China to launch global data security initiative

Data security initiative aims to curb activities that “infringe upon personal information”

China’s Foreign Minister Wang Yi announced the launch of a global data security initiative today. 

The data security initiative comprises eight key points, including: 

  • Approaching data security with an objective attitude
  • Opposing the use of Chinese tech to impair other states’ critical infrastructure 
  • Asking companies to respect the laws of its host countries

Wang said the initiative also aims to stop activities that “infringe upon personal information” and opposes the use of technology to conduct mass surveillance against other states. The initiative added that organizations should respect their host countries’ laws and stop pressuring domestic companies to store data from overseas in their region.

“We have not and will not ask Chinese companies to transfer data overseas to the government in breach of other countries’ laws,” Wang said.

When announcing the data security initiative, Wang also took a swipe at the U.S. and addressed accusations that tech companies in China pose a national security threat by collecting user data and sending it back to Beijing.

“Bent on unilateral acts, a certain country keeps making groundless accusations against others in the name of ‘clean’ network and used security as a pretext to prey on enterprises of other countries who have a competitive edge,” Wang said. 

“Such blatant acts of bullying must be opposed and rejected,” he added.

Beijing’s initiative comes at a time when tensions between the U.S. and China are rising. The Trump administration has described Chinese tech firms like Huawei and popular Chinese apps such as TikTok and WeChat as national security threats. 

While Huawei has faced restrictions since last year, TikTok and WeChat were the targets of a recent executive order banning transactions with TikTok owner, ByteDance, and WeChat owner, Tencent.  

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

Marsh McLennan reveals its cyber risk analytics center
risk management

Marsh McLennan reveals its cyber risk analytics center

15 Oct 2021
Justice Department unveils civil cyber fraud initiative to battle online crime
cyber attacks

Justice Department unveils civil cyber fraud initiative to battle online crime

7 Oct 2021
Senator to introduce new bill to force ransomware payment disclosures
ransomware

Senator to introduce new bill to force ransomware payment disclosures

6 Oct 2021
The best defence against ransomware
Whitepaper

The best defence against ransomware

1 Oct 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
Windows 11 has problems with Oracle VirtualBox
Microsoft Windows

Windows 11 has problems with Oracle VirtualBox

5 Oct 2021