• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

U.S. Asks China Not to Enforce Cyber Security Law

September 26, 2017 by Jonathan Duani 4 Comments

I thought this was a pretty interesting article because it pertains to stuff that we were discussing in class. The article discusses how the US would like china to not enforce their new policy that requires companies who do business with china to house all data in the country and also have security that is subject to checks.

I think that this is important because you need to know the local laws of the companies that you are working with. It is also important because if china does not listen to the US and enforces the polices a lot of companies will have to  rework a lot of their infrastructure and security in order to comply.

 

https://www.usnews.com/news/top-news/articles/2017-09-26/us-tells-wto-concerned-about-chinese-cyber-security-laws

Filed Under: Week 03: Reconnaisance Tagged With:

Reader Interactions

Comments

  1. Donald Hoxhaj says

    September 30, 2017 at 5:37 pm

    Jonathan – Very interesting article. In the article, the following was mention “Washington has asked Beijing to refrain from enforcing a new cybersecurity law that would require foreign and domestic companies to store user data in China and submit to security checks, saying such measures would damage global trade.”. Which means that the new laws do not apply to just Chinese citizens. In addition, Russia has the similar laws to what the Chinse government is trying to implement when it comes to cybersecurity.

    Log in to Reply
  2. Elizabeth V Calise says

    October 28, 2017 at 3:40 pm

    Jonathan,

    Thanks for posting this! I always enjoy the international articles regarding cyber and the possible impact one country may cause on other countries. You mentioned that companies may be forces to rework their infrastructure and security in order to comply. I was also thinking would companies consider leaving China if the China decided to enforce these policies. I guess it is going to depend the cost of leaving the country versus the cost of data being leaked or anything related. Or maybe these polices will have new companies think twice before entering the country. I am curious what the risk looks like for some of these organizations.

    Log in to Reply
  3. Younes Khantouri says

    November 9, 2017 at 8:28 pm

    Jonathan,

    Very important topic. Your article touches a very sensitive area of cyber security. I did read another article related to the one you shared, Which talks about how China wants every person and company runs its IT resources (Hardware or software) using the country network to give the government the access to those resources. As Elisabeth mentioned, that would cause so many companies to leave China which will definitely reflect the country economy. I do believe that this new can not be accepted by so many companies especially those work with organizations or governments which automatically mean that they use sensitive information (PII).

    Log in to Reply
  4. Sachin Shah says

    December 17, 2017 at 6:53 pm

    Great article. I was surprised that USA told China to not enforce these security measures. Yes some companies may move away from doing business in China if the regulations were enforced. Yet than what is more important money\trade\economy or security measures? Its a matter of risk and sensitivity – yet USA doesnt want businesses leaving China. In the end of the day money talks.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in