Rogier Creemers
China Digital Economy Fellow
In the year since China’s
Cybersecurity Law was released in its full form and the six months since it
went into effect June 1, the Chinese government and the Communist Party have
significantly clarified their approach to cyberspace and information and
communications technology (ICT). Developments range from well-reported media
control moves to early enforcement actions on data protection and still-evolving
frameworks affecting foreign companies doing business in China. This
interlocking matrix of regulations and standards associated with the new law is
already shaping China’s political and economic digital reality.
In fact, the Cybersecurity Law has
been only the most visible document in a wider Chinese effort to govern
cyberspace and secure the country’s digital infrastructure. The 19th Party
Congress, where Xi Jinping’s leading position was renewed and solidified, put
ICTs front and center in economic development and emphasized the importance of
cybersecurity as threats and risks proliferate. Chinese policy thinkers and
officials are eyeing the global stage and may announce new international
proposals as soon as at the Chinese-hosted World Internet Conference (WIC) in
Wuzhen, Zhejiang, opening next week.
National plans—which can be at once
aspirational and quite concrete—set ambitious goals for artificial intelligence
and high-tech development, and surging public and private investment in a large
and protected market raise expectations of success. Taken together, these
efforts arguably constitute the most comprehensive framework for ICT governance
currently underway globally.
Even if it’s easy to see the forest
of Chinese official efforts to shape the digital world, it can be hard to
navigate the trees of implementing regulations, standards, and review regimes.
Here, after a year working with the Cybersecurity Law’s text and half a year
nominally under its effect, we offer a guide to the emerging regime and identify
some areas to watch for the most consequential developments yet to come.
Developing such a comprehensive
framework naturally gave rise to much bureaucratic tumult, given the number of
China’s government ministries, commissions, and standards bodies involved, and
the heavy input—positive and negative—the process has seen from domestic and
foreign ICT players. The uncertainty and delays in the framework’s legislative
process reflects the complexity involved with balancing these different forces
within the Chinese political system. The laws deliberately contain broad,
high-level principles to accommodate competing regulatory actors.
In this jousting for influence, the
primary government players are:
Outside the government, the main
players include:
As the Cybersecurity Law framework
develops, what has emerged is a system with several top-level guiding documents
and six major systems of increasingly concrete policy, each with its own
bureaucratic champions, enforcement mechanisms, and implications for China’s
digital life. Top-level strategies or passages of the Cybersecurity Law provide
a blueprint for the Xi administration’s cyberspace governance priorities, while
supporting regulatory documents flesh out details for implementation and hash
out conflicts in the bureaucracy. Still, the documents and regulatory moves do
not align in a tidy hierarchy, but must be understood as an interconnected
matrix.
While the Cybersecurity Law is
highly central for ICT governance, other laws, especially the new National
Security Law and Counterterrorism Law, also feed into the cyberspace governance
framework. Reinforcing the logic of the Xi-era dictum that “without
cybersecurity there is no national security, and without informatization there
is no modernization,” these security-focused laws further mesh with
development-focused national strategies that provide a touchstone as officials
develop regulations and standards. They include:
In effect, as of late 2017, the
laws, strategies, regulatory documents, and governing actions can be viewed as
operating in six systems, which together constitute an evolving framework for
governing ICT use in China. They are: the Internet Information Content
Management System; the Cybersecurity Multi-Level Protection System; the
Critical Information Infrastructure Security Protection System; the Personal
Information and Important Data Protection System; the Network Products and Services
Management System; and the Cybersecurity Incident Management System. Below are
broad-strokes summaries of the status and interconnected nature of these
systems.
The Party leadership is expanding
the legal tools at its disposal to monitor and control information disseminated
online. Technological developments are allowing individuals more channels to
communicate outside of officially sanctioned media outlets, compelling the
government to play “catch up” with new Internet media platforms.
Party monitoring and control of
online information content is certainly not new in China. But a spate of new
regulations enhance the government’s ability in this regard.
First, this batch of regulations
provides new requirements related to real-name registration for Internet users.
Although the government has tried to introduce real-name requirements for
years, with a mixed record of enforcement, the latest requirements may have
more teeth behind them, since they are now backed by a high-level framework for
bolstering security controls. Moreover, the real-name registration system is
now closely connected to other account-based services in which the Internet is
not merely a publishing medium, but a platform for all aspects of living
(payments, travel, entertainment, work, etc.). The regulations also lay the
foundation for the government to aggregate online data on individuals to feed
into a “social credit” system, although the government has a long way to go in
setting up mechanisms to coordinate and process data.
Second, the regulations place an
emphasis on “self-regulation” by operators and service providers. The
government has outsourced regulatory responsibility to businesses for a long
time, but now there is a shift in focus from regulating production to
regulating access. Now those found in violation face restrictions in access to Internet
content and services. Assigning responsibility to online intermediaries helps
the government leverage more resources while gaining buy-in from companies to
the cybersecurity framework.
Originally
launched in 2006, the Multi-Level Protection System (MLPS, also translated as
the “Multi-Level Protection Scheme”) is an element of the MPS critical
infrastructure protection system that ranks networks by sensitivity on a scale
of one to five, with stricter security requirements for networks ranked at
higher levels, Level 1 being the highest. Even as the Cybersecurity Law and
related documents established new elements of a regime for “critical
information infrastructure” (CII) and new procedures for reviewing network
products and services (both of which are discussed below, under III and V), the MLPS was reinforced in the law.
MLPS developer and proponent Guo
Qiquan has emphasized that, according to the Cybersecurity Law: “MLPS shall be
used as a basic regime and national policy for cybersecurity in the new era.
New laws, policies, standards, technical support, talent, education and
training, and guarantee systems will be built.” Guo holds that the MLPS is a broader
regime than the two new systems and that MLPS and CII protection are on two inseparable
sides of the cybersecurity equation.
The exact breakdown in scope between
the MLPS and the new Cybersecurity Review Regime (CRR, see V below) remains unresolved and is a major issue that must be
clarified between CAC and MPS. This issue likely accounts for the current delay
in implementation of the CRR. One major difference appears to be that the CRR
includes examining the background and supply chains of network and product
service providers, focusing on risk management, whereas MLPS is more about
compliance.
Soon after the final text of the
Cybersecurity Law was made public, analysts in China and abroad identified
“critical information infrastructure” (CII) as one of the law’s most
consequential concepts. It both reinforced and stood apart from previous efforts
to protect “critical infrastructure,” and if an entity was to be classified as
a CII operator, it would be subject to some of the law’s most novel and
potentially burdensome requirements. The question of what is and isn’t CII,
then, became crucial.
The law itself identifies sectors
like “public communication and information services, power, traffic, water
resources, finance, public service, and e-government,” and draft regulations in
July (translated and analyzed by
DigiChina) added news media, healthcare, and, significantly, cloud computing
and big data providers. Nonetheless, the specific boundaries of CII remain
indistinct.
Also in question is who has
responsibility for regulating various areas of CII. Sectoral regulators are
clearly assigned responsibility to ensure security of CII in their areas of
authority, but some may lack existing competencies in cybersecurity
administration. The MLPS, discussed above in III, may apply in an overlapping way.
Standards developed by TC260 and
updated regulations can be expected to provide some further clarity, but
regulators appear to maintain significant freedom to interpret the reach of
CII—likely in a very broad way. That means a wide variety of organizations will
at least consider the Cybersecurity Review Regime in procurement, and domestic
storage of data may emerge as a default procedure. This will likely create
challenges for foreign suppliers and Chinese firms operating across borders,
both of whom maintain some voice in how the details take shape over time.
As Chinese regulators cope with a
lively proliferation of online platforms and services, developing protections
for the great volume of data produced by and collected on users or businesses
is a major challenge. The Cybersecurity Law calls for several forms of
regulation, including: requirements to store certain information inside China
and at certain levels of security; procedures before transferring certain
information out of China; and consent requirements when collecting personal
data.
Each of these requirements hinges on
definitions of the data covered, i.e. whether it is either “personal
information” or “important data.” (See DigiChina’s analysis of the
evolving Chinese controversy over how to implement cross-border data flow regulations,
and of the overlap between
“personal information and important data” and CII.)
At the center of this system is the
definition of personal information, which will be used to determine whether an
organization must conduct a security review of the data it holds. The scope of
the definition of personal data was clarified somewhat in the second draft of
the Personal Information Security Specification (draft), released in early
September 2017. There has been significant change in the content of this
document since a first draft
was released earlier this year. The most important changes include greater
clarity in the requirements for how data collectors handle user consent
requirements.
CAC, MIIT, MPS, and TC260 have
already teamed up for an early effort to shape how Internet companies inform users
of their privacy practices by examining the practices of 10 prominent
services—including Alibaba’s Taobao, Tencent’s Wechat, and the ride-hailing
giant Didi Chuxing—and convening their representatives to promote best
practices. Authorities consider this a type of enforcement, even short of
finalized standards and detailed definitions.
The Network Products and Services
Management System, because it interlocks with the CII and MLPS systems, highlights
the way in which the framework is best understood as a matrix. On May 2, CAC
released the Security
Review Measures for Network Product and Service Security Inspection (Interim). The
measures, which establish the Cybersecurity Review Regime (CRR) discussed under
II and III above, require network products and services used in critical
information infrastructure (CII) to undergo a cybersecurity review administered
by CAC. The final definition of CII is still pending, and the full criteria for
assessments and list of those conducting them are unknown. Without these pieces
of the puzzle, the practical implications of this system remain murky.
The government has started to issue
several other documents meant to provide more clarity on the scope of the new
review regime. These include the “Public Announcement on Issuing Network Key
Equipment and Cybersecurity Special Product List (First Batch),” which outlines
a list of products and services subject to the review and certification. There
are also at least three relevant standards by TC260 that have not yet been
officially published.
Yet, the follow-on product list and
standards do little to narrow the far-reaching scope of the CRR. That is
because the “interim” document establishing the CRR states that, in addition to
some specifics, the review will focus on “other risks that could harm national
security”—essentially preserving government authority to interpret the scope of
reviews however it wants.
With the creation of the CRR, the
list of security reviews for the ICT sector is growing. In addition to the
MLPS, ICT companies also must undergo security reviews associated with
different parts of the cybersecurity framework, including cross-border data
transfer assessment and separate CII security evaluations. The government has
yet to work out coordination among the different review bodies and agencies,
increasing risks of regulatory gridlock and turf battles.
An evolving system for coordinating
China’s public and private sector response to cybersecurity incidents is built
on a number of measures and draft standards related to incidents, definitions,
and cyber threat information sharing. It includes standards from TC260
addressing cybersecurity incident response exercises and developing a
cybersecurity vulnerability discovery and reporting management system. MIIT has
a major role in this effort, as it oversees the current incident response
system run by the National Computer Network Emergency Response Technical Team
(CNCERT).
MIIT in August issued the Public
Internet Cybersecurity Threat Monitoring and Mitigation Measures, which call
for: the development of a cybersecurity threat information sharing platform;
unified collection, storage, analysis, and notification; the release of network
security threat information; the formulation of relevant interface
specifications; and the development of interoperability with related
cybersecurity monitoring platforms. CNCERT is responsible for platform
construction and operational and maintenance work.
The August document references the
Cybersecurity Law, which among other things places heavy requirements on “network
operators,” which it says “shall formulate emergency response
plans for cybersecurity incidents, promptly addressing system vulnerabilities,
computer viruses, cyber attacks, network incursions, and other such
cybersecurity risks.”
As in several areas of the evolving
framework, it remains unclear whether foreign companies will eventually be
designated as network operators with the associated responsibilities. Foreign
companies providing telecommunications or cloud services in China, in any case,
will almost certainly be required to step up participation in the evolving
incident management system and provide incident reports to MIIT/CNCERT and CAC.
Over the next six months and beyond,
Chinese regulators will work to refine the key implementing regulations that
remain in interim form. They will continue to release new drafts of standards
associated with these six systems, some for public comment and others initially
shared only with industry groups and domestic and foreign companies that are
participants in TC260 working groups. This suggests that CAC, MPS, and MIIT are
attempting to engage in a real dialogue with industry, though it remains short
of the type of intense and extended level of collaboration between regulators
and stakeholders that is typical of U.S. and EU regulatory development. Chinese
regulators will continue to seek a better interoperability with global best
practices in key areas such as cross-border data flows, and are likely to
carefully study how companies are preparing to comply with the Europe’s General Data Protection Regulation (GDPR) and how regulators
react to major emerging issues such as the Uber data breach.
Regulators will also face a lack of capacity and shortage of
personnel to support the implementation of this framework. For example, it
remains unclear which organizations will be designated to conduct security
reviews of the many sectors, products and services, and personal and important
data sets. CAC’s Cybersecurity Review Office is staffed by personnel seconded
from other agencies. The office has already done a series of informal reviews
of a small number of foreign products, but it is not clear whether it could
facilitate reviews of large numbers of products across multiple and large
sectors designated as CII. No sectoral regulators have put in place adequate
implementing regulations or a transparent system for conducting reviews.
Big questions remain around China’s participation in global
cyberspace governance. The Chinese government’s robust development of a
domestic regulatory regime that affects both those operating online in China
and Chinese companies operating globally has already made Chinese cyberspace
policy relevant worldwide. Chinese ideas and proposal in international discussions
are also relevant in addressing concerns the status quo does not—even if from a
different ideological starting point. Many governments have long been content
to dismiss Chinese ideas such as cyber sovereignty as the work of an “enemy of
the global Internet” seeking to undermine a functional and virtuous model. In
the coming months, governments and civil society are likely to discover about
Internet governance what companies have already learned about the digital
economy: Chinese initiatives are evolving, have appeal to some actors, create
problems for others, and absolutely cannot be ignored.