise that cyberspace immediately and profoundly impacts on many if not all aspects of national security,\u201d said Rogier Creemers, a researcher in the law and governance of China at Leiden University in the Netherlands.<\/p>\n<p>\u201cIt is a national space, it is a space for military action, for important economic action, for criminal action and for espionage,\u201d he said.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Legislation raises concerns foreign companies may need to hand over intellectual property and help security agencies in return for market access<\/p>\n","protected":false},"author":3,"featured_media":3127,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"topic":[],"class_list":["post-3128","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"_links":{"self":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/posts\/3128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/comments?post=3128"}],"version-history":[{"count":0,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/posts\/3128\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/media\/3127"}],"wp:attachment":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/media?parent=3128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/categories?post=3128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/tags?post=3128"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/topic?post=3128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}