Monday, 05 December 2016 10:03

China tightens tech laws – must be secure and controllable Featured


China has passed a national security law that calls for technology that supports crucial sectors of the economy and government to be "secure and controllable." Industry groups say the language means companies can be forced to allow third-party access to their networks, provide encryption keys or hand over source code.

International “tech” companies must watch out for the tough new rules that will go into force in June 2017. Under the guise of cyber security and national interest, China will have the right to inspect proprietary source code and IP to prove their products cannot be breached by hackers. This is among a raft of other rules to ensure that all “data” collected in China is stored in China under Chinese law and all users are identified by real, traceable names.

According to various reports, but best summarised in the Nasdaq,  tech companies like Microsoft, IBM, and Intel are loath to comply, saying that opening source code and IP to what amounts to detailed engineering level inspection increases the risk of the code falling into the hands of rivals or malefactors.

The three companies will be filing objections to the Technical Committee 260, the national cyber security standards maker, as it released technical parameters of its omnibus cyber security law adopted on 7 November and to be implemented by June 2017. The standards include operating systems, microprocessors, office software, and other products.

The Chinese government has another take on it – the rules are necessary to guard against foreign espionage tools embedded via backdoors in software and services used within its borders.

“US firms are unlikely to leave China over the cyber security requirements because of the importance of the mammoth Chinese market,” said James Gong, a senior associate at law firm Herbert Smith Freehills  who works with Western clients in navigating Chinese law. "I don't think they will pull out. I haven't heard of any company that has decided to leave."

But therein lies the conundrum – China does not really care if they pull out as there are a raft of Chinese companies ready to provide similar goods and services to its 1.4 billion inhabitants, the world’s largest market. India follows with 1.35 billion. The US, at 326 million, pales into insignificance, let alone Australia's 24 million.

The problem is that if the technology is copied it will be very difficult to prove in Chinese courts. Chinese law is very different according to Chinalawblog.

"When the foreign party points out that this is a breach of trust, the Chinese side will often reply with something like the following: 'In China, business is like warfare and contract like a treaty between nations. We will honour the treaty when it benefits us, and we will breach when it benefits us. Personal matters are not relevant. As soon as we see a benefit, we will take it. The situation is really all your fault. You should not have presented me with a situation where I had the opportunity to betray you. By leaving me an opening, you forced my hand, because the rule in China is that when an opportunity presents itself, the prudent businessperson must take advantage of the opportunity'."

China is also using the new cyber security laws to “help stop cyber attacks and help prevent acts of terrorism”, but others say it is just the erosion of further freedoms including mandatory security checks on companies in industries like finance and communications, and mandatory in-country data storage. This will make foreign operations more expensive or lock them out altogether. Individual users will have to register their real names to use messaging services in China.

Human Rights Watch said on Monday that it was concerned about several aspects of the law, including that it calls for real-name registration for users of Chinese instant messaging services. It wrote in a statement, "The already heavily censored Internet in China needs more freedom, not less. Despite widespread international concern from corporations and rights advocates for more than a year, Chinese authorities pressed ahead with this restrictive law without making meaningful changes."

Subscribe to ITWIRE UPDATE Newsletter here

Active Vs. Passive DWDM Solutions

An active approach to your growing optical transport network & connectivity needs.

Building dark fibre network infrastructure using WDM technology used to be considered a complex challenge that only carriers have the means to implement.

This has led many enterprises to build passive networks, which are inferior in quality and ultimately limit their future growth.

Why are passive solutions considered inferior? And what makes active solutions great?

Read more about these two solutions, and how PacketLight fits into all this.


WEBINAR INVITE 8th & 10th September: 5G Performing At The Edge

Don't miss the only 5G and edge performance-focused event in the industry!

Edge computing will play a critical part within digital transformation initiatives across every industry sector. It promises operational speed and efficiency, improved customer service, and reduced operational costs.

This coupled with the new capabilities 5G brings opens up huge opportunities for both network operators and enterprise organisations.

But these technologies will only reach their full potential with assured delivery and performance – with a trust model in place.

With this in mind, we are pleased to announce a two-part digital event, sponsored by Accedian, on the 8th & 10th of September titled 5G: Performing at the Edge.


Ray Shaw

joomla stats

Ray Shaw  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News