Advertisement

CyberBRICS pp 183-226 | Cite as

Cybersecurity Policies in China

Chapter
  • 193 Downloads

Abstract

Cybersecurity is a hotly debated concept worldwide with various policy dimensions. This chapter maps out China’s cybersecurity policies in five areas: personal data protection, consumer protection, cybercrime, threats to public order, and cyberdefense. It argues China is both cyber-ambitious and cyber-vulnerable. In an increasingly combative and conflict-prone world driven by the rivalry between powerful nations, alternative framework and strategies based on peace and cooperation are critical for solving myriad urgent cybersecurity problems.

References

  1. AFP. (April 11, 2019). Russia passes bill to allow Internet to be cut off from foreign servers. The Guardian. Available at <https://is.gd/hOduIB>. Accessed 04 November 2019.
  2. Alsabah, N. (2016). Information control 2.0: The cyberspace administration of China tames the internet. Merics China Monitor. Available at <https://is.gd/QkblLb>. Accessed 04 November 2019.
  3. Austin, G. (2018). Cybersecurity in China: The next wave. Cham: Springer.CrossRefGoogle Scholar
  4. Bauer, J. & Eeten, M. (2009), Cybersecurity: Stakeholder incentives, externalities, and policy options. Telecommunications Policy, 33(10–11), 706–719.CrossRefGoogle Scholar
  5. Callo-Muller, M. (2018). GDPR and CBPR: Reconciling personal data protection and trade. APEC. Available at <https://is.gd/wYvtUP>. Accessed 04 November 2019.
  6. Cao, S. & Leng, S. (September 16, 2019). Cybersecurity week kicks off in China. Global Times. Available at <http://www.globaltimes.cn/content/1164607.shtml>. Accessed 04 November 2019.
  7. Chen, S. (October 12, 2017). China to build giant facial recognition database to identify any citizen within seconds. South China Morning Post. Available at <https://is.gd/Ac1Ekj>. Accessed 04 November 2019.
  8. CNCERT. (2019). 2018 summary of China’s Internet network security status. National Computer Network Emergency Response Technical Team/Coordination Centre of China. Available at <https://is.gd/z10SHh> [Chinese]. Accessed 04 November 2019.
  9. Cyberspace Administration of China (CAC). (2017). Cybersecurity Law of the PRC [English trans. by R. Creemers, P. Triolo, & G. Webster]. New America Foundation. Available at <https://is.gd/Nva3H8>. Accessed 04 November 2019.
  10. Cyberspace Administration of China (CAC) (2019). The 44th Statistical survey report on Internet development in China. Cyber Administration of China. Retrieved from <https://is.gd/Ra07Ai>. [Chinese]
  11. Cyberspace Administration of China (CAC). (July 22, 2019). Measures on Credit Information Management for Seriously Untrustworthy Internet Information Services Entities (Draft for solicitation of comments). Available at <https://is.gd/YMcaUF> [Chinese]. Accessed 04 November 2019.
  12. Demchak, C. (2016). Uncivil and post-Western cyber Westphalia: Changing interstate power relations of the cybered age. The Cyber Defence Review, 1(1), 49–74.Google Scholar
  13. Economist, The. (May 6, 2017). The world’s most valuable resource is no longer oil, but data. The Economist. Available at <https://is.gd/PQ6Vrj>. Accessed 04 November 2019.
  14. eMarketer. (January 22, 2019). China to surpass US in total retail sales. Available at <https://is.gd/Da7ask>. Accessed 04 November 2019.
  15. Fichtner, L. (2019). What kind of cyber security? Theorising cyber security and mapping approaches. Internet Policy Review, 7(2), 1–19.Google Scholar
  16. Ford, C. (2019). Huawei and its siblings, the Chinese tech giants: National security and foreign policy implications. U.S. Department of State. Available at <https://is.gd/R9QnTs>. Accessed 04 November 2019.
  17. Goldsmith, J. & Wu, T. (2006). Who controls the Internet? Illusions of a borderless world. New York, NY: Oxford University Press.CrossRefGoogle Scholar
  18. Goodman, M. (2015). Future crimes: Inside the digital underground and the battle for our connected world. New York: Anchor.Google Scholar
  19. Hayward, F. (September 26, 2019). China unveils 500 megapixel camera that can identify every face in a crowd of tens of thousands. Telegraph. Available at <https://is.gd/coBnaM>. Accessed 04 November 2019.
  20. Hong, Y. (2017). Networking China: The digital transformation of the Chinese economy. Urbana Champagne: University of Illinois Press.CrossRefGoogle Scholar
  21. Hong, Y. Q. (February 1, 2018). The politics and economics behind APEC’s CBPR. Research Alliance for Data Governance and Cyber Security. Available at <https://is.gd/SXJPdl>. Accessed 04 November 2019. [Chinese]
  22. Inkster, N. (2016). China’s cyber power. London: Routledge.Google Scholar
  23. Jenkins, N. (August 17, 2015). China shutters 50 websites for “inciting panic” over the Tianjin disaster. Time. Available at <https://is.gd/MjIRYw>. Accessed 04 November 2019.
  24. Ji, X. (2014). Analysis of the status and trends of crime. China Criminal Law Magazine, 14(3), 116–124.Google Scholar
  25. Jiang, M. (2010). Authoritarian informationalism: China’s approach to Internet sovereignty. SAIS Review of International Affairs, 30(2), 71–89.CrossRefGoogle Scholar
  26. Jiang, M. & Fu, K. W. (2018). Chinese social media and big data: Big data, big brother, big profit? Policy & Internet, 10(4), 372–392.  https://doi.org/10.1002/poi3.187CrossRefGoogle Scholar
  27. Kaplan, F. (2017). Dark territory: The secret history of cyber war. NY: Simon & Schuster.Google Scholar
  28. Kovacs, A. (2016). India and the Budapest Convention: To sign or not? Considerations for Indian stakeholders. Internet Democracy Project. Available at <https://is.gd/ffGBeA>. Accessed 04 November 2019.
  29. Liang, F., Das, V., Kostyuk, N. & Hussain, M. (2018). Constructing a data-driven society: China’s social credit system as a state surveillance infrastructure. Policy & Internet, 10(4), 415–453.CrossRefGoogle Scholar
  30. Lindsay, J. (2014). The impact of China on cybersecurity: Fiction and friction. International Security, 39(3), 7–47.CrossRefGoogle Scholar
  31. Lindsay, J., Cheung, T., & Reveron, D. (Eds.) (2015). China and cybersecurity: Espionage, strategy, and politics in the digital domain. Oxford, UK: Oxford University Press.Google Scholar
  32. Liu, Y. & Lin, L. (2018). How China should respond to GDPR. Information and Communications Technology and Policy, 9, 74–77. [Chinese]Google Scholar
  33. Mai, J. (January 29, 2020). Coronavirus ‘rumour’ crackdown by Wuhan police slammed by China’s top court. South China Morning Post. Retrieved from https://www.scmp.com/news/china/society/article/3048042/chinas-top-court-hits-out-wuhan-police-over-coronavirus-rumour
  34. Mozur, P. (July 8, 2018). Inside China’s dystopian dreams: A.I., shame and lots of cameras. New York Times. Available at <https://is.gd/keI3nH>. Accessed 04 November 2019.
  35. Oppermann, D. (2010). Virtual attacks and the problem of responsibility: the case of China and Russia. Carta Internacional, 5(2), 11–25.Google Scholar
  36. Qin, A. (February 20, 2019a). Military strategy behind Russia’s preparation to cut itself from the Internet: Lessons for China? Kunglunce Web. Available at <https://is.gd/sgLaSJ>. Accessed 04 November 2019.
  37. Qin, A. (June 12, 2019b). High vigilance for American cyberwar at its last stage of preparation. Kunglunce Web. Available at <https://is.gd/QbyeYi>. Accessed 04 November 2019.
  38. Raine, L., Anderson, J., & Connolly, J. (October 29, 2014). Cyber attacks likely to increase. Pew Research Centers” Internet American Life Project. Available at <https://is.gd/0TkJzx>. Accessed 04 November 2019.
  39. Raul. A. (Ed.) (2018). Privacy, data protection and cybersecurity law review (5th Ed.). London: Law Business Research.Google Scholar
  40. Schia, N. & Gjesvik, L. (2017). China’s cyber sovereignty: Policy brief. Norwegian Institute of International Affairs.Google Scholar
  41. Singer, P. & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Oxford, UK: Oxford University Press.CrossRefGoogle Scholar
  42. Sina Financial. (March 14, 2019). Consumer complaints and consultation requests over 10 million in 2018. Sina. Available at <https://is.gd/aOCjg0>. Accessed 04 November 2019.
  43. Sputnik International. (March 13, 2018). China to continue cybersecurity drills within SCO. Sputnik International. Retrieved from <https://is.gd/7Ij51U
  44. State Council. (2016). Inter-ministerial joint conference to help protect consumer rights. State Council of the PRC. Available at <https://is.gd/1NGXGJ>. Accessed 04 November 2019.
  45. Tencent. (March 5, 2016). China’s online black market participants exceed 400,000; Tencent implements five measures to ensure security. Tencent Daqing Net. Available at <https://xian.qq.com/a/20160305/035854.htm [Chinese]>. Accessed 04 November 2019.
  46. U.S. Department of Justice. (2014). U.S. charges five Chinese military hackers for cyber espionage against U.S. corporations and a labor organization for commercial advantage. Available at <https://is.gd/uNhOUl>. Accessed 04 November 2019.
  47. Xinhua Net (August 6, 2015). Study strategies: 5 keywords to understand President Xi’s new proposal on cyber security. Xinhua Net. Retrieved from <https://is.gd/sEcug7>. [Chinese]
  48. Xinhua Net. (September 16, 2017). Insiders explain how to “hit where it hurts” when it comes to cybercrime. Xinhua Net. Available at <https://is.gd/tXlkGW> [Chinese]. Accessed 04 November 2019.
  49. Xinhua Net. (August 28, 2018). Cyber black and gray markets cause annual loss of nearly RMB 100 billion in China. Xinhua Net. Available at <https://is.gd/SBfwib> [Chinese]. Accessed 04 November 2019.
  50. Xu, K. (2019). Effects and functions of Personal Information Security Specification. China Information Security, 3, 44–47. [Chinese]Google Scholar
  51. Xue, H. (2019). An instant analysis of Chinese Electronic Commerce Law. CyberBRICS Project. Retrieved from <https://is.gd/5PUOu3>.Google Scholar
  52. Wang, C. (2018). Comparing GDPR’s personal data rights and Cybersecurity Law’s personal information rights. China Information Security, 7, 41–44. [Chinese]Google Scholar
  53. Wang, H. (February 14, 2017). China has established 1116 “cybersecurity police units.” Guangmin Daily. Available at <https://is.gd/FwebOV> [Chinese]. Accessed 04 November 2019.
  54. Yu, Z. & Wu, S. (2018). Historical summary of cybercrime legislation, judicial interpretation and theories. Politics & Law, 1, 59–78. [Chinese]Google Scholar

Copyright information

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021

Authors and Affiliations

  1. 1.UNC CharlotteCharlotteUSA

Personalised recommendations