State Council Notice concerning Printing and Issuance of the Outline of Operations to Stimulate the Development of Big Data
GF No. (2015)50
All provincial, autonomous region and municipal People’s Governments, all State Council ministries and commissions, all directly subordinate bodies.
Hereby, the “Outline of Operations to Stimulate the Development of Big Data” is printed and issued to you, please implement it earnestly.
31 August 2015 Read the rest of this entry »
This translation was published first on China Law Translate, and is the result of a collaborative effort led by Jeremy Daum. It is republished here with his kind permission. I contributed translations of chapters I and II, amongst others.
The 15th meeting of the Standing Committee of the 12th National People’s Congress performed initial review of this “People’s Republic of China Cybersecurity Law (Draft)” in June 2014. The ” People’s Republic of China Cybersecurity Law (Draft)” is hereby released to the public on the Chinese National People’s Congress website for collection of public comments. The public can directly log in to the NPC website ((www.npc.gov.cn) ）and provide comments; and may also mail comments to the National People’s Congress Legal Work Committee, (Beijing, Xicheng District, Qianmen West Road #1, 100805) [in Chinese: 北京市西城区前门西大街1号，邮编：100805] Please clearly indicate on the envelope that it is a comment on the Cybersecurity Law draft. The consultation period concludes on: August 5, 2015. Read the rest of this entry »
(Passed at the 15th Meeting of the 12th National People’s Congress Standing Committee on 1 July 2015)
Chapter I: General principles
Article 1: In order to safeguard national security, defend the people’s democratic dictatorship regime and the system of Socialism with Chinese characteristics, protect the fundamental interests of the people, ensure the smooth progress of reform, opening up and Socialist modernization construction, and realize the great rejuvenation of the Chinese nation, in accordance with the Constitution, this Law is formulated. Read the rest of this entry »
A few days ago, it was reported in the Chinese press that opinions were solicited concerning the promulgation of cybersecurity legislation. According to these reports, consultation meetings had already been held with large Chinese companies such as Baidu, Alibaba, Tencent, 360 and Huawei, and that public consultation would be imminent. In the mean time, a draft cybersecurity law has been presented to the National People’s Congress Standing Committee at its bimonthly meeting. No text has been released as of yet, but a Xinhua press release summaries the main points of the draft.
Draft Cybersecurity Law: Safeguard Sovereignty in Cyberspace
Xinhua (Journalists Luo Yufan, Chen Fei)
In order to ensure cybersecurity, safeguard sovereignty and national security in cyberspace, stimulate the healthy development of economic and social informatization, the incessant perfection of laws and regulations in the area of cyberspace protection is urgently required. The 5th Meeting of the 12th National People’s Congress Standing Committee has deliberated a draft cybersecurity law on the 24th.
The draft has 18 articles in 7 chapters, and provides a concrete structural design for areas such as guaranteeing the security of network products and services, guaranteeing the security of network operations, guaranteeing the security of network data, and guaranteeing the security of network information. Read the rest of this entry »
Speech at the Initiation Ceremony for the 2nd National Cybersecurity Propaganda Week
1 June 2015
All respected guests,
Comrades, students, friends:
Good morning, everyone! Today is “1 June”, the International Children’s Day, on this beautiful day that belongs to children, we are holding the initiation ceremony for the 2nd National Cybersecurity Propaganda Week in the China Science and Technology Museum. First and foremost, on behalf of the Central Internet Information Office [Note: this is a literal translation, the official English name for this body is the Cyberspace Administration of China], I’d like to send my congratulations to children on this holiday, and would like to express heartfelt thanks to all sponsoring work units, all localities and all departments, all enterprises and news media that support and participate in this Cybersecurity Propaganda Week! Read the rest of this entry »
This article was originally posted on the Red Flag Manuscripts/Seeking Truth website on 22 May.
The 3rd Plenum of the 18th Party Congress put forward the overall objective of comprehensively deepening reform, which requires “perfecting and developing the Socialist system with Chinese characteristics, and moving forward the modernization of State governance systems and governing capabilities”. The modernization of State governance systems and governing capabilities transcend and develop traditional management, they cannot do without the support of modern Internet and informatization technologies, this is a major change with revolutionary significance, and requires our deep research. Read the rest of this entry »
This article was published today in the PLA Daily, and reposted on the Seeking Truth website.
No-one living today can leave the network. The network is changing people’ lives, and is profoundly influencing national security.
Cybersovereignty symbolized national sovereignty. The online space is also the security space of a nation. If we do not occupy the online battlefield ourselves, others will occupy it; if we do not defend online territory ourselves, sovereignty will be lost, and it may even become a “bridgehead” for hostile forces to erode and disintegrate us.
The Internet has become the main battlefront for struggle in the ideological area. With the existence of the network, the ideological front has been completely thrown open, gates of minds have become gates of the country, defence of the mind has become defence of the country, and a battle of the minds has become a hidden war. Whoever controls the network, will seize the commanding heights in the ideological struggle, and command the lifelines of national security and development in the information era.
Network resources are not virtual resources, but they are real resources involving national security. In the network age, a country’s information, resources, morale, key nodes, etc., can be wantonly pillaged by hostile nations who control advanced network technology.
National security has become an important component part of our country’s overall security “chessboard”. It may be said that without cybersecurity, there is no national security.
With regard to cybersecurity, apart from the fact that we have strengthened technological forces, strengthening “moral defence” forces should become the heaviest of heavies. The Internet is “the greatest variable” that we face, if we do not handle it well, it may become “an anxiety in hearts and minds”. Especially online ideological work involves our banners, our path and national political security, this is a core battlefield that we must defend and occupy. A scholar pointed out that: “control of cyber power in the 21st century is equally decisive as controlling naval power in the 19th Century and airpower in the 20th”. Western anti-China forces have continuously and vainly attempted to use the Internet to topple China. A few years ago, western political leaders stated that “with the Internet, there is a way to counter China”, and “Socialist countries will fall into the Western fold, and this will start with the Internet”.
Consequently, Western hostile forces and a small number of “ideological traitors” in our country use the network, and relying on computers, mobile phones and other such information terminals, maliciously attack our Party, blacken the leaders who founded the New China, vilify our heroes, and arouse mistaken thinking trends of historical nihilism, with the ultimate goal of using “universal values” to mislead us, using “constitutional democracy” to throw us into turmoil, use “colour revolutions” to overthrow us, use negative public opinion and rumours to oppose us, and use “de-partification and depoliticization of the military” to upset us.
On this battlefield of the Internet, whether or not we are able to ward of the enemy from the gates of minds, directly affects our country’s ideological security and regime security. This is an online public opinion battle with glints and flashes of cold steel and numerous opportunities to make a kill. Back in the day, to tackle the Soviet Union, one method Western hostile forces adopted was online infiltration in the ideological area. Afterwards, in the Southern Alliance, and a number of countries in Southwest Asia, and North Africa, they played the same tricks: through subverting the online platforms of their target countries, they used means such as garbled statements and palming off the spurious as the genuine to attack their targets, and so by borrowing a knife to kill someone, they eliminated their strategic adversary in the real world.
If hearts are won, there is gladness, if hearts are lost, there is failure. A regime’s disintegration often begins in the ideological area, political upheaval and regime change can happen in the space of a night, but ideological evolution is a long-term process. If the ideological front is broken, other fronts will become difficult to hold. We must grasp the leadership power, management power and discourse power in online ideology work closely in our hands, we cannot let it fall to others at any time, otherwise, we will make irreversible and historical mistakes.
Even so, in comparison with the strategic attacks conducted in an organized, targeted, planned and gradual manner by hostile powers who have dominated online public opinion guidance power for a ling time, a small number of leading cadres in our Army haven’t yet learnt “the art of swimming” in the high waves of the network, they lack a sober understanding and sense of worry concerning the circumstances of the online public opinion struggle, and lack an active understanding and sense of purpose in battling for online “terrain” for the sake of the Party, the country and the Army.
Strengthening online ideology work means safeguarding the highest interest of the country and the nation, and safeguarding the fundamental interests of the people. In the face of this struggle, we cannot and must not retreat, we cannot and must not lose. If we do not give high regard to cybersovereignty, and do not put online ideological work in a high position and grasp it in our hands, the masses will be led astray by the enemy, and the military will face the risk of changing of nature and colour. It may be said that our biggest danger endangers it battlefield, and the most crucial matter is the crux of this battlefield.
It is still necessary to field the main force on this battlefield. In the journey towards a strong country and a strong military, our Army must not only firmly safeguard national sovereignty, security and development interests on the tangible traditional battlefield, it must also firmly defend ideological security and political security on the intangible cyber battlefield, this is a task to which we are duty-bound. Only if we act as we did at the time of the Battle of Triangle Hill, are riveted to the most forward position of the battlefield and the fight in this ideological struggle, are online “seed machines and propaganda teams”, and arouse hundreds and thousands in the “Red Army”, will we be able to be good shock troops and fresh troops in the construction of the “Online Great Wall”, and will we be able to endure and vanquish in this protracted, smokeless war.
In order to implement the CCP Central Committee General Office and State Council General Office “Guiding Opinions concerning Promoting the Converged Development of Traditional Media and New Media”, encourage lawful and sincere business between newspaper and periodical work units and Internet media, promote the establishment and completion of copyright cooperation mechanisms, and standardize the online reprint copyright order, on the basis of the relevant regulations of the “Copyright Law of the People’s Republic of China”, the “Copyright Law Implementation Regulations of the People’s Republic of China”, and the “Regulations to Protect the Right of Distribution Through Information Networks”, matters concerning standardizing the online reprint copyright order are hereby notified as follows: Read the rest of this entry »
On 6 February, the Central Leading Group for Cybersecurity and Informatization and China Mobile jointly organized a nationwide conference for cyber and information security, at which China Telecom, China Mobile, People’s Daily Online, Xinhua Online, Qihoo 360 and other such Internet and information technology firms committed to new list of proposals concerning reforming the online environment. These documents mostly have symbolic value, but demonstrate the continuing pressure on enterprises to “identify with” (rentong 认同) the State’s objectives.
Since the 18th Party Congress, and especially since the establishment of the Central Leading Group for Cybersecurity and Informatization, the Centre has put forward a series of major policies and strategic deployments concerning cybersecurity and informatization work, greatly inspiring internet and information technology enterprises as well as sectoral organizations nationwide. Everyone deeply feels major responsibilities, and shall dare to undertake work, act vigorously, give rein to their own superiorities, and truly make even greater contributions to safeguarding our country’s cyber and information security. To this end, the Chinese Cyberspace Security Association, together with all Internet and information technology enterprises and sectoral organizations publish the following proposal: Read the rest of this entry »
CCP General Office and State Council General Office Opinions concerning Strengthening the Construction of New Types of Think Tanks with Chinese Characteristics
In order to deeply implement the spirit of the 18th Party Congress and the 3rd and 4th Plenums of the 18th Party Congress, strengthen the construction of new types of think tanks with Chinese characteristics and establish and complete a policymaking consultancy system, the following Opinion is formulated.
I, Major significance
(1) New kinds of think tanks with Chinese characteristics are an important support for scientific, democratic and lawful policymaking by the Party and the government. A policymaking consultancy system is an important content of the construction of our country’s Socialist democratic politics. Our Party has always given high regard to policymaking consultancy wok. Since reform and opening up, our country’s think tank construction undertaking has developed rapidly, providing powerful intelligence support to Party and government policymaking. At present, the comprehensive construction of a moderately prosperous society has entered a decisive stage, analysing and explaining difficult questions of reform, development and stability and responding to global issues is complex and difficult without precedent, this urgently requires the completion of a policymaking support system with Chinese characteristics, the forceful strengthening of think tank construction, the support of scientific policymaking through scientific consulting, and the guidance of scientific development through scientific policymaking. Read the rest of this entry »
“Opinions concerning Further Strengthening and Improving Propaganda and Ideology Work in Higher Education Under New Circumstances”
The “Opinion concerning Further Strengthening and Improving Propaganda and Ideology Work in Higher Education Under New Circumstances”, published today, is the latest of a series of documents aimed at imposing stricter political discipline and control in China’s academia. The original document has not been published. The following is a translation of Xinhua’s summary.
The Central Committee General Office and the State Council General Office have recently issued the “Opinions concerning Further Strengthening and Improving Propaganda and Ideology Work in Higher Education Under New Circumstances”. The “Opinion” emphatically points out that ideological work is an extremely important work of our Party and our country, higher education is a forward battlefield in ideological work, and shoulders the important tasks of studying, researching and propagating Marxism, fostering and carrying forward the Socialist core value system, and providing talent guarantees and intelligent support for the realization of the Chinese Dream of the great rejuvenation of the Chinese nation. Doing higher education propaganda and ideology work well and strengthening the construction of the higher education ideological battlefields are strategic projects, steadfast projects and projects of casting souls, they relate to Party leadership over higher education, relate to the comprehensive implementation of the Party’s educational policies, relate to successors for the undertaking of Socialism with Chinese characteristics, and have an extremely important and profound significance for consolidating the guiding position of Marxism in the ideological area and consolidating a common ideological basis for the united struggle of the entire Party, the entire country and all the people.
The “Opinion” consists of seven parts: I, Strengthening and improving higher education propaganda and ideology work is a major and urgent strategic task; II, guiding ideology, basic principles and main tasks; III, realistically promoting the entry of the theoretical system of Socialism with Chinese characteristics into textbooks, classrooms and minds; IV, Forcefully raising the ideological and political quality of higher education teaching teams; V, incessantly expanding higher education mainstream ideology and public opinion; VI, Striving to strengthen management of the higher education propaganda and ideology battlefield; VII, Realistically strengthening Party leadership over higher education propaganda and ideology work. Read the rest of this entry »
Opinions concerning Stimulating the Development of Cloud Computing Innovation and Fostering New Business Models in the Information Industry
GF No. (2015)5
All provincial, autonomous region and municipal People’s Governments, all State Council ministries and commissions, all directly subordinate bodies:
Cloud computing is a completely new business model to promote the realization of providing supply according to demand in terms of information technology capability, which stimulates the full use of information technology and data resources, and is a major reform and inevitable trend in informatized development. Developing cloud computing benefits the sharing of information, knowledge and innovation resources, the reduction of start-up costs for the whole society, the fostering and shaping of new industries and new consumption hot spots, and is of great importance for stable growth, structural adjustment, enriching the people’s livelihoods and establishing a new type of country. At present, global cloud computing is in its primary phase of development, and our country faces a rare opportunity, however, there are also problems such as relatively weak service capacity, a relatively large lack in core technology, insufficient openness and sharing of information resources, prominent challenges with information security, etc., construction has been focused on while application has been overlooked, and the sprouts of disorderly development of data centres are beginning to emerge. In order to stimulate the innovation and development of our country’s cloud computing and vigorously foster new business models in the information industry, the following opinions are hereby put forward
I, Guiding ideology, basic principles and development objectives
(1) Guiding ideology.
Adapt to the needs of moving new-type industrialization, informatization, urbanization, agricultural modernization and the modernization of the State’s governing ability forward, take comprehensively deepening reform as driver, take enhancing capabilities and deepening application as main line, perfect development environments, foster backbone enterprises, innovate service models, expand the scope of application, strengthen technology support, guarantee information security, optimize the distribution of facilities, stimulate the innovative development of cloud computing, foster new business models in the innovation industry, ensure that information resources are being used with high efficiency, provide powerful support for start-ups and emerging sectors, and for liberating innovative vitality, and draw out new drivers for the sustained and healthy development of the economy and society. Read the rest of this entry »