Peer reviewed analysis from world leading experts

Time for Trump to hit back at China’s new cybersecurity law

Reading Time: 4 mins
US President Donald Trump welcomes Chinese President Xi Jinping at Mar-a-Lago state in Palm Beach, Florida, US, 6 April 2017. (Photo: Reuters/Carlos Barria).

In Brief

The Trump administration should immediately confront Chinese leaders over China’s recently enacted cybersecurity law. The new law came into force on 1 June, having been several years in the making with vehement protests from foreign governments and multinational corporations.

Share

  • A
  • A
  • A

Share

  • A
  • A
  • A

While some minor revisions occurred during that process and the Chinese cybersecurity administration attempted to ‘calm jittery businesses’, the dangerously vague but potent assertions of ‘cyber sovereignty’ embodied in the law remain in place. The Economist has warned that the new law could well constitute ‘a Trojan horse designed to promote China’s aggressive policy of indigenous innovation’.

The sweeping terms and lack of definitional detail present huge problems for foreign corporations attempting to comply with the law. For instance, there is no precise enumeration of which sectors constitute ‘critical information infrastructure’, which require enhanced cybersecurity measures. The guidelines for ‘important data’ are similarly vague, including information that can ‘influence or harm the government, state, military, economy, culture, society, technology … and other national security matters’. Further, there is the infamous dictate that data on the internet be ‘secure and controllable’, without any further explanation.

Article 17 of the new law mandates that personal information of Chinese citizens be stored in servers located on the Chinese mainland, and exceptions can only be made if a company can prove it is ‘truly necessary’. If interpreted strictly, this provision could cripple the ability of foreign (and notably, Chinese) multinationals from operating in China and sending data abroad. Chinese regulators seem aware of this impediment to their own companies, but are still content to hamper foreign companies by leaving key regulatory questions unanswered.

The new law also requires companies to undergo cybersecurity reviews that will analyse network products and services, focusing on specific security issues and ‘other risks that could harm national security’. Various sections of the law dictate that individual products and services could be subject to multiple reviews by different agencies.

Further, Article 28 requires that companies ‘assist’ public agencies in ‘protecting national security and investigating crimes’. Does this mean that in the future, companies could be required to hand over key technological processes and programs or source code? There are no answers here.

On 5 June, a major US high-tech industry association, the Computer and Communications Industry Association (CCIA), sent letters to top US government officials strongly protesting the new law. CCIA President and CEO Ed Black stated the new law was a ‘raw deal’ and called on the Trump administration to take decisive action to ‘head off’ this ‘discriminatory foreign regulation’. More generally, it argued: ‘China’s technology rules put American technology companies at a disadvantage and also harm the array of US industries that rely on our leading digital products to increase worldwide productivity and competitiveness’.

The Trump administration should elevate the new Chinese cybersecurity law to top priority in the ongoing ‘100-day’ negotiations mandated at the April Trump–Xi summit. The Trump administration should make it clear that if regulations under the new law damage US companies’ ability to compete in the Chinese market, the United States will not just protest — it will act to institute reciprocal actions that close off the US market to top Chinese technology companies such as Alibaba, Baidu and Tencent.

It may well take such a two-by-four to convince Chinese officials that the United States finally means business.

The president and his top economic and security advisers should not wait to force a showdown with China over the web of market-closing laws and regulations that are shutting US and other foreign corporations out of China’s high-tech information and internet-related sectors. ‘Enough is enough’, as the current phrase in international relations goes.

Claude Barfield is a Resident Scholar at the American Enterprise Institute, Washington DC.

This article was first posted here on AEI.

2 responses to “Time for Trump to hit back at China’s new cybersecurity law”

  1. Hasn’t the US, and for that matter Australia too, shut some Chinese firms out from participating in their projects? For example, Huawei has been shut out from Australia’s NBN work, even though Huawei is allowed in Europe. Given the dubious reasons for shutting out Huawei and other Chinese firms by the US and Australia governments, what could China do to institute such similar reciprocal actions as the author argued here, leaving aside whether those arguments are sensible or not? The Trump Administration has threatened a lot of trade measures; aren’t they enough? Isn’t enough, enough? Is there any country in the world that is more unreasonable than the current posturing and rhetoric in the US, like asking Mexico to pay for the wall the US is to build along its border? Is the world going insane?

  2. Are we hearing the voices of the past again? China cannot decide for itself what it can or cannot do within its borders? In the same way that US has its security laws that anyone who wants to do business or enter US must comply, why should it be different for China? And threatening a 2×4? What kind of articles does east asia forum publish these days?

Support Quality Analysis

Donate
The East Asia Forum office is based in Australia and EAF acknowledges the First Peoples of this land — in Canberra the Ngunnawal and Ngambri people — and recognises their continuous connection to culture, community and Country.

Article printed from East Asia Forum (https://www.eastasiaforum.org)

Copyright ©2024 East Asia Forum. All rights reserved.