China tightens the reins on cyber security

The Chinese government will require tech experts to inform it of security flaws

Chinese tech experts who find any flaws in computer security will be required to tell the Chinese government. Furthermore, the government will forbid them from selling that knowledge for profit.

That’s according to new rules further tightening the Chinese Communist Party’s control over digital information, as the Associated Press reported.

These rules, which take effect September 1, will ban private-sector cyber security experts who find zero-day or previously unknown security weaknesses from selling that information to police, spy agencies, or companies.

China’s government is increasingly sensitive about its control over information on China’s people and economy. 

Related Resource

2021 IBM Security X-Force Insider Threat Report

Top discovery methods and recommendations for insider attacks

White background with a black border on side - whitepaper from IBMFree download

For example, Chinese companies are barred from storing data about Chinese customers outside of China. Banks and other entities deemed sensitive must use only Chinese-made security products wherever possible. Foreign vendors that sell routers and some other network products in China must disclose to regulators how any encryption features work.

Under the Cyberspace Administration of China's new cyber security rules, anyone in China who finds a vulnerability must tell the government. The government will then decide what repairs to make. 

No one may “collect, sell or publish information on network product security vulnerabilities,” according to the rules. Also, no information can be given to “overseas organizations or individuals” other than the product’s manufacturer.

The ruling party’s military wing, the People’s Liberation Army (PLA), is a leader in cyber warfare technology alongside the US and Russia. US prosecutors have previously charged PLA officers with hacking American companies to steal technology and trade secrets.

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

Graylog launches new cyber security solution to address legacy issues
cyber security

Graylog launches new cyber security solution to address legacy issues

21 Oct 2021
US to ban surveillance software exports to authoritarian governments
cyber security

US to ban surveillance software exports to authoritarian governments

21 Oct 2021
A quarter of all malicious JavaScript is obfuscated
hacking

A quarter of all malicious JavaScript is obfuscated

20 Oct 2021
Almost 70% of CISOs expect a ransomware attack
ransomware

Almost 70% of CISOs expect a ransomware attack

19 Oct 2021

Most Popular

Alibaba unveils custom Arm-based server chip
components

Alibaba unveils custom Arm-based server chip

19 Oct 2021
What is cyber warfare?
Security

What is cyber warfare?

15 Oct 2021
HPE wins networking contract with Birmingham 2022 Commonwealth Games
Network & Internet

HPE wins networking contract with Birmingham 2022 Commonwealth Games

15 Oct 2021