China tightens the reins on cyber security

The Chinese government will require tech experts to inform it of security flaws

Chinese tech experts who find any flaws in computer security will be required to tell the Chinese government. Furthermore, the government will forbid them from selling that knowledge for profit.

That’s according to new rules further tightening the Chinese Communist Party’s control over digital information, as the Associated Press reported.

These rules, which take effect September 1, will ban private-sector cyber security experts who find zero-day or previously unknown security weaknesses from selling that information to police, spy agencies, or companies.

China’s government is increasingly sensitive about its control over information on China’s people and economy. 

Related Resource

2021 IBM Security X-Force Insider Threat Report

Top discovery methods and recommendations for insider attacks

White background with a black border on side - whitepaper from IBMFree download

For example, Chinese companies are barred from storing data about Chinese customers outside of China. Banks and other entities deemed sensitive must use only Chinese-made security products wherever possible. Foreign vendors that sell routers and some other network products in China must disclose to regulators how any encryption features work.

Under the Cyberspace Administration of China's new cyber security rules, anyone in China who finds a vulnerability must tell the government. The government will then decide what repairs to make. 

No one may “collect, sell or publish information on network product security vulnerabilities,” according to the rules. Also, no information can be given to “overseas organizations or individuals” other than the product’s manufacturer.

The ruling party’s military wing, the People’s Liberation Army (PLA), is a leader in cyber warfare technology alongside the US and Russia. US prosecutors have previously charged PLA officers with hacking American companies to steal technology and trade secrets.

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

Microsoft touts new cyber security help for nonprofits
cyber security

Microsoft touts new cyber security help for nonprofits

22 Oct 2021
Ofcom report reveals alarming uptick in smishing attacks
scams

Ofcom report reveals alarming uptick in smishing attacks

22 Oct 2021
Graylog launches new cyber security solution to address legacy issues
cyber security

Graylog launches new cyber security solution to address legacy issues

21 Oct 2021
US to ban surveillance software exports to authoritarian governments
cyber security

US to ban surveillance software exports to authoritarian governments

21 Oct 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
Windows 11 has problems with Oracle VirtualBox
Microsoft Windows

Windows 11 has problems with Oracle VirtualBox

5 Oct 2021