Understanding the Impact of China's Far-Reaching New Cybersecurity Law

According to Article 18 of the Draft CII Regulations, a network facility or information system would constitute critical information infrastructure if it is operated or managed by any entity in a greatly expanded list of industries and sectors, including finance, transportation, telecoms, internet,...

Full description

Saved in:
Bibliographic Details
Published inIntellectual property & technology law journal Vol. 30; no. 2; pp. 15 - 23
Main Authors Huang, Ling, Ilan, Daniel, Carroll, Katherine Mooney, Zhou, Zheng
Format Journal Article
LanguageEnglish
Published Clifton Aspen Publishers, Inc 01.02.2018
Subjects
Online AccessGet full text
ISSN1534-3618

Cover

Abstract According to Article 18 of the Draft CII Regulations, a network facility or information system would constitute critical information infrastructure if it is operated or managed by any entity in a greatly expanded list of industries and sectors, including finance, transportation, telecoms, internet, cloud computing and big data services, provided that the "serious endangerment" test set forth in (2) above is met. [...]the Measures appear to expand the scope of Article 37 by setting forth requirements for local data storage and cross-border data transfer that apply to any network operator rather than just to operators of critical information infrastructure. [...]the CCL has not identified what form of consent would meet the requirement to obtain a person's consent for the cross-border transfers of personal information. [...]covered entities should consider a conservative approach with respect to obtaining such consents and monitor CCL- and privacy-related case law, as it may provide future insight as to what constitutes sufficient user consent. According to Article 8, a security assessment (including self-assessment) should focus on the following areas: necessity of data export; amount, scope, type and sensitivity of the personal information involved and whether the subject of the personal information has consented to such data export; amount, scope, type and sensitivity of any important data involved; security protection measures and capability of the data recipient, and the general environment for network security in the recipient country/region; risk of leak, destruction, abuse and tampering after data export; and risk to national security, public interest and personal rights imposed by data export and accumulation of data overseas. 8. https://docs.wto.org/dol2fe/Pages/FE_Search/FE_S_S009-DP.aspx?language=E&CatalogueIdList=238967,235083,234683,234548,233628,233629,232625,229594,229263,228945&CurrentCatalogueIdIndex=0&FullTextHash=&HasEnglishRecord=True&HasFrenchRecord=True&HasSpanishRecord=False.
AbstractList According to Article 18 of the Draft CII Regulations, a network facility or information system would constitute critical information infrastructure if it is operated or managed by any entity in a greatly expanded list of industries and sectors, including finance, transportation, telecoms, internet, cloud computing and big data services, provided that the "serious endangerment" test set forth in (2) above is met. [...]the Measures appear to expand the scope of Article 37 by setting forth requirements for local data storage and cross-border data transfer that apply to any network operator rather than just to operators of critical information infrastructure. [...]the CCL has not identified what form of consent would meet the requirement to obtain a person's consent for the cross-border transfers of personal information. [...]covered entities should consider a conservative approach with respect to obtaining such consents and monitor CCL- and privacy-related case law, as it may provide future insight as to what constitutes sufficient user consent. According to Article 8, a security assessment (including self-assessment) should focus on the following areas: necessity of data export; amount, scope, type and sensitivity of the personal information involved and whether the subject of the personal information has consented to such data export; amount, scope, type and sensitivity of any important data involved; security protection measures and capability of the data recipient, and the general environment for network security in the recipient country/region; risk of leak, destruction, abuse and tampering after data export; and risk to national security, public interest and personal rights imposed by data export and accumulation of data overseas. 8. https://docs.wto.org/dol2fe/Pages/FE_Search/FE_S_S009-DP.aspx?language=E&CatalogueIdList=238967,235083,234683,234548,233628,233629,232625,229594,229263,228945&CurrentCatalogueIdIndex=0&FullTextHash=&HasEnglishRecord=True&HasFrenchRecord=True&HasSpanishRecord=False.
Audience Professional
Author Carroll, Katherine Mooney
Zhou, Zheng
Ilan, Daniel
Huang, Ling
Author_xml – sequence: 1
  fullname: Huang, Ling
– sequence: 2
  fullname: Ilan, Daniel
– sequence: 3
  fullname: Carroll, Katherine Mooney
– sequence: 4
  fullname: Zhou, Zheng
BookMark eNpt0FFLwzAQB_A-THBTv0PBBxGsJE3TtY-jOB0MB-J8Ldfk0mZs6WxS5r69GRPcYBzk4Pj9E3KjYGBag4NgSDlLIpbS7DoYWbsihKZpTIbBdGkkdtaBkdrUoWswnG22IFzYqrBotIEHG06hiz4QRHMg77gLi33lQyj6Trt9OIfdbXClYG3x7q_fBMvpy2fxFs0Xr7NiMo_qmCQ0ghwZGwtC6ThlKs4U5yBQ8kpWKpGUMJmPSZZlhKokywWrKuQpAI0pz1PFJbsJ7o_3brv2u0frylXbd8Y_WdI8j3lOeUL_VQ1rLLVRretAbLQV5YTHaZIcPu9VdEHVaLCDtd-a0n585p8veF8SN1pcDDyeBbxx-ONq6K0tZ4uvc_t0YqveaoPWH1bXjbPHyAn_BY9rjwc
ContentType Journal Article
Copyright COPYRIGHT 2018 Aspen Publishers, Inc.
Copyright Aspen Publishers, Inc. Feb 2018
Copyright_xml – notice: COPYRIGHT 2018 Aspen Publishers, Inc.
– notice: Copyright Aspen Publishers, Inc. Feb 2018
DBID N95
IOV
ILT
7WY
7WZ
7XB
8FE
8FG
ABJCF
AFKRA
ARAPS
BENPR
BEZIV
BGLVJ
CCPQU
D1I
DWQXO
F~G
HCIFZ
K6~
KB.
L6V
M0C
M7S
P5Z
P62
PDBOC
PHGZM
PHGZT
PKEHL
PQBIZ
PQEST
PQGLB
PQQKQ
PQUKI
PTHSS
Q9U
S0X
DatabaseName Gale Business: Insights
Gale In Context: Opposing Viewpoints
Gale OneFile: LegalTrac
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central
Business Premium Collection
Technology Collection
ProQuest One Community College
ProQuest Materials Science Collection
ProQuest Central
ABI/INFORM Global (Corporate)
SciTech Premium Collection
ProQuest Business Collection
Materials Science Database
ProQuest Engineering Collection
ABI/INFORM Global
Engineering Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
Materials Science Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
Engineering Collection
ProQuest Central Basic
SIRS Editorial
DatabaseTitle ABI/INFORM Global (Corporate)
ProQuest One Business
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
SIRS Editorial
Materials Science Collection
SciTech Premium Collection
ProQuest One Community College
ABI/INFORM Complete
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
Materials Science Database
ProQuest Central (New)
Engineering Collection
ProQuest Materials Science Collection
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
Engineering Database
ProQuest Central Basic
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList ABI/INFORM Global (Corporate)
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Law
EndPage 23
ExternalDocumentID A526441662
GeographicLocations China
GeographicLocations_xml – name: China
GroupedDBID .4L
.4S
.CB
.DC
2-G
29J
5GY
7WY
8FE
8FG
8VB
AACLI
ABACO
ABJCF
ACIHN
ACIWK
AEAQA
AEMOZ
AFKRA
AHQJS
AKVCP
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
BENPR
BEZIV
BGLVJ
BHRNT
BPHCQ
CCPQU
D1I
DWQXO
EDO
EHL
FM.
GROUPED_ABI_INFORM_RESEARCH
HCIFZ
IAO
ILT
IOF
IOV
ITC
K1G
K6~
KB.
L6V
M0C
M7S
N95
NF9
P62
PDBOC
PHGZM
PHGZT
PQBIZ
PQQKQ
PROAC
PTHSS
QWB
RWL
RXW
S0X
T1S
TH9
TUS
U5U
W2G
ZL0
~8M
PMFND
7XB
PKEHL
PQEST
PQGLB
PQUKI
Q9U
ID FETCH-LOGICAL-g2041-a9e337c011763f28f55aced5bdbf4d103d97088801f489c3bbe56aa121596f5d3
IEDL.DBID 8FG
ISSN 1534-3618
IngestDate Fri Jul 25 19:13:30 EDT 2025
Tue Jun 17 21:35:41 EDT 2025
Thu Jun 12 23:46:50 EDT 2025
Tue Jun 10 20:49:57 EDT 2025
Fri Jun 27 03:32:27 EDT 2025
Fri May 23 01:51:50 EDT 2025
IsPeerReviewed false
IsScholarly false
Issue 2
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-g2041-a9e337c011763f28f55aced5bdbf4d103d97088801f489c3bbe56aa121596f5d3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 1992591541
PQPubID 42517
PageCount 9
ParticipantIDs proquest_journals_1992591541
gale_infotracmisc_A526441662
gale_infotracgeneralonefile_A526441662
gale_infotracacademiconefile_A526441662
gale_incontextgauss_IOV_A526441662
gale_businessinsightsgauss_A526441662
PublicationCentury 2000
PublicationDate 20180201
PublicationDateYYYYMMDD 2018-02-01
PublicationDate_xml – month: 02
  year: 2018
  text: 20180201
  day: 01
PublicationDecade 2010
PublicationPlace Clifton
PublicationPlace_xml – name: Clifton
PublicationTitle Intellectual property & technology law journal
PublicationYear 2018
Publisher Aspen Publishers, Inc
Publisher_xml – name: Aspen Publishers, Inc
SSID ssj0016620
Score 1.6470942
Snippet According to Article 18 of the Draft CII Regulations, a network facility or information system would constitute critical information infrastructure if it is...
SourceID proquest
gale
SourceType Aggregation Database
StartPage 15
SubjectTerms Access control
Certification
Compliance
Computer crimes
Cybersecurity
Data security
Information services
Information systems
Infrastructure
Internet
Laws, regulations and rules
National security
Personal information
Provisions
Public interest
Regulation
Security management
Sovereignty
Title Understanding the Impact of China's Far-Reaching New Cybersecurity Law
URI https://www.proquest.com/docview/1992591541
Volume 30
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3PT8IwFG4ELl6MP-MPJI1ROTVudB3bySBhglE0RAy3pd06bpsyiPG_972tqEuIlx3Wr8vSvr730n59HyGXKoHXwtbM0r5kjpbgB22hmIghOMdCysTCC85PY3c4dR5mYmY23HJDq1z7xMJRx1mEe-Q3SJMUPgR8-_b9g6FqFJ6uGgmNGmnYEGnQzr3g_ucUwXWLsoywqB3GXdT12Ox2i1gS7JIdkwTSXjlre2RLp_uk9ig_D0gw_XvbhEJ6RkfFRUaaJbQQu27nNJALNjE0SApuiva_FHQyUnQUPnRIpsHgtT9kRuuAzTuWYzPpa867EVZoc3nS8RIhZKRjoWJk0tkWj_0uOASIJ4nj-RFXSgtXSqwN4buJiPkRqadZqo8J5V1PxgKWqquw-piHKaGnLFsLW_ncUifkCkchNCqX8MhxHyCfy1Wehz1RpEgwdCfkosBhlYgUaSglYPT8VgG1DSjJlgsZScPqh1_BwlIV5HUFOS_Lam8CNitAsPeo2ryevdCstzz8tY7T_5vPyDakPF7Ju26S-nKx0ueQVixVq7CdFmncDcYvk2_wKc3c
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTsMwEB1BOcAFsYqlgIVYThZJHafJASG2qoVSEKKIW7ATp7cWmqKKn-IbmUlcIBLixiWH5MWK7PHzxJ6ZB7CnU7wtXcMdEyruGYU86ErNZYKLcyKVSh1KcL7p-M2ud_Ukn6bgY5ILQ2GVE07MiToZxLRHfkRhkjLEBd89eXnlpBpFp6sTCY3CLK7N-xh_2bLj1gWO736t1rh8OG9yqyrAezXHc7kKjRD1mGqh-SKtBamUKjaJ1AnFrLmOSMI6Tj1k7tQLwlhobaSvFFVhCP1UJgLbnYYZjzJaKzBzdtm5u_86t_D9vBAk0ojHhU9KIr8Tfb56NRZg3rqd7LSwk0WYMv0lmG6r8TI0uj_zWxg6hKyVp06yQcpyee3DjDXUkN_bwEuGxMjO3zW-ZMXvGDa0At1_6YdVqPQHfbMGTNQDlUgkB19TvbOAnNBAO66Rrg6Fo9dhn3ohsrqaeMlo5yHrqbcsi05l7pRh163Dbo6juhR9CnwpAK3bxxLo0ILSwWioYmXzCPBTqJRVCXlQQvaKQt6_AaslIM6wuPx4MnqRneFZ9G2PG38_3oHZ5sNNO2q3OtebMIcOV1BEfVehMhq-mS10akZ621oSg-f_Nt5PY1kJ5g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Understanding+the+Impact+of+China%27s+Far-Reaching+New+Cybersecurity+Law&rft.jtitle=Intellectual+property+%26+technology+law+journal&rft.au=Huang%2C+Ling&rft.au=Ilan%2C+Daniel&rft.au=Carroll%2C+Katherine+Mooney&rft.au=Zhou%2C+Zheng&rft.date=2018-02-01&rft.pub=Aspen+Publishers%2C+Inc&rft.issn=1534-3618&rft.volume=30&rft.issue=2&rft.spage=15&rft.externalDBID=IOV&rft.externalDocID=A526441662
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1534-3618&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1534-3618&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1534-3618&client=summon