China tightens the reins on cyber security

The Chinese government will require tech experts to inform it of security flaws

Chinese tech experts who find any flaws in computer security will be required to tell the Chinese government. Furthermore, the government will forbid them from selling that knowledge for profit.

That’s according to new rules further tightening the Chinese Communist Party’s control over digital information, as the Associated Press reported.

These rules, which take effect September 1, will ban private-sector cyber security experts who find zero-day or previously unknown security weaknesses from selling that information to police, spy agencies, or companies.

China’s government is increasingly sensitive about its control over information on China’s people and economy. 

Related Resource

2021 IBM Security X-Force Insider Threat Report

Top discovery methods and recommendations for insider attacks

White background with a black border on side - whitepaper from IBMDownload now

For example, Chinese companies are barred from storing data about Chinese customers outside of China. Banks and other entities deemed sensitive must use only Chinese-made security products wherever possible. Foreign vendors that sell routers and some other network products in China must disclose to regulators how any encryption features work.

Under the Cyberspace Administration of China's new cyber security rules, anyone in China who finds a vulnerability must tell the government. The government will then decide what repairs to make. 

No one may “collect, sell or publish information on network product security vulnerabilities,” according to the rules. Also, no information can be given to “overseas organizations or individuals” other than the product’s manufacturer.

The ruling party’s military wing, the People’s Liberation Army (PLA), is a leader in cyber warfare technology alongside the US and Russia. US prosecutors have previously charged PLA officers with hacking American companies to steal technology and trade secrets.

Featured Resources

B2B under quarantine

Key B2C e-commerce features B2B need to adopt to survive

Download now

The top three IT pains of the new reality and how to solve them

Driving more resiliency with unified operations and service management

Download now

The five essentials from your endpoint security partner

Empower your MSP business to operate efficiently

Download now

How fashion retailers are redesigning their digital future

Fashion retail guide

Download now

Recommended

How to use machine learning and AI in cyber security
Security

How to use machine learning and AI in cyber security

30 Jul 2021
Chipotle’s marketing email hacked to send phishing emails
phishing

Chipotle’s marketing email hacked to send phishing emails

29 Jul 2021
The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

29 Jul 2021
Colonial Pipeline hack spurred copycat attacks on other oil and gas companies
hacking

Colonial Pipeline hack spurred copycat attacks on other oil and gas companies

29 Jul 2021

Most Popular

The benefits of workload optimisation
Sponsored

The benefits of workload optimisation

16 Jul 2021
RMIT to be first Australian university to implement AWS supercomputing facility
high-performance computing (HPC)

RMIT to be first Australian university to implement AWS supercomputing facility

28 Jul 2021
Samsung Galaxy S21 5G review: A rose-tinted experience
Mobile Phones

Samsung Galaxy S21 5G review: A rose-tinted experience

14 Jul 2021