China to launch global data security initiative

Data security initiative aims to curb activities that “infringe upon personal information”

China’s Foreign Minister Wang Yi announced the launch of a global data security initiative today. 

The data security initiative comprises eight key points, including: 

  • Approaching data security with an objective attitude
  • Opposing the use of Chinese tech to impair other states’ critical infrastructure 
  • Asking companies to respect the laws of its host countries

Wang said the initiative also aims to stop activities that “infringe upon personal information” and opposes the use of technology to conduct mass surveillance against other states. The initiative added that organizations should respect their host countries’ laws and stop pressuring domestic companies to store data from overseas in their region.

“We have not and will not ask Chinese companies to transfer data overseas to the government in breach of other countries’ laws,” Wang said.

When announcing the data security initiative, Wang also took a swipe at the U.S. and addressed accusations that tech companies in China pose a national security threat by collecting user data and sending it back to Beijing.

“Bent on unilateral acts, a certain country keeps making groundless accusations against others in the name of ‘clean’ network and used security as a pretext to prey on enterprises of other countries who have a competitive edge,” Wang said. 

“Such blatant acts of bullying must be opposed and rejected,” he added.

Beijing’s initiative comes at a time when tensions between the U.S. and China are rising. The Trump administration has described Chinese tech firms like Huawei and popular Chinese apps such as TikTok and WeChat as national security threats. 

While Huawei has faced restrictions since last year, TikTok and WeChat were the targets of a recent executive order banning transactions with TikTok owner, ByteDance, and WeChat owner, Tencent.  

Featured Resources

Choosing a collaboration platform

Eight questions every IT leader should ask

Download now

Performance benchmark: PostgreSQL/ MongoDB

Helping developers choose a database

Download now

Customer service vs. customer experience

Three-step guide to modern customer experience

Download now

Taking a proactive approach to cyber security

A complete guide to penetration testing

Download now

Recommended

Unsecured cloud storage led to data exposure at New England energy company
data protection

Unsecured cloud storage led to data exposure at New England energy company

22 Apr 2021
Geico data breach leads to stolen driver’s license numbers
data breaches

Geico data breach leads to stolen driver’s license numbers

21 Apr 2021
eBay, Apple, Microsoft, Facebook, and Google were phishers’ top targets in 2020
phishing

eBay, Apple, Microsoft, Facebook, and Google were phishers’ top targets in 2020

20 Apr 2021
HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021

Most Popular

REvil threatens to release Apple’s hardware schematics
ransomware

REvil threatens to release Apple’s hardware schematics

21 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021
Samsung Galaxy S21 Ultra review: Ultra in every sense of the word
Mobile Phones

Samsung Galaxy S21 Ultra review: Ultra in every sense of the word

22 Apr 2021