男女羞羞视频在线观看,国产精品黄色免费,麻豆91在线视频,美女被羞羞免费软件下载,国产的一级片,亚洲熟色妇,天天操夜夜摸,一区二区三区在线电影
US EUROPE AFRICA ASIA 中文
Opinion / From the Press

Laws needed to protect information security

(chinadaily.com.cn) Updated: 2014-08-19 15:44

China must implement cyberspace laws to better protect information from the encroachment of information technology companies from the United States, says an article on the website guancha.cn.

Excerpts:

Reuters reported that Apple Inc stores Chinese users’ personal data in servers administered by China Telecom, a Beijing-headquartered state-owned telecommunication company.

Apple Inc has put servers in China in response to China’s concerns over information security.

But the key is whether data collection, cross-border information flow and usage are under scrutiny. The government should be responsible for these issues. China needs to establish a sound legal and regulatory framework to better ensure information and network security.

The US extends its “information sovereignty” to other countries through international companies such as Apple Inc, Microsoft Inc and Google Inc, as well as through their servers around the world.

The question of who should be in charge of managing the data in Apple’s servers in China is the crux of the information security issue. The answer is defined by the boundaries in cyberspace between the company, the state and the individual citizen.

The US has already taken advantage of its advanced technology and absolute control of network infrastructure in making many unfair rules for countries in the information era. This will test the courage and wisdom of China in its pursuit of a status as a strong power over the network. Apple Inc’s latest action will force China to improve laws to protect its citizens’ and the state’s information security.

On the one hand, there is no network privacy protection law in China and US laws will not serve the interests of Chinese nationals. On the other, there are still no effective international laws supervising big companies’ activities in data mining, transferring and cross-border use.

As mobile Internet has gradually become a main battlefield of global information security, Apple Inc has presented a pressing challenge. After pointing out potential dangers in information security of its products and services, the company kicked the ball back to us. This is by no means a matter only between a company and its clients, but a game, if nor a war, among states.

US government interest is perceivably involved. China cannot simply win the game by defending itself through rules only applicable in China. China must establish its legal system according to international rules to implement the rule of law in cyberspace as soon as possible, which is a test of China’s capacity to become a strong power on the network.

Most Viewed Today's Top News
...
主站蜘蛛池模板: 梁河县| 南投市| 浙江省| 赫章县| 定结县| 长泰县| 仙居县| 盈江县| 丹阳市| 敖汉旗| 乾安县| 泸定县| 永仁县| 云林县| 蓝山县| 遂川县| 肥西县| 南木林县| 苍梧县| 临泉县| 静宁县| 临清市| 白朗县| 哈尔滨市| 合川市| 临沧市| 嘉义市| 肃宁县| 宁海县| 神池县| 新邵县| 昌邑市| 威宁| 信阳市| 黑山县| 凤山市| 清水河县| 凯里市| 阿鲁科尔沁旗| 黔江区| 钟祥市| 苏州市| 枣庄市| 贵港市| 平塘县| 仁化县| 张北县| 华池县| 汉中市| 凤庆县| 石台县| 襄垣县| 永顺县| 原平市| 关岭| 福清市| 盈江县| 阜康市| 始兴县| 余庆县| 岱山县| 微山县| 铁力市| 广宁县| 广宁县| 长寿区| 舞钢市| 慈溪市| 墨江| 庆城县| 丰顺县| 和静县| 安阳市| 宝鸡市| 清远市| 元谋县| 土默特左旗| 灯塔市| 永清县| 霸州市| 皮山县| 子洲县|