Page 504 - 2021 White Paper
P. 504
1 White Paper on the Business Environment in China
networks launched. Because the US was the first and procedures to comply with existing laws.
country to make 4G available on a wide scale, Operators of “critical information infrastructure”
American firms were quick to take advantage are required to conduct reviews of networking
of it and sell the resulting apps globally. China’s equipment and services to address any national
manufacturing center, Shenzhen, could tap 5G security concerns. The rules could affect
to connect huge volumes of devices to the cloud purchases of server equipment, mass storage
and become a leader in the internet of things, devices, cloud computing services, and large-
often known simply as IoT (Woyke). scale databases, among others. There is no
clear definition of which companies could be
With China on the brink of an exciting new classified as critical information infrastructure
technological era, the nation's Ministry of operators, though they broadly include firms
Industry and Information Technology has laid involved in the finance, energy, transportation,
out how China will get there. 5G, IoT, more and telecommunications industries, or those
advanced artificial intelligence, it's all right that handle large amounts of personal data.
around the corner. The key words summing up Operators are required to make “anticipatory
China's industry and information technology judgments” over whether the use of the
sector have placed big expectations on 2021. equipment could pose a threat to national
Miao Wei, minister of China’s Ministry of security. A new government office was up to
Industry and Information Technology, claims conduct evaluations to determine whether
the Information and Communication Technology the equipment can be interfered with or
sector has kept good momentum. Based on illegally controlled, whether the systems could
the current development, relatively good jeopardize data security, or if there are risks
commercial 5G terminals have already started of service outages. Previous updates to China’s
appearing across the nation, especially in large cybersecurity frameworks placed additional
urban areas. Wen also says that a fair and just burdens on foreign companies and how they
business environment should be provided for handle data collected from Chinese citizens. In
Chinese companies, like Huawei, in international 2018, Apple moved all of its Chinese user data to
5G cooperation. The ministry adds that China China through a partnership with a data center
will always have an open heart for strengthening operator in the country’s southwestern Guizhou
cooperation with other countries, quickening province. Cloud operators, including Microsoft
the advancement of 5G, and benefitting more Azure and Amazon Web Services, are required to
people at an early date (Zheng). offer their products through partnerships with
Chinese companies (Udemans).
Cybersecurity
The Cybersecurity Review Office will provide
China has released new rules requiring written notification to the relevant Operator if
companies buying networking products and it thinks a cybersecurity review is required and
services to perform cybersecurity evaluations for shall complete the preliminary review within
vulnerabilities that could affect national security. 30 working days of such written notification.
China has been imposing stricter controls over The time limit may be extended by 15 working
the technology that makes up the backbone days if the case is complicated. As for special
of its internet and how people interact in the review, it shall be completed within 45 working
cyber world. In 2017, China implemented its days normally, but the time limit may be
landmark Cybersecurity Law, which has served extended if the case is complicated. The time
as a framework for regulations that have been for supplemental document submission is
rolled out since. The law set standards for the not included in these time limits. According to
governance of the country’s internet, including the Measures, the relevant organizations and
rules over real-name verification, content personnel involved in the cybersecurity review
moderation, and data localization. The new shall maintain strict confidentiality with regard
rules clarify procurement review requirements to the commercial secrets and intellectual
property rights of the enterprises. They shall
504
networks launched. Because the US was the first and procedures to comply with existing laws.
country to make 4G available on a wide scale, Operators of “critical information infrastructure”
American firms were quick to take advantage are required to conduct reviews of networking
of it and sell the resulting apps globally. China’s equipment and services to address any national
manufacturing center, Shenzhen, could tap 5G security concerns. The rules could affect
to connect huge volumes of devices to the cloud purchases of server equipment, mass storage
and become a leader in the internet of things, devices, cloud computing services, and large-
often known simply as IoT (Woyke). scale databases, among others. There is no
clear definition of which companies could be
With China on the brink of an exciting new classified as critical information infrastructure
technological era, the nation's Ministry of operators, though they broadly include firms
Industry and Information Technology has laid involved in the finance, energy, transportation,
out how China will get there. 5G, IoT, more and telecommunications industries, or those
advanced artificial intelligence, it's all right that handle large amounts of personal data.
around the corner. The key words summing up Operators are required to make “anticipatory
China's industry and information technology judgments” over whether the use of the
sector have placed big expectations on 2021. equipment could pose a threat to national
Miao Wei, minister of China’s Ministry of security. A new government office was up to
Industry and Information Technology, claims conduct evaluations to determine whether
the Information and Communication Technology the equipment can be interfered with or
sector has kept good momentum. Based on illegally controlled, whether the systems could
the current development, relatively good jeopardize data security, or if there are risks
commercial 5G terminals have already started of service outages. Previous updates to China’s
appearing across the nation, especially in large cybersecurity frameworks placed additional
urban areas. Wen also says that a fair and just burdens on foreign companies and how they
business environment should be provided for handle data collected from Chinese citizens. In
Chinese companies, like Huawei, in international 2018, Apple moved all of its Chinese user data to
5G cooperation. The ministry adds that China China through a partnership with a data center
will always have an open heart for strengthening operator in the country’s southwestern Guizhou
cooperation with other countries, quickening province. Cloud operators, including Microsoft
the advancement of 5G, and benefitting more Azure and Amazon Web Services, are required to
people at an early date (Zheng). offer their products through partnerships with
Chinese companies (Udemans).
Cybersecurity
The Cybersecurity Review Office will provide
China has released new rules requiring written notification to the relevant Operator if
companies buying networking products and it thinks a cybersecurity review is required and
services to perform cybersecurity evaluations for shall complete the preliminary review within
vulnerabilities that could affect national security. 30 working days of such written notification.
China has been imposing stricter controls over The time limit may be extended by 15 working
the technology that makes up the backbone days if the case is complicated. As for special
of its internet and how people interact in the review, it shall be completed within 45 working
cyber world. In 2017, China implemented its days normally, but the time limit may be
landmark Cybersecurity Law, which has served extended if the case is complicated. The time
as a framework for regulations that have been for supplemental document submission is
rolled out since. The law set standards for the not included in these time limits. According to
governance of the country’s internet, including the Measures, the relevant organizations and
rules over real-name verification, content personnel involved in the cybersecurity review
moderation, and data localization. The new shall maintain strict confidentiality with regard
rules clarify procurement review requirements to the commercial secrets and intellectual
property rights of the enterprises. They shall
504