Archive for the Information Security Category

China Cyber Security Law – Draft coming up

Posted in Information Security on June 30, 2015 by thomas4infosoc

this blog has been thoroughly underused the last couple of months, but let’s grab the opportunity of the draft Cyber Security Law being discussed by the NPC to start using it again:

For background on the bill see the analysis by German based China Think Tank MERICS:

http://www.merics.org/fileadmin/templates/download/china-monitor/China_Monitor_No_20_eng.pdf (Dec. 2014)

Then the official Xinhua news agency statement on the NPC deliberations:

http://www.globaltimes.cn/content/928704.shtml

Many international (and national) experts and stakeholders are eagerly awaiting the publication of the official draft. This should be up for public comment July 1, so we can expect some intensive analysis and media coverage very soon.

 

Advertisement

China Quarterly Archives Allow Free Access | China Digital Times (CDT)

Posted in etctetera, Information Security on November 13, 2011 by thomas4infosoc

China Quarterly Archives Allow Free Access | China Digital Times (CDT).

 

The China Quarterly recently made the ten most popular articles from the past decade available for free download on their website. The articles include:

* Reconsidering the Campaign to Suppress Counterrevolutionaries by Yang Kuisong

* Integrating Wealth and Power in China: The Communist Party’s Embrace of the Private Sector by Bruce J. Dickson

* The Changing Ecology of Foreign Policy-Making in China: The Ascension and Demise of the Theory of “Peaceful Rise” by Bonnie S Glaser and Evan S Medeiros

* Mao in Perspective by Jack Gray

* An Emerging Environmental Movement in China? by Phillip Stalley and Dongning Yang

* China’s Household Income and Its Distribution, 1995 and 2002 by Azizur Rahman Khan and Carl Riskin

* Missile Science, Population Science: The Origins of China’s One-Child Policy by Susan Greenhalgh

* Environmental NGOs and Institutional Dynamics in China by Guobin Yang

* The Chinese Energy Security Debate by Erica S. Downs

* Belief in Control: Regulation of Religion in China by Pitman B. Potter

http://journals.cambridge.org/action/displaySpecialArticle?jid=CQY&bespokeId=3224

Gmail issues surface

Posted in etctetera, Information Security, Internet World, News Clip on March 15, 2011 by thomas4infosoc

Gmail issues surface in China as LinkedIn admits to Great Firewall uncertainty | Asian Correspondent.

The thing is: everything is crawling these days: the streets are jammed rather with security guards than with cars, the internet is jammed with people surveying it rather than those who want or even need to use it. Functionality seems to stand in line behind paranoia once more. As many corporate or also government mail systems are not reliable, bringing Gmail to its knees does not only affect private users, but is actually detrimental to all those who use it instead of their office account because of the usually much higher reliability and security standards.

China National Indigenous Innovation Product Accreditation Criteria

Posted in etctetera, Information Security, Telecoms Policy on July 27, 2010 by thomas4infosoc

In April the Chinese Ministry of Science and Technology (“MOST”), the National Development and Reform Commission (“NDRC”), and the Ministry of Finance (“MOF”) jointly issued the Draft Notice Regarding the Launch of the National Indigenous Innovation Product Accreditation Work for 2010 (关于开展2010年国家自主创新商品认定工作的通知(征求意见稿)) (the “Draft Notice”). The Draft Notice amends the prior rules that were issued in 2009. Products that meet these standards, which are designed to promote domestic innovation and foster the development of new technologies, are eligible for preferential treatment in China’s government procurement practices.

Under the Draft Notice (available in Mandarin here: http://www.most.gov.cn/tztg/201004/t20100409_76710.htm), eligible products include computing and application hardware, telecommunications hardware, modern office equipment, software, new-energy products, and high efficiency energy-saving products. […]

It is important to note that meeting these requirements is a necessary, but not necessarily sufficient, qualification for preference in government procurement practices.  Many types of products, such as those related to information security, must clear additional certification hurdles in order to be eligible.

via Perkins Coie – News / Publications – Updates DetailChinese Government Issues Draft Notice Regarding 2010 National Indigenous Innovation Product Accreditation Criteria.