China Adopts Malicious “Cybersecurity” Rules

by Gordon G. Chang

  • After all these “cybersecurity” rules are in place, no foreign company may encrypt data so that it cannot be read by the Chinese central government and the Communist Party of China. In other words, businesses will be required to turn over encryption keys.

  • Chinese officials will be permitted, under Chinese law, to share seized information with state enterprises. This means the enterprises will be able to use that information against their foreign competitors.

  • The American people have an interest in China not taking control of American companies with operations in China–a probable consequence of the application of the December 1 and January 1 measures.

  • The American people have a vital interest in the protection of American data. Trump should issue such an order immediately.

Beijing’s complete visibility into the networks of foreign companies will have extremely disadvantageous consequences. (Photo: Wikimedia Commons.)

On January 1, China’s Cryptography Law becomes effective. The legislation follows the December 1 implementation of the Multi-Level Protection Scheme 2.0, issued under the authority of the 2016 Cybersecurity Law.

Together, these measures show Beijing’s absolute determination to seize from foreign companies all their communications, data, and other information stored in electronic form in China.

President Trump should use his emergency powers to prohibit American companies from complying with the new rules or from storing data in China.

After all these “cybersecurity” rules are in place, no foreign company may encrypt data so that it cannot be read by the Chinese central government and the Communist Party of China. In other words, businesses will be required to turn over encryption keys.

Companies will also be prohibited from employing virtual private networks to keep data secret, and some believe they will no longer be allowed to use private servers.

https://www.gatestoneinstitute.org

SHARE THIS POST