PRC's 5 Cybersecurity And Data Laws Explained

Published Aug 09, 2021 12:07 PM

China (PRC) has enacted 5 major laws in the past 6 years, including 2 this year, that define the legal cybersecurity obligations of PRC manufacturers to the PRC government.

PRC video surveillance manufacturers are legally obligated to cooperate with PRC police and intelligence, hand over relevant data, guard state secrets, and "not overturn the socialist system".

PRC authorities say these laws are aimed at "maintaining national security" and "public interest" and include human rights protections. Overseas critics say these "wide-ranging powers" can be used by the government "to build backdoors" and silence dissent.

IPVM Image

In this report, IPVM examines five PRC data laws and their impacts:

  • The National Security Law (2015)
  • The National Intelligence Law (2017)
  • The Cybersecurity Law (2017)
  • The Data Security Law (2021)
  • The Vulnerability Regulation (2021)
  • How these laws contrast to EU, US, and UK cybersecurity laws

For each law, we share the PRC government's rationale and concerns from critics.

Executive *******

** ******** ** *** **, **, and *** **, *** *** *** enacted ******** ************* *** **** **** requiring ************* ** "*********, *******, *** assist" *** **********.

*** **** ******* *** ***** "*********" with *** ******, ************, *** ********, leaving *** **** "*********" *********:

  • *** ***** "***** *******, ******, *** cooperate **** ******** ************" [******* *, Intelligence ***, ****]:

IPVM Image

  • *** ***** "*****" ******* ************ ******** access *** "******** ***" ** ***** "communication *****", *********, *** *** "******** files" [******** **-**, ************ ***, ****]
  • *** ********* "*****" ******* ******, ********, and ************ "******" [********] **** "********* support *** **********" [******* **, ******** Security ***, ****]

*** **** ******* ******* *** *** any *** **** **** ***** *** internet ** "******** *** ********* ******":

  • *** ***** "***** ******* ******** ************ work *******" [******* *, ************ ***], "keep ***** ******* **** ***** ** confidential" [******* **, ******** ******** ***, 2015], "***** ***** *******" [******* **, Data ******** ***, ****]
  • *** ***** ****** *** *** ******** to "******** *** ********* ******" ** "endanger ******** *****" [******* **, ************* Law, ****]

*** **** ****** ********** "******** ******** reviews" *** *** ********** **** **** "might ****** ******** ********":

  • "******** ********" ****** *** *** ** products *** ******** "**** ****** ** might ****** ******** ********" [******* **, National ******** ***, ****]
  • "******** ******** *******" *** *** ********* of ********** ******** ** "******** *********** infrastructure *********" **** "***** ****** ******** security" [******* **, ************* ***, ****]

*** **** ******** ******** *** *** when ***** ******** ***************, ********* ***** be **** ** *** ********** ****** two **** *** ****** ******* ** certain *****:

  • *** ***** "*****" **** *** ************* information ** *** ********** "****** *** days"; *** ***** "*****" "********" ****** users ** ******** ********* [******* *, Vulnerability **********, ****]
  • *** ***** ****** ******** *************** "****** major ****** **** ** *** *****" "without *************" **** *** ****** [******* 9, ************* **********, ****]

*** **** **** **** *********** *** human ****** ***********:

  • "******** ************ *******" ***** "******* *** protect ***** ******" [******* *, ************ Law, ****]
  • ************* **** "*** ***** ** ***** criticisms *** ***************" *** "*** ***** to **** **********, *******, ***********" [******* 82, ******** ******** ***, ****]

*** **** ****** ********** **** *****, detention, *** **** **** ***** **** potential *********** ******** ***********:

  • ***** ** ** ** ~$***,***, ********* of ** ** ** ****, **** 5 *****' *** ** ******* ** "cybersecurity ********** ** *** ******* **********"; separately, "******** **************" *** ** "*******" [Articles ** & **, ************* ***, 2017]
  • ***** ** ** ** $*.* ******* and ******* ************* [******** **-**, **** Security ***, ****]
  • ** ** ** **** ********* *** potential ******** *********** [******** **-**, ************ Law, ****]

Comparison ** **/** ****

** *** **, ****-******** ********/********* *** required *** ****** ** ****** **** fromIPVM Image**********; ***** ** ** ******* ** state ******* *** ** ********* ** cooperate **** ******. *** ** ********** obtains **** *** ******* ************ ******** through ***************-********** (*** *********)**** ******.*********** ***** ************** ************ *********, ******* ****** ** surveillance ** ** *******/*********, ***** ******** ***, ****** ** ****** ** ****** data ****** ******** **** * *******. The *** (********) **** ************ ******* exposed ** ****** ******* - ***** collected ******** ** ** ********' ***** - ******** ******* **** *********.

** *** **, ******** ************ ** regulated ** *** ******* *****; ** data *********** ********** - ****** *********** *********(*** ******) *** *** **** (*** *********/***********)- **** ** *********** ******** **** police/intelligence. *****'* **** ********* ************ ******** **** ****** ******** from *** ********* ********** ******** ****** being **** ** ****** ******** ** any *********** **************.

** *** *****, ***** *** **** are **** *******-****** **** ***** **/****** counterparts. *** *** **** ** ******* human ****** ***********, ******** ***** ***** in *** ******* ** *** *** ranking **** *** ****** ** ****** indices ******* ******************* *******,**** *** ********* ** *** *** Supreme *************** ******** ************** * "***** ******* ****" *** PRC ****** ****** ***.*% ********** ****.

National ******** *** (****)

******* ******** ******** ***(*******) *** ******* "** ******** ******** security, ** ****** *** ******'* ********** dictatorship *** *** ****** ** ********* with ******* ***************".

IPVM Image

*** ******* **, ********* "*****" ******* police, ********, *** ************ "******" [********] with "********* ******* *** **********" ***** "keeping ***** *******" ************:

IPVM Image

******* ** ****** ********* "********* ******** security" *** "********* ** ***":

IPVM Image

******* ** ******* "******** ******** ******" checks *** *** ** ******** *** services "**** ****** ** ***** ****** national ********":

IPVM Image

******* ** ***** *** ********** **** "maintaining ********** ***********" *** ******* * "national ******* *** *********** ******** ********* system":

IPVM Image

*** ***** ***** *** ********** *********** means"** ********** *******'* ***** ** ****** its *** ******** ********** *****". *** PRC****** ********* ****** ***** ********* *** **** websites (********* ****).

******* ** ***** *** ***** **** "accelerating" *** *********** ** "************ **********" - **** ********** ** "****** *** controllable" - ******** ************:

IPVM Image

******** **-** ***** ************* "*** ***** to ***** ********** *** ***************" *** "the ***** ** **** **********, *******, accusations":

IPVM Image

National ******** *** ***************

*** ********** *********** ***** ************ *** ***** **** *** **************** "****************" *** "******** ********* ******** and ****** *********":

********** ********, *** ******* **** ****** its ***********, ** **** ** ******** and *********** *********, *** [...] ** must ****maintain ********* ******** *** ****** ********* [...]

*****’*cybersovereignty ***** ** ********* *** ********** Raising the idea of ‘safeguarding national cybersovereignty’ in the National Security Law is a response to the needs of the development of the Chinese Internet. It provides the legal basis for managing cyberactivity on China’s soil and resisting activities which jeopardize China’s cybersecurity.”

******* ***** **** *** ******************* *** "******** *******" **** *** internet **** "****-******* ****** *** *** exact *******".*** *** **** ***** ************ ******** ***** ********** "****** *** controllable" ********** *** ** ***** **** companies ***** ** ****** ** ***** backdoors:

IPVM Image

*** *** **** ***** *** ********** that ******** ******* ******* ** ** “secure *** ************,” * *********** **** multinationals *** ******** ****** *** ***** be **** **force ********* ** ***** **-****** **** ***** - which allow third-party access to systems - provide encryption keys or even hand over source code [emphasis added]

***** ****** ***** ******* ************* **** the *** ***** "******" ** **** to "*******" *******,*******:

IPVM Image**** *** ****** *** ********* *** government ** ***** ******** *** **easily ******* ***** ***** ****, and [the government can] imprison them or fine them or what[ever] they want to do to silence ***** ****** [emphasis added]

National ************ *** (****)

*********** ************ ******* **** ****** ** **** "** strengthen *** ******* ******** ************ ****, safeguarding ******** ******** *** *********" ** the *** **********.

IPVM Image

*** **** ****-***** ****** ** ******* 7, ***** ******** **** *** *** people *** ************* "*******, ******, *** cooperate" ************ ******** *** "******* ******** intelligence **** *******":

IPVM Image

******* * *** ** *********** *** there ** ** ******* ** ******** or ************ ** * *** ****** refuses. ***** ******** ********* ******* ******, e.g. ******* ** ***** ******** *** right ** "********* *********** ************* **** relevant *********** *** *************":

IPVM Image

******* ** **** ****** ************ "*** request" *** "******** [...] ************* *** citizens ******* ********* *******, **********, *** cooperation":

IPVM Image

******** **-** **** ************ ******* *** right ** "***** ******** ********** ***** and ******", "******** ******** ************", *** "read ** ******* ******** *****, ********* or *****" ***** **** ****** ****** to ****** "************** ** ************** *****":

IPVM Image

*** *** *** *** ******** ******* that "******** ************ *******" ***** "******* and ******* ***** ******", *** ******* explaining *** (******* *):

IPVM Image

******* ** ******** ************ ******** **** not "****** ** ***** ***** *********", nor "******* *** ****** ******" ** PRC *******, *** "*** ***** ******** to ********** ******* ********" (*.*. **********):

IPVM Image

Intelligence *** ***************

*** ************ ***'* ******* ** "*******, assist, *** *********" ************ ******** ******* strong ******* ** *** ****, **** the** *** ******* * ******** *************** **** ***** *** *** ********** can ***** ********* ** "****** *********" or "***** ******" ** ** *******' data:

IPVM Image

* *** ************ ******may ******* **** *** *** **** ** ****** ******** ***** ****** ** * *.*. ******** ** **********’* ****, or otherwise face penalties. In addition, the National Intelligence Law may ****** *** ***** ** ****** ********* and other security vulnerabilities in equipment and software sold abroad so that the PRC government can easily access data not controlled by PRC firms. [emphasis added]

** ********, *** ************** ***** ********* ************ *** "******** *** ******** human ******", ******** ** ******** * and **:

IPVM Image

********* ** *****’* ******** ************ ***, organizations *** ******** **** *** ********** to *******, ****** *** ********* **** national ************ ****. ** *** **** time ** ****explicitly ********** **** ************ **** ****** ** ********* ********* ** *** *** ** * *** **** ******** *** ******** ***** ****** and the lawful rights of individuals and organization [emphasis added]

*** ****, ********* *** ***************,******* ******* ***** ****** *********** **** freedom ** ****** *** ********, ******* the *** ********** **** ***** **** last ** ******* ***** ****** ******** (***/*** ** ***** *******,"*** ****" ********* ******,***).

*** ***'****** ******* *** ***** ****** *******, ******* ** ****** ******** ** Tibet******* ******, ****** **** "***** ****** **** ******* ***************" ***** "****** ** *** ********** of *** *****" *** ********** **** "the ***** ** [********] ***********" ** above "*** *** ***** ***** ******".

Cybersecurity *** (****)

** ****, *** *** ******* **************** ***(*******), ***** ** ******** ** "****** cybersecurity" *** "********* ********** *********** *** national ********".

IPVM Image

******* ** ****** "*** ****** *** organization ***** ********" "***** [...] ******* public *****, *** ******* ****** ********" and "**** *** *** *** ********" to ******** "******** ********, ******** *****" and **** *** *** ** ** "overturn *** ********* ******":

IPVM Image

***** ***** *.*. "******** *****" *** left *********. ******* ** ******** ******* operators "******* ********* ******* *** ********** to ****** ******** ****** *** ******** security ******":

IPVM Image

"********* ******* *** **********" ** *** specified. ******* ** ****** "******** ***** or ***************" ** "********" ********* ** users:

IPVM Image

******* ** ******** ******** "******** ******** to *** ****** ***** ** ******** published":

IPVM Image

******* ** ******* "******** ******** *******" for *** ********* ** ********** ******** and ******** ** "******** *********** ************** operators" ** **** "***** ****** ******** security":

IPVM Image

**** ** ******* ** *** **** National ******** ***'* ******* **, ***** creates "******** ******** *******" ** *** networking **** ******** ** ******** ********.

*** ************* ***'* ******* ** ******** that *** **** ******* ** *** operations "***** ***** ** ****** ******** China":

IPVM Image

Cybersecurity *** ***************

* ***** ****** *** ** ****** research **************** ****"*** ********* ****** ** *** *** allows *** ********** **** ***** ** request *** ******* ***********". ************* *** firm******** ****** ******* ***'* ********** ** "*********" **** authorities "*** ******" *********' ******** ** PRC ***********, ************ "**** ** ******** segregated":

IPVM Image

*** *** *** **** ******* **obligation ** ********* with public and State security authorities to investigate suspicious crimes, which may ****** **************' *** ******* ********* ************' ******* ******* ** *** ***********. It is advisable therefore for a multinational to consider measures to ensure data is properly ********** to avoid inadvertent disclosure to the PRC authorities. [emphasis added]

*** *** ******** *********, *** ********** Administration ** *****,**** *** *********** *** "*******, **** **** ** data" *** "** ******** ** ********* sovereignty ** **********, ******** ********, *** public ********, ** **** ** *** rights *** ********* ** ********".

** **** *** ******** ******* ********* or ***** ********** *** ******** **** entering *** ******* ******, *** **** it ***** ***orderly, **** **** ** ****. China is entitled to make laws and rules to regulate its cyberspace sovereignty following international practice

*** *** ** ******** **safeguard *********** ** **********, national security, the public interest, as well as therights *** ********* ** ********, legal persons and other organizations [emphasis added]

IPVM Image

Data ******** *** (****)

******* ******** ***(*******)**** **** ****** ********* *, **** and ********* *** "******** ** ****" within *** *** ** ***** ** "protect ********' *** *************' ****** ******" and "******** ***** ***********" *** ********.

IPVM Image

**** ***'* ***** ** ******, **** Article * ********* **** ******** ********** "carried *** ******* *** ********* ** the ***" ** **** *** "******* the ******** ******** ** *** ***":

IPVM Image

******* ** ******** *** ***** "*********" with ****** *** "***** ******** ******" who *** "********** ****" ** "******** national ******** ** *********** ******":

IPVM Image

*** "**** ******** ********** **** ******* state *******" **** ** ******* ********* to ***** *** *********** *** *** ******** ** "***** state *******":

IPVM Image

IPVM Image

******* ** ****** *** "**** ******** activities" **** "***** ****** ******** ********" are ******* ** "******** ******** *******" whose ********* *** "*****":

IPVM Image

*** ******** ****** "******** ******** *******" mirrors *** ******** ******** ***'* ******* 59 *** *** ************* ***'* ******* 35, ***** **** ******* **** ****** for **********/********** *******.

******* ** ****** ***** "*** ** be ******** ********" ** "**** ******** incidents". **** ** ******* ** *** Cybersecurity ***'* ******* ** ********* **** cyber ******** "******** ******** ** *** public ***** ** ******** *********".

IPVM Image

*** **** ******** *** **** ***** the *** *** ***** ** *** "equal ********" ******* *** ****** **** deploy "**************" ** "***********" ******* ******* the ***:

IPVM Image

**** ******** ******* ******'* ********-****** ****-********* ******** ****** *** *** ** ******** anyone *** "************" ** ****-*** *********, including ******'* ********.

Data ******** *** ***************

*** ***** ******** ******** ********** **** *** "********** ** **** greater *****" ** *** ***'* ********* toward "********** **** ** ** ********* act", ** ********* ** *** ***'* global ***** ** ******* *:

IPVM Image

*** ********* ******** ** *** ******** legal ********* ********** ** **** ******* shift ** *** ***’* ******** **** from ********** ******* **** ******* ** a ********* *********, ***toward ********** **** ** ** ********* ***. The Data Security Law defines 'Data Activities' broadly and with a large scope—to include both activities conducted in China and data-related activities undertaken by organizations and individuals outside of China [emphasis added]

***** ***** ************ ***** ******* *** ******** "****** ***** ******* for ********** *******" *** ****** * PRC ************* ********* ******** *** *** for ******* "*********** ******* *** ********* of ****":

IPVM Image

***** **** *****'* ***** ****** **** continue ** ** ******** ** ***** of ******* *** *********** ********, ********* strong *****support *** ********** ******* as well as the safe and healthy development of the digital economy [...] "[the law is] a timely move to curb *********** ******* and spreading of data that is closely linked to national key information and people's livelihoods" [emphasis added]

Vulnerability ********** (****)

************** ** *** ********** ** ******* Product ******** ***************(*******) ** **** ****** ********* *. The *********** ***** ** *** "********* and ******* *********" ** *** *** and *** *********** ******** ** ******* their ***************.

IPVM Image

******* * ****** **** "************* ***********" be **** "****** *** ****" ** a ******** *** ** *** ******** of ******** *** *********** ********** ********* key ********* ******* (******** ********, *****, etc):

IPVM Image

*** ******** ** *** ******, ******* that ******** ********* *, *** *** government **** **** *** *** ******** of ***** ************* ***** ** *********, Dahua, *** ***** *** *************. ******* 7 **** **** ***** ****** ** "promptly ********" ** *****, ** ** already *** **** ** *** ************* and **** ******** ****:

IPVM Image

******* * ******** ******** ************* **********, prohibiting ***** **** ********** "******* ** security *********" *** "************ ************ ******* and *****":

IPVM Image

******* * **** ********* ******* *********** product ******** ************* *********** ** "******** organizations" ***** **** "******* ******* *********":

IPVM Image

******* * ********* *** ***** **** disclosing ******** *************** "****** ***** ****** held ** *** *****" ******* ********** from *** ***'* *** *********** ********:

IPVM Image

*** ** ********** ***** ** ******* US ******* ********* ** *** ********** from *** *** ** ****** ***** of * **** ** ** ******** on **** *.

Vulnerability ********** ***************

******* *** ***, ******** **** ******** on *** ********** ************* ******** ******* in ******* *, **** *** *** of ************* **** *********** **** *************** ******** ******* *** ********** **** "****** *********" use ** *** ********* ********:

*** ********** **** ****** ********* ****** these *************** ** ******* ********** ****** actors

******** **** **** ****** ****** ******, CISO ** ***** ******** **** ****************, that **** ********** ***** "***** ******* disclosures" **** *** *****:

**** *** **** **** ******* *** prior *********** ******** *********** *** *** will ***** **** **** ******* ******** research **** *** ******* ********** *** limit ******* ***********.

**** ***** **** ** ***** ***** coverage ** *** ************* **********.*** ******** ***** *** ********* ********** (***** ***** ****** *******) as ******* "* ****** ******" **** "the ****** ** ******* ******** ** national ******** **** ** ******* ***********. It ** ****** ** ******** *** supervision ** **** *** ****** ******* security."

Comments (5)
UM
Undisclosed Manufacturer #1
Aug 09, 2021

** *** ******* *** ******* ** a **** ** ***, *** **.

(3)
(1)
(1)
UM
Undisclosed Manufacturer #2
Aug 09, 2021

********...**** **** *** *********** ** **** that *** ******* ******* *****, *** having ***** ******** ******** *** ********** inside ***** ** ******* *****, *** obliged ** ****** *** ****** ****? CISCO, *****, ***.?

UE
Undisclosed End User #3
Aug 09, 2021

******* ******** ********* **** ****** ***** laws. ******* ********* **** * ***** operation **** ****** *** *** ** that ********* *****. ** **** ** or ***** ******* ******* ************ ** China, *** ************* **** ****** *** above ***. * ***** *** **** concern ** ****** ******* ***** ***** China **** ** **** ***** **** products "***** ****" *** ******** ******* and **** ********, *** *** *****-***** company ** *** ***** *** ** duty-bound ** ***** ******** *** ** anything *** *** ***. ******* ******* is *** **** * *** *** foreign ********* *** ***** ** *********** off ***** ***** ********* **** ***** rest-of-the-world ***, ******* *** ***'* ***** access ** *** ***** ********* ***** give **** ****** ** *****-***** ***.

JH
John Honovich
Aug 10, 2021
IPVM

* ***** *** **** ******* ** people ******* ***** ***** ***** **** is **** ***** **** ******** "***** home" *** ******** ******* *** **** transfer, *** *** *****-***** ******* ** the ***** *** ** ****-***** ** share ******** *** ** ******** *** the ***.

******* ** **** ** *** ******* from *** ************* **** **** ***** Western ********'* **** ****** ******* *********, e.g. ** ***. *** ********* **** I *** *** *** ************'* ********* is **** **** ******* *** **** storage ** ******* ********* ******** ** guarantee **** *** ************ *** ****** that **** **** ***** ********* (******* it ** * *** ******* ********* data ****** *** *** ** * PRC ******* ********* **** ****** *** USA). **'* **** ********* ** ***** or ***** ********* **** ***** **** even ** **** ********** ****** *** that *** **** ** ***** **** locally.

(2)
UI
Undisclosed Integrator #4
Aug 10, 2021

** *** **** ** ******* * policy ** *** **** ****** *** to ****** **** ******* (** ***** own ****) **** *** ** *** past ******** ***************.

******** **** "*****" = ******* ****'* server. *** ** *** *****?

**? ** ***.

(1)