{"id":2271,"date":"2016-05-20T13:46:14","date_gmt":"2016-05-20T10:46:14","guid":{"rendered":"http:\/\/greece-china.gr\/?p=2271"},"modified":"2016-05-20T13:46:14","modified_gmt":"2016-05-20T10:46:14","slug":"chinas-legislature-gears-up-to-pass-a-sweepingly-vague-cybersecurity-law","status":"publish","type":"post","link":"https:\/\/greece-china.gr\/en\/archives\/2271","title":{"rendered":"China\u2019s Legislature Gears Up to Pass a Sweepingly Vague Cybersecurity Law"},"content":{"rendered":"<p style=\"text-align: justify;\">Drew Foerster<\/p>\n<p style=\"text-align: justify;\">About the Authors:<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.linkedin.com\/in\/foersterdrew\" target=\"_blank\">Drew Foerster<\/a>\u00a0is an attorney in Seattle, Washington, with a practice focused on information technology, intellectual property, and business law. In his free time, he enjoys spending time with his family and friends, and also providing pro bono legal services to non-profits with a focus on governance based upon the principles of sociocracy.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-2272\" src=\"\/wp-content\/uploads\/image0011.jpg\" alt=\"image001\" width=\"159\" height=\"188\" \/>While businesses in the United States may feel they suffer from a multitude of sometimes contradictory laws, regulations, and standards governing their information governance and security practices, in the People\u2019s Republic of China businesses face a different problem with few laws and regulations that are both vague and grant law enforcement and judicial authorities a large degree of discretion when interpreting them. In response to a lack of unified information governance and security standards, in July 2015, the Legislative Affairs Commission of the Standing Committee of the National People\u2019s Congress (NPC) in China publicly released a draft cybersecurity law (also translated as the \u201cNetwork Security Law\u201d) that, if passed into legislation, will along with the implementing regulations provide more sources of guidance but also of ambiguity. At this point, no one knows when the Standing Committee\u2019s next move on this law will come; however, the fact that the NPC\u2019s Standing Committee has released a draft version strongly suggests that the NPC will not let the law languish like a draft personal information protection law that has not seen any action since representatives from various Chinese ministries submitted it to the State Council in 2009.<\/p>\n<p style=\"text-align: justify;\">The State Council oversees Chinese ministries and departments, and the NPC oversees the State Council. The Standing Committee of the NPC for all intents and purposes wields the authority of the whole NPC; rarely, if ever, have representatives to the NPC attempted to deviate from the Standing Committee\u2019s actions and recommendations. The NPC as the national legislative body of China ultimately of course carries out the task of officially promulgating laws. The draft cybersecurity law identifies one administrative body in particular, the Cyber Administration of China (CAC), as the main agency responsible for implementing most of its provisions. The text of the draft law, though, refers to the CAC as the \u201cNational Network Information Department,\u201d which could also be translated as the \u201cState Cyber Information Department.\u201d<\/p>\n<p style=\"text-align: justify;\"><strong>Why Businesses Should Care<\/strong><\/p>\n<p style=\"text-align: justify;\">Businesses operating in China should care a great deal about this draft cybersecurity law because it contains several provisions that could greatly impact their information security practices and liabilities. To give one initial example, businesses could face the confiscation of between one and ten times their \u201cillegal gains\u201d that result from misusing or failing to protect personal information. Another provision in the law, article 10, gives any individual or organization the \u201cright\u201d to report practices that \u201cthreaten\u201d information security to various Chinese authorities to include the ministry of industry and information technology or the ministry of public security. There are no indications yet whether businesses in China can contract away this right, or require initial reporting internally within the company, with a well-drafted nondisclosure agreement or some other contract. These are two examples of the many provisions in this draft law that businesses operating in China will need to shape their operations around in order to minimize their legal liability risks.<\/p>\n<p style=\"text-align: justify;\">Not only does anyone have the right to report insecure information governance practices to authorities, but any individual who has suffered undefined \u201cdamage\u201d resulting from \u201cnetwork operators\u201d violating any of the draft cybersecurity law provisions has the right to bring a civil suit against those network operators. The draft law, however, does not provide any guidance concerning what sorts of damage may give rise to such civil claims. In addition, the draft law\u2019s definition of network operators is so vague and generalized as to potentially apply to all businesses operating in China since nearly all businesses administer computer networks at least for internal use.<\/p>\n<p style=\"text-align: justify;\"><strong>Mandatory Reporting Requirements and Providing Assistance to Chinese Law Enforcement<\/strong><\/p>\n<p style=\"text-align: justify;\">While anyone generally has the right to report insecure information governance practices to the government, according to the draft cyberspace law network operators have the duty to report security defects, loopholes, or other network security risks to both users and to the government, and to remediate those problems. When network operators discover data breaches, or data destruction or loss, then they must immediately notify users and authorities, and immediately remediate the issue. The law, however, does not define \u201cimmediately\u201d with any specific deadlines, nor does it provide any guidance to help network operators discern when their knowledge about an actual or potential data breach has crossed into territory creating the duty for them to carry out the above measures.<\/p>\n<p style=\"text-align: justify;\">Article 23 of the draft cybersecurity law also requires network operators to provide assistance and support to Chinese law enforcement authorities for the purposes of national security and criminal investigations. The draft law does not further elaborate what specific duties this provision may impose on network operators, though such information may come in the implementing regulations.<\/p>\n<p style=\"text-align: justify;\"><em>Enforcement<\/em><\/p>\n<p style=\"text-align: justify;\">Article 59 of the draft cybersecurity law actually imposes fines on network operators who fail to cooperate with law enforcement, or who fail to report \u201cnetwork security risks or network security incidents to relevant competent authorities.\u201d These fines range up to 500,000 RMB (around $77,100) for network operators, and up to 100,000 RMB (around $15,400) for individuals responsible for failures to report or cooperate. Notably, though, article 59 does\u00a0<em>not<\/em>\u00a0specify that violation of this duty could result in businesses losing any permits or licenses as other articles in the legal liability chapter of the draft cybersecurity law do.<\/p>\n<p style=\"text-align: justify;\">At least within the terms of the draft cybersecurity law, refusing to provide assistance to Chinese authorities may result only in relatively modest financial fines. In any case, though, Chinese law enforcement can leverage other laws and regulations to impose harsher penalties for failing to cooperate with them. For example, article 84 of China\u2019s new December 2015 antiterrorism law allows 5 to 15 days of imprisonment for, under undefined \u201cgrave circumstances,\u201d failing to provide network security sufficient to prevent the dissemination of materials containing terrorist content.<\/p>\n<p style=\"text-align: justify;\"><strong>General Network Operator Cybersecurity Mandates<\/strong><\/p>\n<p style=\"text-align: justify;\">In December 2005, the ministry of public security promulgated a set of regulations titled \u201cProvisions on Technical Measures for Internet Security Protection\u201d that imposed a number of duties on Internet service providers, Internet information service providers, Internet data service center providers, and \u201corganizations that use networks.\u201d It defines this last category as \u201corganizations that need to connect with and use the Internet for their applications.\u201d That definition would seem to encompass all modern businesses operating in China. It does not define Internet information services providers, but the plain meaning of this term would seem to encompass the vast majority of business enterprises in a modern economy.<\/p>\n<p style=\"text-align: justify;\">These Internet security protection regulations reference the enforcement mechanisms in an earlier set of ministry of public security regulations, the December 1997 \u201cAdministrative Measures for Protection of the Security of International Internetworking of Computer Information Networks.\u201d These regulations impose very modest fines on the individuals responsible for the violation of a specific set of information security practices listed in the 1997 and the 2005 ministry of public security regulations. However, if \u201cthe circumstances are serious,\u201d with \u201cserious\u201d left undefined, then law enforcement may shut of network connections, shut down devices, and even recommend that other administrative units revoke business licenses.<\/p>\n<p style=\"text-align: justify;\">The following presents some of the more important duties imposed by these two ministry of public security regulations:<\/p>\n<ul style=\"text-align: justify;\">\n<li>provide information, materials, and other data to law enforcement<\/li>\n<li>comply with law enforcement orders to delete accounts, network directories, or servers<\/li>\n<li>register organizations and individuals entrusted with publishing content online<\/li>\n<li>establish procedures to review that content<\/li>\n<li>register users<\/li>\n<li>record the login and logout times of users, noting their telephone numbers, network addresses, or other identifiers, and recording correlations between private and public identifiers<\/li>\n<li>prevent the lease or transfer of user account identifiers<\/li>\n<li>establish rules for the administration of information security practices<\/li>\n<li>adopt technical security protections, including any required for network security<\/li>\n<li>conduct security education and training of network users<\/li>\n<li>put in place backup and disaster recovery measures and equipment<\/li>\n<li>censor content in compliance with Chinese censorship laws and regulations<\/li>\n<li>prevent website alteration and defacement<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">The draft cybersecurity law would similarly mandate that network operators<\/p>\n<ul style=\"text-align: justify;\">\n<li>obtain consent from users to collect their data;<\/li>\n<li>inform users about the purpose of collecting their data, and inform the public about the network operator\u2019s rules for collecting the data;<\/li>\n<li>collect data only if necessary and relevant to the services and\/or products that the business provides;<\/li>\n<li>implement data classification schemes;<\/li>\n<li>encrypt important data, with \u201cimportant\u201d left undefined;<\/li>\n<li>monitor, record, and log network activity;<\/li>\n<li>adopt technical measures to prevent network attacks, network intrusions, and other problems such as computer viruses;<\/li>\n<li>adopt network management procedures, and appoint a network security administrator.<\/li>\n<li>authenticate network users using their true, legal identities;<\/li>\n<li>provide security maintenance for networking services for as long as contractual obligations or unspecified rules require (these rules may come in the form of regulations under the draft cybersecurity law);<\/li>\n<li>when purchasing \u201ckey\u201d network equipment or services, only purchase those that have obtained certification from a government authority such as the CAC, or that has obtained certification from \u201cqualified\u201d private sector organizations.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Unlike U.S. business entities, which may state in their founding and governance documents that they may engage in any lawful business, China does not permit such a universal catch-all; all businesses in China must specifically list the domains of their business activities in their formation and governance documents, so enforcement of this data collection restriction likely will reference those business scope statements.<\/p>\n<p style=\"text-align: justify;\">The law does not further define what makes a network equipment or service \u201ckey,\u201d nor does it specify how nongovernmental organizations might obtain the qualification to issue such certifications except to note that the CAC will provide further guidance.<\/p>\n<p style=\"text-align: justify;\"><em>Enforcement<\/em><\/p>\n<p style=\"text-align: justify;\">Violating these general compliance requirements for network operators carries fines of up to 500,000 RMB (around $77,100) for the responsible organization, and of up to 100,000 RMB (around $15,400) for responsible individuals. Refusing to authenticate users\u2019 true identities after receiving warnings from authorities to do so, or creating \u201cserious circumstances\u201d by failing to authenticate users using their true identities, can result in businesses losing their licenses or permits, having some or all of their business operations shut down, or having their websites closed. These additional penalties could also result from failing to prevent the transmission of prohibited (potentially politically sensitive) information or failing to dispose of data when ordered to do so.<\/p>\n<p style=\"text-align: justify;\"><strong>Strict Compliance Requirements for \u201cKey Information Infrastructure\u201d Administrators<\/strong><\/p>\n<p style=\"text-align: justify;\">In addition to the general requirements for all network operators, the draft cybersecurity law imposes a large number of additional requirements on administrators of \u201ckey information infrastructure.\u201d Although the law does identify some specific industries that fall in this category, it introduces an undefined category of \u201cnetwork service providers with a large number of users\u201d as well. So far, the Chinese government has not revealed how broadly it intends to define this category. What sorts of services qualify? How many users will be considered a large number of users? Hopefully the Standing Committee of the NPC will answer such questions as it crafts a final version of the law.<\/p>\n<p style=\"text-align: justify;\">In addition to \u201cnetwork service providers with a large number of users,\u201d the draft cybersecurity law provides a non-exhaustive list of examples of facilities that will be considered key information infrastructure. These facilities are: communications, energy, transport, water, finance, medical care and public health, social security, and of course military and government facilities. Because the draft law only provides these industries as examples, it implicitly leaves open the possibility that other industries could also be considered key information infrastructure based upon other sources of authority such as the CAC.<\/p>\n<p style=\"text-align: justify;\">Key information infrastructure administrators must implement the following measures in addition to the previous list of measures that all network operators would need to implement:<\/p>\n<ul style=\"text-align: justify;\">\n<li>localize personal information and operational data storage in China, or obtain approval from the CAC to store such information abroad<\/li>\n<li>obtain approval from the CAC to purchase certified network products or services<\/li>\n<li>conduct background checks for security personnel<\/li>\n<li>commission either in-house or outside professionals to test security at least once a year, and submit the results to all government departments responsible for overseeing key information infrastructure.<\/li>\n<li>conduct \u201cregular\u201d emergency response and network security incident response drills.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">The draft law does not specify which exact departments these will be, or whether a new one will be created. In addition to network operators organizing security testing on their own, the draft law authorizes the Chinese government to conduct random security testing, or to entrust such testing to third party professionals.<\/p>\n<p style=\"text-align: justify;\">Considering that the law would require security testing at least once a year, these \u201cregular\u201d incident response drills probably should occur with at least the same frequency. The draft cybersecurity law also tasks the CAC and any other relevant government departments with conducting \u201cregular\u201d industry-wide incident response drills.<\/p>\n<p style=\"text-align: justify;\"><em>Enforcement<\/em><\/p>\n<p style=\"text-align: justify;\">In general, key network infrastructure administrators that violate any of these provisions could face fines of up to one million RMB (around $154,700), and the individuals responsible for such violations could face fines of up to 100,000 RMB (around $15,400). If businesses use network equipment or services that have not received required security certifications, or passed security reviews, then authorities could shut down use of such equipment or services and fine the responsible entity either specific sums of no more than 100,000 RMB (around $15,400), or fine the responsible entity a sum of money totaling to no more than ten times the purchase price of the equipment or service.<\/p>\n<p style=\"text-align: justify;\">If an entity operating a piece of key network infrastructure stores data abroad or provides it to entities abroad with government permission, then the organization could face fines of up to 500,000 RMB (around $77,100), the responsible individual could face fines of up to 100,000 RMB (around $15,400), and, like the penalty for failing to authorize users, businesses could face losing their licenses or permits, having some or all of their business operations shut down, or having their websites closed. In addition to the fines, the government could also confiscate the \u201cillegal gains\u201d of businesses that commit such violations. The draft cybersecurity law, though, does not provide any guidance for defining \u201cillegal gains\u201d in this context.<\/p>\n<p style=\"text-align: justify;\"><strong>Protecting Personally Identifiable Information<\/strong><\/p>\n<p style=\"text-align: justify;\">Potentially one of the most useful aspects of the draft cybersecurity law is that it provides a more specific list of personal information than any previous Chinese law or regulation. Its definition of personal information also explicitly encompasses situations in which multiple types of data when considered in isolation may not enable identification, but when considered together do enable the identification of specific persons. This list, however, is non-exhaustive, so other sources of authority such as implementing regulations could add to it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Drew Foerster About the Authors: Drew Foerster\u00a0is an attorney in Seattle, Washington, with a practice focused on information technology, intellectual property, and business law. In his free time, he enjoys <a class=\"more-link\" href=\"https:\/\/greece-china.gr\/en\/archives\/2271\">Continue Reading&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[10,20,4],"tags":[],"class_list":["post-2271","post","type-post","status-publish","format-standard","hentry","category-10","category-20","category-4"],"_links":{"self":[{"href":"https:\/\/greece-china.gr\/en\/wp-json\/wp\/v2\/posts\/2271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/greece-china.gr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/greece-china.gr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/greece-china.gr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/greece-china.gr\/en\/wp-json\/wp\/v2\/comments?post=2271"}],"version-history":[{"count":1,"href":"https:\/\/greece-china.gr\/en\/wp-json\/wp\/v2\/posts\/2271\/revisions"}],"predecessor-version":[{"id":2273,"href":"https:\/\/greece-china.gr\/en\/wp-json\/wp\/v2\/posts\/2271\/revisions\/2273"}],"wp:attachment":[{"href":"https:\/\/greece-china.gr\/en\/wp-json\/wp\/v2\/media?parent=2271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/greece-china.gr\/en\/wp-json\/wp\/v2\/categories?post=2271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/greece-china.gr\/en\/wp-json\/wp\/v2\/tags?post=2271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}