Understanding the Impact of China's Far-Reaching New Cybersecurity Law
According to Article 18 of the Draft CII Regulations, a network facility or information system would constitute critical information infrastructure if it is operated or managed by any entity in a greatly expanded list of industries and sectors, including finance, transportation, telecoms, internet,...
Saved in:
Published in | Intellectual property & technology law journal Vol. 30; no. 2; pp. 15 - 23 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Clifton
Aspen Publishers, Inc
01.02.2018
|
Subjects | |
Online Access | Get full text |
ISSN | 1534-3618 |
Cover
Abstract | According to Article 18 of the Draft CII Regulations, a network facility or information system would constitute critical information infrastructure if it is operated or managed by any entity in a greatly expanded list of industries and sectors, including finance, transportation, telecoms, internet, cloud computing and big data services, provided that the "serious endangerment" test set forth in (2) above is met. [...]the Measures appear to expand the scope of Article 37 by setting forth requirements for local data storage and cross-border data transfer that apply to any network operator rather than just to operators of critical information infrastructure. [...]the CCL has not identified what form of consent would meet the requirement to obtain a person's consent for the cross-border transfers of personal information. [...]covered entities should consider a conservative approach with respect to obtaining such consents and monitor CCL- and privacy-related case law, as it may provide future insight as to what constitutes sufficient user consent. According to Article 8, a security assessment (including self-assessment) should focus on the following areas: necessity of data export; amount, scope, type and sensitivity of the personal information involved and whether the subject of the personal information has consented to such data export; amount, scope, type and sensitivity of any important data involved; security protection measures and capability of the data recipient, and the general environment for network security in the recipient country/region; risk of leak, destruction, abuse and tampering after data export; and risk to national security, public interest and personal rights imposed by data export and accumulation of data overseas. 8. https://docs.wto.org/dol2fe/Pages/FE_Search/FE_S_S009-DP.aspx?language=E&CatalogueIdList=238967,235083,234683,234548,233628,233629,232625,229594,229263,228945&CurrentCatalogueIdIndex=0&FullTextHash=&HasEnglishRecord=True&HasFrenchRecord=True&HasSpanishRecord=False. |
---|---|
AbstractList | According to Article 18 of the Draft CII Regulations, a network facility or information system would constitute critical information infrastructure if it is operated or managed by any entity in a greatly expanded list of industries and sectors, including finance, transportation, telecoms, internet, cloud computing and big data services, provided that the "serious endangerment" test set forth in (2) above is met. [...]the Measures appear to expand the scope of Article 37 by setting forth requirements for local data storage and cross-border data transfer that apply to any network operator rather than just to operators of critical information infrastructure. [...]the CCL has not identified what form of consent would meet the requirement to obtain a person's consent for the cross-border transfers of personal information. [...]covered entities should consider a conservative approach with respect to obtaining such consents and monitor CCL- and privacy-related case law, as it may provide future insight as to what constitutes sufficient user consent. According to Article 8, a security assessment (including self-assessment) should focus on the following areas: necessity of data export; amount, scope, type and sensitivity of the personal information involved and whether the subject of the personal information has consented to such data export; amount, scope, type and sensitivity of any important data involved; security protection measures and capability of the data recipient, and the general environment for network security in the recipient country/region; risk of leak, destruction, abuse and tampering after data export; and risk to national security, public interest and personal rights imposed by data export and accumulation of data overseas. 8. https://docs.wto.org/dol2fe/Pages/FE_Search/FE_S_S009-DP.aspx?language=E&CatalogueIdList=238967,235083,234683,234548,233628,233629,232625,229594,229263,228945&CurrentCatalogueIdIndex=0&FullTextHash=&HasEnglishRecord=True&HasFrenchRecord=True&HasSpanishRecord=False. |
Audience | Professional |
Author | Carroll, Katherine Mooney Zhou, Zheng Ilan, Daniel Huang, Ling |
Author_xml | – sequence: 1 fullname: Huang, Ling – sequence: 2 fullname: Ilan, Daniel – sequence: 3 fullname: Carroll, Katherine Mooney – sequence: 4 fullname: Zhou, Zheng |
BookMark | eNpt0FFLwzAQB_A-THBTv0PBBxGsJE3TtY-jOB0MB-J8Ldfk0mZs6WxS5r69GRPcYBzk4Pj9E3KjYGBag4NgSDlLIpbS7DoYWbsihKZpTIbBdGkkdtaBkdrUoWswnG22IFzYqrBotIEHG06hiz4QRHMg77gLi33lQyj6Trt9OIfdbXClYG3x7q_fBMvpy2fxFs0Xr7NiMo_qmCQ0ghwZGwtC6ThlKs4U5yBQ8kpWKpGUMJmPSZZlhKokywWrKuQpAI0pz1PFJbsJ7o_3brv2u0frylXbd8Y_WdI8j3lOeUL_VQ1rLLVRretAbLQV5YTHaZIcPu9VdEHVaLCDtd-a0n585p8veF8SN1pcDDyeBbxx-ONq6K0tZ4uvc_t0YqveaoPWH1bXjbPHyAn_BY9rjwc |
ContentType | Journal Article |
Copyright | COPYRIGHT 2018 Aspen Publishers, Inc. Copyright Aspen Publishers, Inc. Feb 2018 |
Copyright_xml | – notice: COPYRIGHT 2018 Aspen Publishers, Inc. – notice: Copyright Aspen Publishers, Inc. Feb 2018 |
DBID | N95 IOV ILT 7WY 7WZ 7XB 8FE 8FG ABJCF AFKRA ARAPS BENPR BEZIV BGLVJ CCPQU D1I DWQXO F~G HCIFZ K6~ KB. L6V M0C M7S P5Z P62 PDBOC PHGZM PHGZT PKEHL PQBIZ PQEST PQGLB PQQKQ PQUKI PTHSS Q9U S0X |
DatabaseName | Gale Business: Insights Gale In Context: Opposing Viewpoints Gale OneFile: LegalTrac ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Business Premium Collection Technology Collection ProQuest One Community College ProQuest Materials Science Collection ProQuest Central ABI/INFORM Global (Corporate) SciTech Premium Collection ProQuest Business Collection Materials Science Database ProQuest Engineering Collection ABI/INFORM Global Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection Materials Science Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition Engineering Collection ProQuest Central Basic SIRS Editorial |
DatabaseTitle | ABI/INFORM Global (Corporate) ProQuest One Business Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection SIRS Editorial Materials Science Collection SciTech Premium Collection ProQuest One Community College ABI/INFORM Complete ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea Materials Science Database ProQuest Central (New) Engineering Collection ProQuest Materials Science Collection Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global Engineering Database ProQuest Central Basic ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection ProQuest One Academic ProQuest One Academic (New) |
DatabaseTitleList | ABI/INFORM Global (Corporate) |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Law |
EndPage | 23 |
ExternalDocumentID | A526441662 |
GeographicLocations | China |
GeographicLocations_xml | – name: China |
GroupedDBID | .4L .4S .CB .DC 2-G 29J 5GY 7WY 8FE 8FG 8VB AACLI ABACO ABJCF ACIHN ACIWK AEAQA AEMOZ AFKRA AHQJS AKVCP ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS BENPR BEZIV BGLVJ BHRNT BPHCQ CCPQU D1I DWQXO EDO EHL FM. GROUPED_ABI_INFORM_RESEARCH HCIFZ IAO ILT IOF IOV ITC K1G K6~ KB. L6V M0C M7S N95 NF9 P62 PDBOC PHGZM PHGZT PQBIZ PQQKQ PROAC PTHSS QWB RWL RXW S0X T1S TH9 TUS U5U W2G ZL0 ~8M PMFND 7XB PKEHL PQEST PQGLB PQUKI Q9U |
ID | FETCH-LOGICAL-g2041-a9e337c011763f28f55aced5bdbf4d103d97088801f489c3bbe56aa121596f5d3 |
IEDL.DBID | 8FG |
ISSN | 1534-3618 |
IngestDate | Fri Jul 25 19:13:30 EDT 2025 Tue Jun 17 21:35:41 EDT 2025 Thu Jun 12 23:46:50 EDT 2025 Tue Jun 10 20:49:57 EDT 2025 Fri Jun 27 03:32:27 EDT 2025 Fri May 23 01:51:50 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Issue | 2 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-g2041-a9e337c011763f28f55aced5bdbf4d103d97088801f489c3bbe56aa121596f5d3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 1992591541 |
PQPubID | 42517 |
PageCount | 9 |
ParticipantIDs | proquest_journals_1992591541 gale_infotracmisc_A526441662 gale_infotracgeneralonefile_A526441662 gale_infotracacademiconefile_A526441662 gale_incontextgauss_IOV_A526441662 gale_businessinsightsgauss_A526441662 |
PublicationCentury | 2000 |
PublicationDate | 20180201 |
PublicationDateYYYYMMDD | 2018-02-01 |
PublicationDate_xml | – month: 02 year: 2018 text: 20180201 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Clifton |
PublicationPlace_xml | – name: Clifton |
PublicationTitle | Intellectual property & technology law journal |
PublicationYear | 2018 |
Publisher | Aspen Publishers, Inc |
Publisher_xml | – name: Aspen Publishers, Inc |
SSID | ssj0016620 |
Score | 1.6470942 |
Snippet | According to Article 18 of the Draft CII Regulations, a network facility or information system would constitute critical information infrastructure if it is... |
SourceID | proquest gale |
SourceType | Aggregation Database |
StartPage | 15 |
SubjectTerms | Access control Certification Compliance Computer crimes Cybersecurity Data security Information services Information systems Infrastructure Internet Laws, regulations and rules National security Personal information Provisions Public interest Regulation Security management Sovereignty |
Title | Understanding the Impact of China's Far-Reaching New Cybersecurity Law |
URI | https://www.proquest.com/docview/1992591541 |
Volume | 30 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3PT8IwFG4ELl6MP-MPJI1ROTVudB3bySBhglE0RAy3pd06bpsyiPG_972tqEuIlx3Wr8vSvr730n59HyGXKoHXwtbM0r5kjpbgB22hmIghOMdCysTCC85PY3c4dR5mYmY23HJDq1z7xMJRx1mEe-Q3SJMUPgR8-_b9g6FqFJ6uGgmNGmnYEGnQzr3g_ucUwXWLsoywqB3GXdT12Ox2i1gS7JIdkwTSXjlre2RLp_uk9ig_D0gw_XvbhEJ6RkfFRUaaJbQQu27nNJALNjE0SApuiva_FHQyUnQUPnRIpsHgtT9kRuuAzTuWYzPpa867EVZoc3nS8RIhZKRjoWJk0tkWj_0uOASIJ4nj-RFXSgtXSqwN4buJiPkRqadZqo8J5V1PxgKWqquw-piHKaGnLFsLW_ncUifkCkchNCqX8MhxHyCfy1Wehz1RpEgwdCfkosBhlYgUaSglYPT8VgG1DSjJlgsZScPqh1_BwlIV5HUFOS_Lam8CNitAsPeo2ryevdCstzz8tY7T_5vPyDakPF7Ju26S-nKx0ueQVixVq7CdFmncDcYvk2_wKc3c |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTsMwEB1BOcAFsYqlgIVYThZJHafJASG2qoVSEKKIW7ATp7cWmqKKn-IbmUlcIBLixiWH5MWK7PHzxJ6ZB7CnU7wtXcMdEyruGYU86ErNZYKLcyKVSh1KcL7p-M2ud_Ukn6bgY5ILQ2GVE07MiToZxLRHfkRhkjLEBd89eXnlpBpFp6sTCY3CLK7N-xh_2bLj1gWO736t1rh8OG9yqyrAezXHc7kKjRD1mGqh-SKtBamUKjaJ1AnFrLmOSMI6Tj1k7tQLwlhobaSvFFVhCP1UJgLbnYYZjzJaKzBzdtm5u_86t_D9vBAk0ojHhU9KIr8Tfb56NRZg3rqd7LSwk0WYMv0lmG6r8TI0uj_zWxg6hKyVp06yQcpyee3DjDXUkN_bwEuGxMjO3zW-ZMXvGDa0At1_6YdVqPQHfbMGTNQDlUgkB19TvbOAnNBAO66Rrg6Fo9dhn3ohsrqaeMlo5yHrqbcsi05l7pRh163Dbo6juhR9CnwpAK3bxxLo0ILSwWioYmXzCPBTqJRVCXlQQvaKQt6_AaslIM6wuPx4MnqRneFZ9G2PG38_3oHZ5sNNO2q3OtebMIcOV1BEfVehMhq-mS10akZ621oSg-f_Nt5PY1kJ5g |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Understanding+the+Impact+of+China%27s+Far-Reaching+New+Cybersecurity+Law&rft.jtitle=Intellectual+property+%26+technology+law+journal&rft.au=Huang%2C+Ling&rft.au=Ilan%2C+Daniel&rft.au=Carroll%2C+Katherine+Mooney&rft.au=Zhou%2C+Zheng&rft.date=2018-02-01&rft.pub=Aspen+Publishers%2C+Inc&rft.issn=1534-3618&rft.volume=30&rft.issue=2&rft.spage=15&rft.externalDBID=IOV&rft.externalDocID=A526441662 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1534-3618&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1534-3618&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1534-3618&client=summon |