Graham Webster
Research Scholar, Program on Geopolitics, Technology, and Governance, Stanford University
Details of China's Cybersecurity Law regime are coming into focus, two years after the law's implementation
China’s Cybersecurity Law, which went into effect June 1, 2017, lays the groundwork for several regimes of security review and certification for information technology. Article 23 reads:
Critical network equipment and specialized cybersecurity products shall follow national standards and mandatory requirements, and be security certified by a qualified establishment or meet the requirements of a security inspection, before being sold or provided. The state cybersecurity and informatization departments, together with the relevant departments of the State Council, will formulate and release a catalog of critical network equipment and specialized cybersecurity products, and promote reciprocal recognition of security certifications and security inspection results to avoid duplicative certifications and inspections.
The following is a translation of draft implementing measures that would clarify how Article 23’s requirements are implemented. They notably refer to two other documents, the catalog mentioned in Cybersecurity Law Article 23 and Articles 1 and 2 below, and one or more separate “standards forming the basis of critical network equipment security testing” in Article 7 below. –Ed.
In order to implement the Cybersecurity Law of the People’s Republic of China and promote the smooth development of critical network equipment security testing work, the Ministry of Industry and Information Technology drafted the “Critical Network Equipment Security Testing Implementing Measures (Draft for Comment)” (see [text below]). It has been issued as a standardized document and is now open to society for comment. If you have any comments or suggestions, please provide your feedback before July 4, 2019.
Contact number: 010-68206207
Fax: 010-68206187
Email: wangmeifang@miit.gov.cn
Address: Cybersecurity Management Bureau, Ministry of Industry and Information Technology, No.13 West Chang’an Street, Xicheng District, Beijing (Postal Code: 100804). Please indicate the following on the envelope: “Feedback for ‘Critical Network Equipment Security Testing Implementing Measures (Draft for Comment).’”
Attachment: “Critical Network Equipment Security Testing Implementing Measures (Draft for Comment)”. Docx
Ministry of Industry and Information Technology
June 4, 2019
Article 1: In order to strengthen the security management of critical network equipment, safeguard cybersecurity, and protect the lawful rights and interests of network operators and users, and in accordance with the Cybersecurity Law of the People’s Republic of China and the Announcement Concerning the Publication of the “Catalog of Critical Network Equipment and Specialized Cybersecurity Products (First Batch),” (Cyberspace Administration of China, Ministry of Industry and Information Technology, Ministry of Public Security, and the Certification and Accreditation Administration of China Announcement No. 1 of 2017, hereinafter referred to as Document No. 1 of the Four Ministries and Committees), these measures are formulated.
Article 2: The term “critical network equipment“ as mentioned in these measures refers to the critical network equipment listed in the “Catalog of Critical Network Equipment and Specialized Cybersecurity Products” issued by the Cyberspace Administration of China, the Ministry of Industry and Information Technology, the Ministry of Public Security, and the Certification and Accreditation Administration of China.
Article 3: These measures apply to businesses that choose security testing methods for their critical network equipment.
Article 4: The security testing of critical network equipment follows the principles of independence, fairness, science, and integrity.
Article 5: The Ministry of Industry and Information Technology is responsible for organizing and implementing critical network equipment security testing work.
The Ministry of Industry and Information Technology’s critical network equipment security testing service portal (hereinafter referred to as the “Service Portal”) centrally receives the relevant materials for critical network equipment security testing.
Article 6: If a manufacturer opts for critical network equipment security testing, it should register with the Service Portal and submit the following materials:
The front materials should be stamped with official seals. Except for certificates and license materials, other materials should be in Chinese.
Article 7: The manufacturer should select samples and entrust qualified organizations to carry out security testing. (Standard(s) forming the basis of critical network equipment security testing are to be issued separately.) After the requirements of security testing are met, the testing organization submits a critical network equipment security testing report to the Service Portal.
For critical network equipment admitted to the telecommunications equipment installation license system management (hereafter called "Installation Management"), if Installation Management shows it was provided an implementation test by qualified organizations following the standards of critical network equipment security testing, and if the installation license has not expired, it does not undergo repeat testing and should provide to the Service Portal a critical network equipment security testing report from the testing organization.
A qualified organization refers to an organization that is jointly recognized by the Certification and Accreditation Administration of China, the Ministry of Industry and Information Technology, the Ministry of Public Security, and the Cyberspace Administration of China, in accordance with the Cybersecurity Law, to undertake the task of critical network equipment security testing.
Article 8: The Ministry of Industry and Information Technology shall review and verify critical network equipment security testing reports and materials and issue a list of critical network equipment that has passed security testing (hereinafter referred to as the “Equipment List”) in accordance with relevant state regulations, valid for 3 years. For critical network equipment admitted to the telecommunications equipment installation license system management, and verified, the validity expires at the expiration of the equipment installation license.
If it is necessary to continue to sell or provide critical network equipment that has passed security testing, it shall be re-registered to the Service Portal and implement security testing within three months before the expiration of the validity period.
Article 9: When a change occurs in non-technical information such as the equipment model number or the manufacturer's basic information (such as the company name, address, nature of the enterprise, legal representative, place of equipment production, contact person, etc.) for critical network equipment that as passed security testing, the manufacturer should submit an explanation of the changes within 10 working days to the Service Portal.
If the information change involves Equipment List factors such as equipment model number or company name, an information change notice will be released after examination and approval by the Ministry of Industry and Information Technology.
When a non-technical change is made by a manufacturer to critical network equipment that has passed security testing, the expiration date of the validity period remains unchanged.
Article 10: Manufacturers of critical network equipment should:
Article 11: Testing organizations shall perform inspection tasks in accordance with the requirements of inspection standards and the provisions stated in these Measures. Testing organizations and their staff shall not defraud, plagiarize, or disclose manufacturers’ trade secrets, violate manufacturers’ intellectual property rights, etc.
Article 12: The Ministry of Industry and Information Technology shall continue to supervise critical network equipment that has passed security testing by conducting spot checks, receiving reports, and other means.
Article 13: If a manufacturer violates the provisions of these Measures, and the circumstances are relatively minor, the Ministry of Industry and Information Technology shall order it to make corrections within a set time limit. Where the manufacturer exhibits the following behaviors, the Ministry of Industry and Information Technology will, among other measures, suspend security testing or revoke passage of testing:
Article 14: If a testing organization violates the provisions of these Measures, and the circumstances are relatively minor, the Ministry of Industry and Information Technology shall order it to make corrections within a set time limit. Where the testing organization exhibits the following behaviors, the Ministry of Industry and Information Technology will, among other measures, temporarily stop accepting the organization’s testing results:
Article 15: Individuals and organizations that have discovered violations of relevant laws, regulations, and the provisions of these Measures by critical network equipment manufacturers, testing organizations, etc., have the right to make a report to the Ministry of Industry and Information Technology.
Article 16: These Measures shall be implemented beginning on the [number] day of [month], [year].