Subscribe

Tag

China cyber policies

China's New Data Protection Scheme
July 02, 2019

China's New Data Protection Scheme

By Qiheng Chen
China has released a draft regulation fleshing out its cybersecurity law.

Why China's Data Regulations Are a Compliance Nightmare for Companies
June 27, 2019

Why China's Data Regulations Are a Compliance Nightmare for Companies

By Daniel Rechtschaffen
Legal ambiguities leave companies guessing where they must follow the laws and when they can just risk it.
China’s Great Firewall: A Serious Pain in the Neck for European and US Companies
June 21, 2018

China’s Great Firewall: A Serious Pain in the Neck for European and US Companies

By Charlotte Gao
While China vows to become a “strong cyberpower,” China’s internet restrictions are having the opposite effect.

China's Cyber Militias
March 01, 2018

China's Cyber Militias

By Nicholas Lyall
China's cyber power is in the grip of dual trends: pluralism and centralization.

How Are US-China Cyber Relations Progressing?
November 01, 2017

How Are US-China Cyber Relations Progressing?

By Adam Greer and Nathan Montierth
The 2015 agreement may have fallen short of its goals, but the U.S. and China can still cooperate on cyber issues.

Waiting for China’s Data Protection Law
August 12, 2017

Waiting for China’s Data Protection Law

By George G. Chen and Tiffany G. Wong
The lack of a unified legal framework may hamper China’s ongoing digitalization drive.

China’s Emerging Cyberspace Strategy
May 24, 2016

China’s Emerging Cyberspace Strategy

By Lu Chuanying
A closer look at China's cyber strategy, and what it means for the world.
Xi Jinping Tech Speech Signals Tougher Times for Foreign Firms
May 17, 2016

Xi Jinping Tech Speech Signals Tougher Times for Foreign Firms

By Sarah Cook
Xi's latest remarks on cyber tech hint that Beijing remains determined to push foreign firms out of the Chinese market.

Xi Jinping’s Global Cyber Vision
January 20, 2016

Xi Jinping’s Global Cyber Vision

By Stephenie Andal
Is Beijing in fact leading the way with its policies on “cybersovereignty?”

Page 1 of 1