Cybersecurity By All,For All

来源 :Beijing Review | 被引量 : 0次 | 上传用户:jiebaidexue
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  On September 8, China proposed the Global Initiative on Data Security to meet the new challenges emerging in global digital governance. State Counselor and Foreign Minister Wang Yi announced the proposal while addressing the International Seminar on Global Digital Governance via video link.


A cybersecurity lab of Chinese tech fi rm ZTE in Brussels, Belgium, on July 10, 2019

  Besides the eight points (see box) the initiative is based on, Wang highlighted a few other issues. The response to the novel coronavirus pandemic has seen digital technologies play an important role in keeping society and the economy running. Wang likened the ensuing explosive growth of data to the discovery of oil, providing a new source of energy for economic growth and industrial transformation.
  However, since different countries have different data laws and regulations, it is pushing up the compliance costs for global businesses. Therefore collective governance of cyberspace with unifi ed rules will benefi t everyone. The initiative is meant to be a start to that process.

Individual efforts


  In recent years, many countries have been making laws on their own data use and protection. For example, the EU introduced the General Data Protection Regulation, which came into effect in 2018. It is the 27-member bloc’s primary law now, regulating companies’ protection of EU citizens’personal data.
  The United States’ Clarifying Lawful Overseas Use of Data Act enacted in 2018 can compel U.S.-based technology companies to hand over any data the government wants, regardless of whether it is stored on servers in the U.S. or on foreign soil.
  China has nearly 900 million Internet users, and a massive amount of data is generated every day. The security of data is vital for the privacy of the users, the intellectual property rights of enterprises, and national security. The Chinese Government has in recent years stipulated multiple laws to guarantee data security, including the Cybersecurity Law, Intelligence Law and Anti-Terrorism Law. A data security law and a personal information protection law are under consideration.
  But even as states enhance their own data security and sovereignty, concerted global efforts are hard to implement due to lack of coordination of their policies. The absence of international rules has increasingly become a stumbling block for the development of the global digital economy and international cooperation.

Acting together


  China’s legislation can be viewed as being exploratory since data security protection is a new area. But some of its efforts have been misinterpreted by the international community. So the initiative, as an offi cial statement of China’s position on data security, responds to those concerns.
  For example, some countries have recently accused China of being non-transparent in its data protection policies and forcing Chinese enterprises to transfer their overseas data back home. The initiative says states should not request domestic companies to store data generated and obtained overseas in their own territory.
  It is also a response to the U.S. administration’s Clean Network program, which calls for clean carrier, clean store, clean apps, clean cloud and clean cable. However, its critics regard it as an initiative to upgrade American containment and suppression of Chinese technology companies such as Huawei and digital products like TikTok on the ground of so-called national security concerns.
  This, besides violating China’s national security, also affects the security of global supply chains and the innovation environment in cyberspace. In the long run, such unilateral actions will further split cyberspace and pose serious threats to global economic growth and people’s wellbeing.
  On the other hand, the initiative proposed by China is not unilateral. It upholds multilateralism, fairness and justice, and calls on all countries, international organizations and other stakeholders to participate in the rule-making process on an equal basis to forge a community with a shared future for all in cyberspace. Wang said China is open-minded to good ideas and suggestions from all.


Representatives of Chinese cybersecurity solutions provider Qi-Anxin pose for a photo at the 2020 RSA Conference in San Francisco, the U.S., on February 25. The company received two awards from Cyber Defense Magazine, an American e-magazine, at the conference

  If governments, international organizations, information technology companies, technology communities, civil organizations and all other actors join the discussions, the ensuing extensive consultations will lead to joint contributions and shared benefi ts.
  China has already given its inputs on digital governance at multilateral forums like the UN, Group of 20, BRICS and the ASEAN Regional Forum. It should continue the diplomatic drive on more international platforms like the Shanghai Cooperation Organization and Forum on China-Africa Cooperation to seek wider international support for the initiative.   In addition, it can be promoted through bilateral cooperation dialogues with other countries. A consensual global initiative will contribute to cybersecurity and the development of the global digital economy.
  Key Points of the Global Initiative on Data Security
  ● States should handle data security in a comprehensive, objective and evidencebased manner, and maintain an open, secure and stable supply chain of global information and communications technology (ICT) products and services.
  ● States should stand against ICT activities that impair or steal important data of other states’ critical infrastructure, or use the data to conduct activities that undermine other states’ national security and public interests.
  ● States should take actions to prevent and put an end to activities that jeopardize personal information through the use of ICTs, and oppose mass surveillance against other states and unauthorized collection of personal information of other states with ICTs as a tool.
  ● States should encourage companies to abide by laws and regulations of the state where they operate. States should not request domestic companies to store data generated and obtained overseas in their own territory.
  ● States should respect the sovereignty, jurisdiction and governance of data of other states, and shall not obtain data located in other states through companies or individuals without other states’ permission.
  ● Should states need to obtain overseas data out of law enforcement requirement such as combating crimes, they should do it through judicial assistance or other relevant multilateral and bilateral agreements. Any bilateral data access agreement between two states should not infringe upon the judicial sovereignty and data security of a third state.
  ● ICT products and services providers should not install backdoors in their products and services to illegally obtain users’ data, control or manipulate users’ systems and devices.
  ● ICT companies should not seek illegitimate interests by taking advantage of users’dependence on their products, nor force users to upgrade their systems and devices. Products providers should make a commitment to notifying their cooperation partners and users of serious vulnerabilities in their products in a timely fashion and offering remedies.
其他文献
Gyaltsen, a Tibetan born in Markam County in eastern Tibet Autonomous Region, started his own online business this summer after years of working in faraway cities. Now, the 27-year-old runs two online
期刊
Lake of Tranquility An aerial view of Nahai Lake in Luqu, a county in Gannan Tibetan Autonomous Prefecture in Gansu Province, northwest China, on September 15. Thanks to a ban on herding and other eff
期刊
In Benak, a village in Dagze District of Lhasa, capital of Tibet Autonomous Region, 55-yearold Badro is deemed as a dedicated pathfinder by villagers.  As a native of the village, he became a member o
期刊
For Gu Lifeng, who runs a self-driving club in Xi’an, Shaanxi Province in northwest China, August signaled fresh opportunities as he set out for a new tour to Tibet Autonomous Region in southwest Chin
期刊
The fi rst quarter of 2020 found the world in shock. The novel coronavirus disease(COVID-19) pandemic disrupted daily activities and required unprecedented lockdowns. The nature of international diplo
期刊
The Ministry of Commerce (MOFCOM) and the Ministry of Science and Technology unveiled China’s newly revised catalogue of technologies prohibited and restricted from export on August 28, touching upon
期刊
When our family moved to Xiamen in the southeastern province of Fujian in 1988, it was hard to believe that only a century earlier many Westerners had claimed that Xiamen boasted the wealthiest square
期刊
Xiamen Airlines’ Flight MF8095, the first flight to arrive in Wuhan after the city lifted travel restrictions due to COVID-19, is welcomed at the Tianhe Airport in Wuhan, Hubei Province in central Chi
期刊
One of the most challenging tasks for Western scholars is understanding China. The differences in their cultures overshadow the interpretation of China in Western discourse. As a result, China is regu
期刊
Xiamen has a long trading history. Since the Song Dynasty (960-1279), the ancient Tea Horse trade route had run through it and other cities in Fujian Province, southeast China. Caravans carried tea, s
期刊