Skip to main content

Positions of States Toward Cyberspace and Cyber-Relating Regulations

  • Chapter
  • First Online:
Cyberspace Sovereignty

Abstract

The core proposition of cyberspace governance for various States and regions is to enable cyber communication, industry and security to be intertwined with each other in competition and cooperation, and to be unified in order. This is also a legislative problem confronting all States in the world.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Central Cyber Security and Information Leading Group Office. National Internet Information Office Policy and Regulation Bureau. Compilation of Chinese Internet Regulations and Provisions (First Edition, Hardcover) (2015) China Legal Publishing House, Beijing. http://spu.jd.com/1681195069.html [2016-12-4].

  2. 2.

    Report of Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, article 2 in the introduction. http://www.un.org/ga/search/view_doc.asp?symbol=A/70/174&referer=/english/&Lang=C [2016-12-4].

  3. 3.

    Tentative schedule Project 94 of the 68th session of United Nations Conference, Developments in the field of information and telecommunications in the context of international security. http://www.un.org/ga/search/view_doc.asp?symbol=A/68/98&referer=/english/&Lang=C [2016-9-1].

  4. 4.

    Report of the Secretary-General on Development of Information and Telecommunications from the Perspective of International Security. http://www.un.org/ga/search/view_doc.asp?symbol=A/69/112&referer=/english/&Lang=C [2016-9-12].

  5. 5.

    Report of the Secretary-General on Development of Information and Telecommunications from the Perspective of International Security (addition). http://www.un.org/ga/search/view_doc.asp?symbol=A/69/112/ADD.1&referer=/english/&Lang=C [2016-9-20].

  6. 6.

    Report of the Secretary-General on Development of Information and Telecommunications from the Perspective of International Security. http://www.un.org/ga/search/view_doc.asp?symbol=A/70/172&referer=/english/&Lang=C [2016-9-12].

  7. 7.

    Report of the Secretary-General on Development of Information and Telecommunications from the Perspective of International Security. http://www.un.org/ga/search/view_doc.asp?symbol=A/71/172&referer=/english/&Lang=C [2016-9-19].

  8. 8.

    Österreichische Strategie für Cyber Sicherheit. https://www.bka.gv.at/DocView.axd?CobId=50748 [2016-10-6].

  9. 9.

    Cyber-crime Convention. http://www.europarl.europa.eu/meetdocs/2014_2019/documents/libe/dv/7_conv_budapest_/7_conv_budapest_en.pdf [2016-10-6].

  10. 10.

    President Roosevelt Protesting at UN, Communication in Brazil being monitored. http://www.un.org/chinese/News/story.asp?newsID=20568 [2016-9-9].

  11. 11.

    Bradley Brooks, Frank Bajak. Brazil looks to break from US-centric Internet. 2013-09-17. http://news.yahoo.com/brazil-looks-break-us-centric-internet-040702309.html [2016-9-21].

  12. 12.

    Developments in the Field of Information and Telecommunications in the Context of International Security. https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2014/10/Canada.pdf [2016-9-19].

  13. 13.

    Developments in the Field of Information and Telecommunications in the Context of International Security. https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2015/08/CanadaISinfull.pdf [2016-9-19].

  14. 14.

    Avances en la esfera de la información y las telecomunicaciones en el contexto de la seguridad internacional. https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2014/07/Colombia.pdf [2016-9-19].

  15. 15.

    Lineamientos de política para ciberseguridad y ciberdefensa. http://www.mintic.gov.co/portal/604/articles-3510_documento.pdf [2016-10-6].

  16. 16.

    Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003(CAN-SPAM). http://www.internetlibrary.com/statuteitem.cfm?Num=8 [2016-10-6].

  17. 17.

    Réponse de la France à la résolution 68/243 relative aux “Développements dans le domaine de l’information et des télécommunications dans le contexte de la sécurité internationale”. https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2014/10/France.pdf [2016-9-19].

  18. 18.

    International Covenant on Civil and Political Rights. http://www.un.org/chinese/hr/issue/ccpr.htm [2016-10-6].

  19. 19.

    GEORGIA General appreciation of the issues of information security. https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2014/07/Georgia.pdf [2016-9-19].

  20. 20.

    Cyber Security Strategy of Georgia. https://www.itu.int/en/ITU-D/Cybersecurity/Documents/National_Strategies_Repository/Georgia_2012_NationalCyberSecurityStrategyofGeorgia_ENG.pdf [2016-10-6].

  21. 21.

    Germany: “Report on Developments in the Field of Information and Telecommunications in the Context of International Security”. https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2015/08/GermanyISinfull.pdf [2016-9-19].

  22. 22.

    Germany: “Report on Developments in the Field of Information and Telecommunications in the Context of International Security”. https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2014/07/Germany.pdf [2016-9-19].

  23. 23.

    Developments in the field of information and telecommunications in the context of international security Kingdom of the Netherlands. https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2015/08/NetherlandsISinfull.pdf [2016-9-19].

  24. 24.

    Q-CERT, Annual Reprot 2014. https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2015/08/Qatar-IS.pdf [2016-9-19].

  25. 25.

    The Republic of Korea. https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2015/08/ROKISinfull.pdf [2016-9-19].

  26. 26.

    Republic of Korea. https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2014/10/ROK.pdf [2016-9-19].

  27. 27.

    REPUBLIC OF SERBIA: “Developments in the field of information and telecommunications in the context of international security”. https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2014/07/Serbia.pdf [2016-9-19].

  28. 28.

    Стратегију развоја информационог друштва у Републици Србији до 2020. Године. http://mtt.gov.rs/download/3/Strategija_razvoja_informacionog_drustva_2020.pdf [2016-10-6].

  29. 29.

    Asunto: RES 69/28 “Avances en la esfera de la información y las telecomunicaciones en el contexto de la seguridad internacional”. https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2015/08/SpainISinfull.pdf [2016-9-19].

  30. 30.

    INFORME DE ESPAÑA SOBRE CUMPLIMIENTO DE RESOLUCION. https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2014/10/Spain.pdf [2016-9-19].

  31. 31.

    Submission by Sweden to UNGA resolution 68/243 entitled “Developments in the field of information and telecommunications in the context of international security”. 2014-9-12. https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2014/10/Sweden.pdf [2016-9-19].

  32. 32.

    Response to General Assembly resolution 69/28 “Developments in the field of information and telecommunications in the context of international security”. https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2015/08/UKISinfull.pdf [2016-9-19].

  33. 33.

    UK planning huge budget to fight cyber terrorism in the coming 5 years. http://news.xinhuanet.com/world/2015-11/18/c_128439327.htm [2016-10-6].

  34. 34.

    Response to General Assembly resolution 68/243 “Developments in the field of information and telecommunications in the context of international security”. https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2014/07/UK.pdf [2016-9-19].

  35. 35.

    White House, and United States of America. “The National Strategy to Secure Cyberspace.” https://www.us-cert.gov/sites/default/files/publications/cyberspace_strategy.pdf [2016-9-17].

  36. 36.

    National Security Presidential Directive/NSPD-54/ Homeland Security Presidential Directive/HSPD-23. http://fas.org/irp/offdocs/nspd/nspd-54.pdf [2016-9-17].

  37. 37.

    Cyber Space Policy Review. http://energy.gov/sites/prod/files/cioprod/documents/Cyberspace_Policy_Review_final.pdf [2016-10-6].

  38. 38.

    The USA PATRIOT: Uniting and Strengthening America by Providing Appropriate Tools Requires to Intercept and Obstruct Terrorism. https://www.gpo.gov/fdsys/pkg/CREC-2001-10-23/pdf/CREC-2001-10-23-pt1-PgH7159-3.pdf [2016-8-30].

  39. 39.

    The Terrorism Act 2006. https://www.gov.uk/government/publications/the-terrorism-act-2006 [2016-9-20].

  40. 40.

    Law of the Russian Federation ON MASS MEDIA. http://www.policy.hu/myagmar/Russian_Mass_Media_Law_I.PDF [2016-10-7].

  41. 41.

    Singapore MDA:Internet Code of Practice. http://www.doc88.com/p-0116897120261.html [2016-10-7].

  42. 42.

    Cyber information security of Singapore. http://news.cnwest.com/content/2012-12/27/content_8028700.htm [2016-9-21].

  43. 43.

    Megan Meier Cyberbullying Prevention Act, H.R. 1966, 111th Cong. 2009. https://www.govtrack.us/congress/bills/111/hr1966/text [2016-9-120].

  44. 44.

    Children’s Internet Protection Act. https://www.fcc.gov/consumers/guides/childrens-internet-protection-act [2016-9-20].

  45. 45.

    Network Blacklist Act passed by Russian Federal Committee. http://news.xinhuanet.com/world/2012-07/27/c_112552785.htm [2016-9-17].

  46. 46.

    Russia promulgated New Rules of Popular Blogger. http://news.sina.com.cn/m/2014-05-06/035730066703.shtml [2016-9-17].

  47. 47.

    Responsibility of Internet Celebrities and Service Provider Clarified by New Law in Russia to Purify Cyberspace. http://www.npopss-cn.gov.cn/n/2014/0519/c219470-25036190.html [2016-9-27].

  48. 48.

    Cyber-crime Convention. http://www.europarl.europa.eu/meetdocs/2014_2019/documents/libe/dv/7_conv_budapest_/7_conv_budapest_en.pdf [2016-10-6].

  49. 49.

    Additional Protocol to the Convention on Cybercrime, Concerning the Criminalisation of Acts of a Racist and Xenophobic Nature Committed through Computer Systems. https://ccdcoe.org/sites/default/files/documents/CoE-030128-AdditionalProtocol.pdf [2016-8-30].

  50. 50.

    Zhang YJ (2011) Protecting the rights of minority by fighting against cybercrime—introduction and analysis of additional protocol to the convention on cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems. J South-Central Univ Nationalities (Humanities and Social Science) 31(2):124–127.

  51. 51.

    Information, Information Technology and Information Protection Act of Russia. http://b2b.toocle.com/detail--6058251.html [2016-9-17].

  52. 52.

    Commonwealth Consolidated Acts. http://www.austlii.edu.au/au/legis/cth/consol_act/iga2001193/ [2016-8-30].

  53. 53.

    Act on Promotion of Information and Communication Network Utilization and Information Protection. http://unpan1.un.org/intradoc/groups/public/documents/APCITY/UNPAN025694.pdf [2016-8-30].

  54. 54.

    Spam filled with temptation, special law promulgated in Japan to purify the Internet. http://japan.people.com.cn/2003/10/9/print/200310982155.htm [2016-10-6].

  55. 55.

    Foreign Spam Regulations: Japan Spam Ruled by Law. http://news.sina.com.cn/w/2003-11-03/13091047696s.shtml [2016-9-21].

  56. 56.

    Singapore Spam Control Act 2007. http://www.lawgazette.com.sg/2007-8/feature2.htm [2016-10-7].

  57. 57.

    China Court. Org. Singapore Law for Regulating Spam. http://old.chinacourt.org/html/article/200704/13/242472.shtml [2016-9-23].

  58. 58.

    Singapore Put in Force A Series of Acts, Guaranteeing Internet Rights of Netizens to the Largest Extent. http://news.163.com/12/1227/18/8JOJ01MB00014JB5.html?from=tagtie [2016-9-21].

  59. 59.

    Spam Act 2003. https://www.legislation.gov.au/Details/C2011C00080 [2016-9-21].

  60. 60.

    Interpretation of Spam Act of Australia. http://www.chinaemail.com.cn/blog/content/2413/ [2016-9-21].

  61. 61.

    Electronic Communications Privacy Act of 1986 (ECPA). https://it.ojp.gov/PrivacyLiberty/authorities/statutes/1285 [2016-9-21].

  62. 62.

    On the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation). http://ec.europa.eu/justice/data-protection/reform/files/regulation_oj_en.pdf [2016-9-17].

  63. 63.

    Federal Data Protection Act 2015 newest edition—BDSG2015. http://wenku.baidu.com/view/742095805901020206409c83.html [2016-9-21].

  64. 64.

    Federal Data Protection Act of German Protects Information Security. http://media.sohu.com/20121224/n361396045.shtml [2016-9-21].

  65. 65.

    Privacy and Electronic Communications (EC Directive) Regulations 2003. http://www.legislation.gov.uk/uksi/2003/2426/pdfs/uksi_20032426_en.pdf [2016-10-7].

  66. 66.

    Privacy and Electronic Communications (EC Directive) Regulations of the UK. http://www.infseclaw.net/news/html/1082.html [2016-9-21].

  67. 67.

    Personal Information Protection Act (2003, No. 57). http://www.iolaw.org.cn/showNews.asp?id=12426 [2016-9-27].

  68. 68.

    White Paper on Chinese Internet (full text). http://www.scio.gov.cn/zxbd/tt/Document/1011194/1011194.htm [2016-8-30].

  69. 69.

    State Security Law of the People's Republic of China, approved by vote of the NPC Standing Committee on July 1, 2015. http://www.gov.cn/xinwen/2015-07/01/content_2888316.htm [2016-9-1].

  70. 70.

    State Security Law of the People’s Republic of China. http://www.npc.gov.cn/npc/xinwen/2016-11/07/content_2001605.htm [2016-11-23].

  71. 71.

    The Ninth Amendment to the Criminal Law of the People’s Republic of China (Document No. 30). http://www.gov.cn/zhengce/2015-08/30/content_2922323.htm [2016-10-6].

  72. 72.

    Lang S (2015) Interpretation of the network security law (Draft) of the People’s Republic of China. China Inf Secur 08: 52–55. http://www.doc88.com/p-7738264157865.html [2016-12-13].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Binxing Fang .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Science Press and Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Fang, B. (2018). Positions of States Toward Cyberspace and Cyber-Relating Regulations. In: Cyberspace Sovereignty . Springer, Singapore. https://doi.org/10.1007/978-981-13-0320-3_8

Download citation

Publish with us

Policies and ethics