All provincial, autonomous region and municipal Party Committee cybersecurity and informatization offices, the Xinjiang Production-Construction Corps Party Committee Cybersecurity and Informatization Office”
Since the “Clear and Crisp ‘Fan Circle’ Mess Control” campaign was held, all localities have implemented relevant work requirements, and have gained certain achievements focusing on star rankings, trending topics, fan communities, interactive comments and other such focus segments, and deeply dealt with the problem of the “fan circle” mess. In order to further strengthen control, bring greater and substantial pressure to the dominant responsibilities of websites and platforms, make substantial breakthroughs in focus and difficult issues, incessantly consolidate and expand the achievements of the campaign, attack and resolve the “fan circle” mess with a heavy fist, hereby, relevant work measures are notified as follows.
1. Cancel star and artist rankings. Cancel all rankings and lists involving individual stars and artists or groups, prohibit newly adding or covertly uploading individual rankings and related products or functions. Only rankings of music works, film and television works, etc. may be maintained, but no individual characteristic such as stars’ or artists’ names may appear.
2. Optimize and adjust ranking rules. When ranking music works, film and television works, etc., reduce the weight of registries, likes, comments and other such indicators, and increase the weight of indicators such as the work’s orientation and expert evaluation. Related functions that lead users to make lists may not be set up, paid-for registration functions or increasing registry numbers through added-value memberships and other such methods may not be set up, guide fans to pay more attention to the quality of cultural products, and reduce the heat of chasing stars.
3. Strictly manage star brokerage companies. Strengthen website platforms’ management responsibilities over the online conduct of star brokerage companies (offices), formulate related online operational standards, and make clear provisions concerning account registration and verification, content dissemination, commercial marketing, crisis PR, fan management and other such online conduct. Strengthen the responsibility of star brokerage companies (offices) to guide fan communities, adopt measures such as limiting flow, prohibition of speech, closure, etc., against stars and their brokerage companies (offices), fan groups and their accounts who incite mutual rifts of fans, struggles and incitements of battles, at the same time, the entire platform will reduce and even cancel all kinds of information dissemination related to [those] stars.
4. Standardize fan community accounts. Strengthen management of accounts of stars’ fan communities, backers, etc. require that fan communities and backers must be authorized or accredited by the star’s brokerage company (office), and their daily maintenance and supervision becomes the latter’s responsibility. Without authorization, no individual or organization may, without exception, register a star fan community account.
5. Strictly prohibit the emergence of mutual ripping information. Substantially implement management responsibilities, timely discover and clean up all kinds of harmful “fan circle” information where fans mutually tear at each other or hurl abuse, drag and trigger fights, start rumours and attacks, etc., strictly deal with accounts violating laws and regulations, effectively prevent heating up and fermentation of public opinion. Strictly punish website platforms where discovery is not timely and management is insufficient.
6. Clean up community pages violating regulations. Continue to dissolve fan communities and groups with themes such as rank voting, reinforcement, collecting money, controlling comments, gossip, explosive materials, etc., close boards, channels, etc. that easily lead to fans collecting and exchanging their ranking experiences, discuss stars’ sex scandals, mutually assign data scraping, etc, and block channels that generate harmful inducements to fans and encourage stirring up of trouble.
7. Fans may not be incited to consume. Formulate detailed rules that stars’ and artists’ magazines or other works, products, etc., in the sales segment, may not display fans’ individual purchase amounts, contribution amounts and other such data, may not rank fans’ individual product purchase data or amounts, may not set up marketing activities that stimulate fans to consume such as task-based unlocking, custom-made benefits, limited-time PK, etc.
8. Strengthen segment setup and management. Strengthen management of online arts and entertainment programmes’ online conduct, they may not set up “spend money to buy votes” functionalities, and are strictly prohibited from guiding or encouraging netizens to vote for candidates by material methods such as purchasing products, memberships etc.
9. Strictly control participation by minors. Further adopt measures to strictly prohibit minors from playing for rewards, it is strictly prohibited that minors respond to calls for consumption, minors may not act as related community heads or managers, minors are restricted from voting for rankings, clarify that star fan communities, backers, etc. may not, in their online conduct, influence minors’ regular study and rest, and may not organize minors to launch all kinds of online assemblies, etc.
10. Standardize reinforcement and fund-raising activities. Timely discover and clean up all kinds of information on calling for reinforcements and raising funds isolating regulations; deal with and punish website platforms where problems are concentrated, accountability is weak, who induce minors to participate in calls for reinforcement and fundraising according to laws and regulations; continue to investigate and prosecute foreign websites who provide ranking votes, reinforcement calls and fund-raising.
All localities must further raise their political stance, substantially strengthen their sense of responsibility, sense of mission and sense of urgency, and understand and advance their work in bringing the “fan circle” mess under control from the height of online political security and ideological security, and creating a clear and crisp cyberspace. They must, in the first instance, arrange and implement matters, take further steps to break the matter down, formulate detailed implementation plans, and supervise local website platforms’ realistic grasp and implementation of these.
25 August 2021
Internet Public User Account Information Service Management Regulations (Revision Draft – Opinion-seeking Version)
Chapter I: General provisions
Article 1: These Regulations are formulated in order to standardize Internet public account information services, safeguard national security and the public interest, and protect the lawful interests of citizens, legal persons and other organizations, on the basis of the “Cybersecurity Law of the People’s Republic of China”, the “Internet Information Service Management Rules”, the “Online Information Content Ecology Governance Regulations” and other such laws, regulations and relevant State provisions.
Article 2: These Regulations apply to the provision and conduct of Internet public account information services within the territory of the People’s Republic of China.
Internet public accounts as mentioned in these Regulations, refers to online accounts of Internet users registered and operated on Internet sites, application software and other such online platforms, to produce and disseminate written, pictorial, audiovisual and other such information content to the social public.
public account platform as mentioned in these Regulations, refers to online information service providers providing public account registration and operation, information content dissemination and technical protection services to Internet users.
Public account producers and operators as mentioned in these Regulations, refers to natural persons, legal persons and non-legal person organizations registering and operating public accounts and engaging in content dissemination.
Article 3: The national cybersecurity and informatization department is responsible for Internet public account information service supervision, management and law enforcement work nationwide. Local cybersecurity and informatization departments are, according to their duties and responsibilities, responsible for Internet public account information service supervision, management and law enforcement work within their administrative areas.
Article 4: Public service information service platforms and public account producers and operators shall abide by laws and regulations, fulfil social responsibilities and moral responsibilities, uphold the correct public opinion orientation and value orientation, carry forward the Socialist core value view, produce and disseminate healthy and upward, true and objective excellent information content, create a crisp and bright cyberspace, and stimulate progress of society and civilization.
All levels’ Party and government bodies, enterprise and undertaking work units, and people’s organizations are encouraged to register and operate public accounts, produce and disseminate high-quality government affairs information or public service information, satisfying public information demand, and promoting economic and social development.
Public service information service platforms are encouraged to vigorously enhance government affairs information publication, public service and social government levels for Party and government bodies, enterprise and undertaking work units, and people’s organizations, provide full and necessary technical support and security protection.
Article 5: Public account information service platforms providing Internet public account information services, shall obtain corresponding qualifications as provided in national laws and regulations.
Public service information service platforms and public account producers and operators shall obtain an Internet news information service licence to provide Internet news information services to the social public.
Chapter II: Public service information service platforms
Article 6: Public service information service platforms shall bear dominant responsibility for information content and public account management, allocate management personnel and technical capabilities suited to the business scale, appoint persons to position responsible for content security, establish, complete and strictly implement management structures for account registration, content examination and verification, information inspection, ecological governance, emergency response, cybersecurity, data security, personal information protection, copyright protection, credit evaluation, etc., and uphold the security of the platform’s information content and public accounts, and the security of data and personal information.
Public service information service platforms shall, on the basis of relevant laws and regulations and relevant State provisions, formulate and publish management norms and platform conventions for information content production, public account operations, etc., and conclude service agreements with public account producers and operators, clarifying both sides’ content dissemination limitations, account management responsibilities and other such rights and obligations.
Article 7: Public service information service platforms shall, according to relevant national standards and norms, establish categorized public account registration and categorized production structures, implement categorized management, and file the matter with the provincial, autonomous region or municipal cybersecurity and informatization department of the locality of the public account.
Public service information service platforms shall, on the basis of indicators and dimensions such as an account’s information content quality, the credit evaluation of the account’s subject, etc., establish tiered management structures, and implement tiered account management.
Public service information service platforms formulating content production and account operations management norms, platform conventions and other such important structures and measures shall file them with the local provincial, autonomous region or municipal cybersecurity and informatization department; when bringing related new technologies, new applications or new functions online, they shall conduct a security assessment according to relevant regulations.
Article 8: Public service information service platforms shall adopt measures such as composite verification, etc., to conduct real identity information authentication of Internet users applying to register for a public account, based on mobile telephone number, resident identity card number or unified social credit code and other such methods, and raise the accuracy of authentication. Where users do not provide real identity information, or improperly use real identity information of organizations, bodies or other persons to conduct a false registration, no related service may be provided to them.
Public service information service platforms shall conduct inspection of the legal and regulatory compliance of public account names, portraits, bios, etc. of public accounts registered by Internet users, where they discover an account name, portrait or bio does not conform to the subject’s real identity information, and especially where they use or link to Party or government bodies, enterprise and undertaking work units and other such organizations and bodies or well-known social personalities without authorization, as well as where the corresponding registration information contains unlawful or harmful information, they shall suspend the provision of services and notify the user to correct matters within a limited time, where these refuse to correct the matter, the provision of services shall be terminated.
Public service information service platforms shall prohibit public accounts closed according to the law or to the convention to re-register under a similar name; where an account name with a high degree of connectedness to them is registered, the real identity information, service qualifications, etc. of the account subject shall also be subject to necessary checks.
Article 9: Public service information service platforms shall require public accounts applying to register and engage in the production of information content in areas such as economics, education, health, judicial affairs, etc., require users to provide their specialized background at the time of registration, as well as corresponding materials to prove professional qualifications or service qualifications they have acquired according to laws and administrative regulations, and conduct the necessary checks.
Public service information service platforms shall add a special symbol to public accounts after they are checked and passed, and according to the different subject nature of the user, externally announce content production categories, the name of operating subjects, the registered business address, uniform social credit code, contact method and other such registration information, to facilitate social supervision and inspection.
Public service information service platforms shall establish dynamic checking and inspection structures, and at suitable times check the veracity and validity of registration information of producers and operators.
Article 10: Public service information service platforms shall set reasonable upper limits to the number of registered public accounts of the same subject on their platform. Where users apply to register for multiple public accounts, their subject nature, service qualifications, business scope, credit evaluation etc. shall also be checked.
Public service information service platforms may, on the basis of the service agreement suspend or terminate provision of services to public accounts who have not logged on or have been used for over six months after the Internet user registered.
Public service information service platforms shall complete technical measures to prevent and deal with unlawful registration acts by Internet users such as registration in excess of quota, malicious registration, false registration, etc.
Article 11: Public service information service platforms shall, according to the law and the convention, prohibit public account producers and operators to transfer, lend or illegally trade, sell or buy public accounts in violation of regulations.
Where public account producers and operators transfer or donate public account use rights to other users, they shall put forward an application with the platform. The platform shall, on the basis of the provisions in the previous Paragraph, authenticate and check the user on the receiving side, and publish the subject change information. Where the platform discovers a producer or operator has transferred a public account without inspection or authorization, it shall timely suspend or terminate the provision of services.
Public account producers and operators voluntarily terminating account operations may apply with the platform for suspension or termination of use. The platform shall suspend or terminate the provision of services according to the service agreement.
Article 12: Public service information service platforms shall establish public account supervision and assessment mechanisms, and prevent acts of falsification of account subscriptions, user following numbers, content click rates, repost or comment quantities and other such data.
Public service information service platforms shall standardize public account recommendation, subscription and following mechanisms, and complete technological measures to timely discover and deal with unusual changing circumstances in account subscription and following numbers. Without the knowledge and agreement of the Internet user, subscription and following of other users’ public accounts may not be forced.
Article 13: Public service information service platforms shall establish tiered credit management systems, and provide corresponding services on the basis of credit tiers.
Public service information service platforms shall establish and complete mechanisms to warn for, discover, trace, refute, delete and in other ways deal with online rumours and other such false information, and reduce the credit tier or blacklist public account producers and operators who produced and disseminated rumours and other such false information.
Article 14: Public service information service platforms shall, when conducting content supply and account recommendation cooperation with producers and users, standardize commercial activities such as management of advertising and operations, knowledge payment, e-commerce sales, user gratuities, etc., they may not disseminate false advertising, conduct exaggerated propaganda, commit commercial fraud, etc., preventing operations violating laws and regulations.
Public service information service platforms shall strengthen copyright protection of originally produced information content, preventing acts of piracy and infringement. Platforms may not abuse their advantaged position to interfere in the lawful and compliant operations of producers and operators, or infringe users’ lawful rights and interests.
Chapter III: Public account information producers and operators.
Article 15: Public account information producers and operators shall, on the basis of categorized platform management norms, at the time of registering the public account, accurately fill out user’s subject nature, registered location, business location, content production category, contact method and other such basic information, enterprises, organizations, bodies and other such Internet users shall also indicate their main activity or business scope.
Public account producers shall aide by platform management norms, platform conventions and service agreements, and engage in information content production and dissemination in the relevant sectoral area on the basis of the registered content production category indicated at the time of public account registration.
Article 16: Public account producers and operators shall bear dominant responsibility for information content production and public account operations and management, and engage in information content production and account operations and activities according to laws and regulations.
Public account producers and operators shall establish and complete information content security examination and verification mechanism for the entire process of topic planning, editing and production, dissemination and popularization, interactive comments, etc., strengthen gatekeeping over information content’s orientation, veracity and legality, and maintain a benign order in online communication.
Public account information producers and operators shall establish and complete security management mechanisms for the entire process of public account registration and use, operations and popularization, etc., manage and operate the account in a civilized, rational and standardized manner, attract the public’s attention, subscription, interaction and sharing with high-quality information content, and maintain a benign social image of the account.
Article 17: Public account producers and operators shall, when reposting information content originally created by other persons, abide by copyright protection-related laws and regulations, indicate the original creator and a traceable information source, and respect and protect the lawful rights and interests of copyright holders.
Public account producers and operators shall manage messages, posts, comments and other such interactive segments on their account. Platforms may, on the basis of the subject nature and credit tier of the public account, rationally set up management limits, and provide corresponding technological support.
Where public account producers and operators conduct account operations, content provision and other such cooperation with third-party bodies , both sides shall conduct checks and gatekeeping of the account’s operations and activities, supplied information content, etc.
Article 18: Public account producers and operators may not commit the following acts in violation of laws and regulations:
(1) Not registering with real identity information, or registering with a public account name, portrait, bio, etc. that is not conform with one’s own real identity information;
(2) Maliciously posing as, imitating or misappropriating the public account of an organization, body or other person to produce and disseminate information content;
(3) Providing Internet news information gathering, dissemination and other such services without a licence or in excess of a licence’s scope;
(4) Manipulatively using accounts on multiple platforms, to publish batches of homogenous information content, generating false flow data, and creating false public opinion hot spots;
(5) Using sudden public incidents to incite extreme emotions and acts, or commit online violence harming the reputation of other persons and organizations, influencing social harmony and stability;
(6) Fabricating false information, counterfeiting originally-created content, quoting or concocting untrue information sources, distorting facts and truths, misleading the social public;
(7) Using paid dissemination and deletion of information and other such methods to commit illegal online surveillance, marketing frauds, extortion and blackmail, in pursuit of improper gain;
(8) Registering in batches, hoarding or illegally trading, buying and selling public accounts;
(9) Producing, reproducing or disseminating unlawful information, or not adopting measures to prevent and resist the production, reproduction or dissemination of harmful information;
(10) Other acts prohibited in laws and administrative regulations.
Chapter IV: Supervision and management
Article 19: Public service information service platforms shall strengthen supervision and management of public service information service activities, and timely discover and deal with information or activities violating laws and regulations.
Public service information service platforms shall, on the basis of service agreements and platform conventions, adopt measures to deal with public accounts violating these regulations and relegated laws and regulations including warnings and alerts, limiting account functions, suspending content renewal, ceasing advertising dissemination, closing or cancelling accounts, blacklisting, termination of re-registration, etc., preserve relevant records, and timely report the matter to cybersecurity and informatization and other such relevant competent department.
Article 20: Public service information service platforms and producers and operators shall consciously accept social supervision.
Public service information service platforms shall set up eye-catching and convenient reporting interfaces, publish appeals, complaints and reporting methods and other such information, complete reporting information acceptance, screening, handling and feed-back mechanisms, clarify handling workflows and feed-back time limits, and timely and effectively deal with complaints by producers and operators, and complaints and reports from the public.
Internet sectoral organizations are encouraged to conduct public appraisal, promote strict self-discipline of public service information service platforms and producers and operators, establish authoritative mediation mechanisms with participation from multiple sides, fairly and relationally resolve sectoral disputes, and safeguard users’ lawful rights and interests according to the law.
Article 21: All levels’ cybersecurity and informatization departments will establish and complete coordinated supervision and management work mechanisms together with relevant competent departments, to supervise and guide public service information service platforms and producers and operators to conduct related information service activities according to laws and regulations.
Public service information service platforms and producers and operators shall cooperate with relevant competent departments’ lawful conduct of supervision and inspection, and provide the necessary technical support and assistance.
Where public service information service platforms and producers and operators violate these Regulations, cybersecurity and informatization departments and relevant competent departments will impose punishment according to relevant laws and regulations within their scope of duties and responsibilities.
Article 22: These Regulations take effect on (day, month) 2020.
第二十二条 本规定自2020年 月 日起施行。
Determination Rules on Acts of Collecting and Using Personal Information in Violation of Rules and Regulations in Apps
Notice concerning Issuance of the “Determination Rules on Acts of Collecting and Using Personal Information in Violation of Rules and Regulations in Apps”
All provincial, autonomous region, municipal and the Xinjiang Production-Construction Corps cybersecurity and informatization offices, telecommunications management bureaus, public security offices (bureaus), market supervision and management bureaus (offices, committees):
On the basis of the “Announcement concerning a Special Campaign on Collection and Use of Personal Information in Violation of Rules and Regulations in Apps”, in order to provide reference for the determination of acts of collecting and using personal information in violations of rules and regulations in apps, implement laws and regulations such as the “Cybersecurity Law”, etc., the Cyberspace Administration of China, Ministry of Industry and Information Technology, Ministry of Public Security, and State Administration of Market Regulation have jointly formulated the “Determination Rules on Acts of Collecting and Using Personal Information in Violation of Rules and Regulations in Apps”. These are hereby issued to you, please refer to and implement them in integration with supervision, management and law enforcement work realities.
Cyberspace Administration of China Secretariat
Ministry of Industry and Information Technology General Office
Ministry of Public Security General Office
State Administration for Market Regulation General Office
28 November 2019
Determination Rules on Acts of Collecting and Using Personal Information in Violation of Rules and Regulations in Apps
On the basis of the “Announcement concerning a Special Campaign on Collection and Use of Personal Information in Violation of Rules and Regulations in Apps”, in order to provide reference for the determination of acts of collecting and using personal information in violations of rules and regulations in apps, provide guidance for app operators’ self-inspection and self-rectification as well as netizens’ social supervision, and implement laws and regulations such as the “Cybersecurity Law”, these Rules are formulated.
I, The following acts may be determined as “not publishing collection and use norms”
2. When using the app for the first time, users are not prompted to read privacy policies and other such norms on collection and use through a pop-up window and other such clear methods
II, The following acts may be determined as “not indicating the objective, method and scope of collecting and using personal information”
1. Not listing the objective, method and scope of personal information collection and use in the app (including entrusted third parties or embedded third-party code and plug-ins) one by one;
3. When requesting to activate authorization of collectable personal information, or requesting to collect users’ identity card number, bank account number, geographical tracking and other such sensitive personal information, not simultaneously notifying the user about its objective, or having an unclear or difficult to understand objective.
4. Content related to collection and use norms is obscure and difficult to understand, verbose and overly detailed, which is difficult for users to understand, for instance using large amounts of specialist jargon, etc.
III, The following acts may be determined as “collecting and using personal information without users’ consent”
1. Beginning to collect personal information or activating authorizations for collectable information before obtaining users’ consent;
2. After users clearly indicate they do not consent, still collecting personal information or activating up collectable personal information authorizations, or frequently obtaining users’ consent, interfering with users’ regular use;
3. Actually collecting personal information or activating collectable personal information authorizations in excess of the scope of user authorization;
4. Obtaining users’ consent by way of implicit agreement to privacy policies and other non-explicit methods;
5. Altering the status of collectable personal information authorizations they have set up without users’ consent, for instance automatically restoring user-set up authorization to implicit approval status when updating an app;
6. Using users’ personal information and algorithms to direct push delivery information, without providing an option for non-targeted push delivery information;
7. Misleading users through fraudulent, swindling and other such improper methods into consenting to personal information collection or the activation of collectable personal information authorizations, for instance wilfully hoodwinking or covering up the true objective for the collection of users’ personal information;
8. Not providing users with a way and method to revoke consent for personal information collection;
9. Collecting users’ personal information in violation of the announced collection and use norms.
IV, The following acts may be determined as “collecting personal information in violation of the principle of necessity, that is not related to the provided service”
1. Collected categories of personal information or activated collectable personal information authorizations are not related to the existing business functions;
2. Refusing to provide business functions because users do not consent to the collection of unnecessary personal information or the activation of unnecessary authorizations;
3. Requesting the collection of personal information in excess of the scope the user originally consented to when adding new business functions to the app, refusing to provide the original business functions if the user does not agree, except where the newly added business function supersedes the original business function;
4. The frequency of personal information collection exceeds the actual needs of business functions;
5. Obliging he user to consent to personal information collection for only the purpose of improving of service quality, enhancing user experience, targeting push delivery information, researching and developing new products, etc.,
6. Requiring users to consent once to activating multiple collectable personal information authorizations, where use is impossible if users do not consent.
V, The following acts may be determined as “providing personal information to others without consent”
1. Providing personal information directly from the app customer end to third parties both without user content, and without anonymized processing, including providing personal information to third parties through methods such as embedding third-party code or plug-in components at the customer end, etc.;
2. Providing collected personal information to third parties after data is transmitted to the app’s back-end servers both without user content, and without anonymized processing;
3. Even if functions are provided to correct and delete personal information and cancel user accounts, not timely responding to user’s corresponding operations, requiring manual processing, not completing examination and processing within the committed time limits (the committed time limit may not exceed 15 working days, where there is not committed time limit, 15 working days are taken as limit);
4. Where the executing of correction or deletion of personal information, the cancellation of user accounts and other such user operations has been completed, but it is not completed at the app back-end;
5. Not establishing and publishing personal information security complaints and reporting channels, or not accepting and processing matters within the committed time limits (the committed time limit may not exceed 15 working days, where there is not committed time limit, 15 working days are taken as limit).
Management Rules for Credit Information of Gravely Untrustworthy Subjects in Internet Information Services (Opinion-seeking Draft)
Article 1: In order to stimulate the construction of credit in the Internet information services area, ensure the lawful rights and interests of citizens, legal persons and other organizations, on the basis of the “Cybersecurity Law of the People’s Republic of China”, the “Planning Outline for the Construction of a Social Credit System”, the “State Council Guiding Opinions concerning Establishment and Perfection of Joint Incentive Structures for the Trustworthy and Joint Punishment Structures for the Untrustworthy, and Accelerating the Advance of Social Credit Construction”, the “State Council General Office Guiding Opinions concerning Accelerating the Advance of Social Credit System Construction and Building Novel Management Mechanisms Based on Credit” and the “State Council Notice concerning Authorizing the Cyberspace Administration of China to Take Responsibility for Internet Information Content Management Work”, these Rules are formulated. Read the rest of this entry »
The digital economy is a driver for global economic growth that becomes more important every day, and is playing an ever more important role in accelerating economic development, enhancing labour productivity in existing industries, fostering new markets and new industrial growth points, realizing inclusive growth and sustainable growth. In order to expand cooperation in the digital economy area, as countries supporting the “One Belt, One Road” initiative, we will, on the basis of the principles of interconnection and interaction, innovation and development, openness and cooperation, harmony and inclusivity, mutual benefit and win-win, explore the common use of digital opportunities and response to challenge, strive to realize an interconnected and interactive “Digital Silk Road” through strengthening policy communication, infrastructure linkages, trade facilitation, financial flows and interlinking popular sentiment, and forge a mutually beneficial, win-win “community of interests” and a “community of destiny” for common development and flourishing. To this end, on the basis of voluntarity and non-restraint, we put forward the following proposal:
1. Expanding broadband access, raising broadband quality. Build and perfect regional telecommunications, Internet, satellite navigation and other such important information infrastructure, stimulate interconnection and interaction, explore the expansion of high-speed Internet access and connectivity measures at a bearable price, stimulate broadband network coverage, improve service capabilities and quality.
2. Stimulating the digital transformation. Stimulate the digitization of agricultural production, operations and management, as well as the networked transformation of agricultural product distribution. Encourage digital technologies to converge with the manufacturing sector, build an ever more linked, networked and smart manufacturing sector. Use information and telecommunications technology to improve cultural education, healthcare and medicine, environmental protection, urban planning and other public services. Stimulate the sustained development of service sectors such as smart logistics, online tourism, mobile payment, digital creativity and the shared economy.
3. Stimulate e-commerce cooperation. Explore the feasibility of establishing information sharing, mutual trust and mutual recognition mechanisms for cross-border e-commerce credit, customs passage, inspection, quarantine, consumer protection and other such areas, strengthen cooperation in areas such as financial payment, storage and logistics, technology services, offline exhibitions, etc. Strengthen cooperation in consumer rights protection.
4. Support Internet start-ups and innovation. Encourage the promotion of Internet-based research, development and innovation through beneficial and transparent legal frameworks, and support Internet-based start-ups. Use the Internet to stimulate innovation in products, services, processes, organizational and commercial models.
5. Stimulate the development of small, mid-size and micro enterprises. Stimulate small, mid-size and micro enterprises to use information and telecommunication technologies to conduct innovation, raise competitiveness and open up new market sales channels through policy support. Promote the provision of required digital infrastructure to small, mid-size and micro enterprises at bearable prices. Encourage small, mid-size and micro enterprises to provide information and telecommunication products and services to public departments, and enter into global value chains.
6. Strengthen digitized skills training. Increase the public’s digitized skills levels, ensure that they obtain gains from the development of the digital economy. Launch on-the-job training for digital skills, enhance employees’ digital skills. Encourage government departments, universities, research bodies and enterprises to vigorously launch training programmes, and stimulate the popularization and improvement of digital skills.
7. Stimulating investment in the information and telecommunications technology area. Improve the commercial environment through stimulating research, development and innovation as well as investment, including cross-border investment in the digital economy. Promote all kinds of financial bodies, multilateral development bodies, etc., to invest in information and telecommunications technology infrastructure and applications, guide commercial share investment funds as well as social funds to invest in the area of the digital economy, encourage public-private partnership relations and other such forms of participation. Encourage the organization of investment information exchange activities between information and telecommunications technology enterprises and financial bodies, encourage reciprocal investment in the information and telecommunications technology area.
8. Promoting inter-city digital economy cooperation. Stimulate relevant cities to launch twinning cooperation, support the establishment of strategic cooperation relationships between twinned cities, drive international traffic and logistics, enhance quality and increase efficiency through constructing information infrastructure, promoting information sharing, stimulating information technology cooperation, and stimulating Internet trading services. Explore the establishment of “Digital Silk Road” economic cooperation demonstration areas. Encourage and support relevant cities in establishing “Digital Silk Road” economic demonstration areas within these cities, promote profound bilateral cooperation in areas such as information infrastructure, smart cities, e-commerce, long-distance healthcare, “Internet Plus”, the Internet of Things, artificial intelligence, etc.
9. Increasing digital inclusivity. Adopt many kinds of policy measures and technological measures to reduce the digital divide, including the digital divide between countries and within countries, and forcefully stimulate the proliferation of the Internet. Stimulate the use of digital technologies in school education and non-official education, promote the realization of broadband access for schools and equip them with online learning environments, so that ever more students can use digitized tools and resources in pursuit of learning. Strengthen the development of digital content such as excellent online games, cartoons, audiovisual materials, literature, music and knowledge resources, and stimulate exchange between the cultures of all countries, and a meeting of people’s hearts.
10. Encouraging and fostering transparent digital economy policies. Develop and maintain an open, transparent and inclusive digital economy policy formulation method. Encourage the dissemination of related and publishable government data, and understand the potential of these in driving new technologies, new products and new services. Encourage online open tendering and procurement, support enterprises in innovating digital product production and services, and simultaneously ensure that demand is market-led.
11. Furthering international standardization cooperation. Propose the formulation and application of international standards for technology products and services developed through joint coordination, these international standards should maintain consistency with international norms including the norms and principles of the World Trade Organization.
12. Strengthening confidence and trust. Strengthen the feasibility, completeness, secrecy and reliability of online transactions. Encourage the development of secure information infrastructure, in order to stimulate trustworthy, stable and reliable Internet applications. Strengthen international cooperation in the area of online trading, jointly attack cybercrime and protect the information and telecommunications technology environment. Through ensuring and respecting privacy and protecting personal data, establish confidence among users, this is a critical factor influencing the development of the digital economy.
13. Encourage and stimulate cooperation while respecting autonomous development paths. Encourage all countries along the Belt and Road to strengthen exchange and enhance mutual understanding, strengthen cooperation in policy formulation, supervision and management, reduce, eliminate or prevent unnecessary differences in supervision and management requirement, in order to liberate the vitality of the digital economy, simultaneously understand that all countries should preserve consistency with their international legal obligations, and that they will plan their development path no the basis of their own development situation, historical and cultural traditions, national legal systems and national development strategies.
14. Encouraging the joint construction of a peaceful, secure, open, cooperative and ordered cyberspace. Support information and telecommunication technology policies that safeguard the global nature of the Internet, permit Internet users to lawfully and autonomously choose the information, knowledge and services they obtain online. Understand that cybersovereignty must be fully respected, safeguard cybersecurity, determinedly attack cyberterrorism and cybercrime, protect personal privacy and information security, and promote the establishment of a multilateral, democratic and transparent international Internet governance system.
15. Encouraging the establishment of multi-level exchange mechanisms. Stimulate all sides, governments, enterprises, scientific research bodies, and sectoral organizations to communicate and interact, share viewpoints, and promote cooperation in the digital economy. Strengthen training, research and cooperation in the area of the digital economy. Strengthen exchanges about policy formulation and legislative experiences among the “Belt-Road Initiative” countries, and share best practices. Launch the construction of digital technology capabilities, welcome and encourage the United Nations Trade and Development Committee, the United Nations Industrial Development Organization, the Organization for Economic Cooperation and Development, the International Telecommunications Union and other such international organizations to play an important role in driving international cooperation on the “Belt-Road Initiative” digital economy.
(Signed by China, Laos, Saudi Arabia, Serbia, Thailand, Turkey and the United Arab Emirates)
Chapter I: General provisions
Article 1: In order to strengthen management of content management staff in Internet news information service work units, safeguard the lawful rights and interests of staff and the social public, and stimulate the healthy and orderly development of internet news information services, on the basis of the “Cybersecurity Law of the People’s Republic of China” and the “Internet News Information Management Regulations”, these Rules are formulated. Read the rest of this entry »
Security Assessment and Management Regulations concerning New Technologies and New Applications in Internet News Information Services
Article 1: In order to standardize security assessment and management work concerning new technologies and new applications in Internet news information services, safeguard national security and the public interest, protect the lawful rights and interests of citizens, legal persons and other organizations, on the basis of the “Cybersecurity Law of the People’s Republic of China”, and the “Internet News Information Service Management Regulations”, these Regulations are formulated.
Article 2: These Regulations apply to national, provincial, autonomous region and municipal Internet information offices’ organization and execution of security assessments of new technologies and new applications concerning Internet news information services. Read the rest of this entry »
This document was translated jointly by Graham Webster, Paul Triolo and Rogier Creemers
CAC Notice concerning the Public Solicitation of Opinions on the “Critical Information Infrastructure Security Protection Regulations (Opinion-seeking Draft)”
In order to guarantee the security of critical information infrastructure, based on the “Cybersecurity Law of the People’s Republic of China”, our Administration, jointly with relevant departments, has drafted the “Critical Information Infrastructure Security Protection Regulations (Opinion-seeking Draft)”, which is now made public for open solicitation of opinions. Relevant work units and individuals from all circles may, before 10 August, put forward opinions through the following ways:
1, Sending opinions in a letter form to: Beijing Xicheng Chegongzhuang Avenue 11, CAC Cybersecurity Coordination Bureau, Post Code 100044, and clearly indicate “opinion solicitation” on the envelope
2, Sending an e-mail to: email@example.com.
10 July 2017
Critical Information Infrastructure Security Protection Regulations
Chapter 1: General principles Read the rest of this entry »
This translation was kindly provided by Paul Triolo
Article 1 These Measures are developed with a view to enhancing the secure and controllable levels of network products and services, guarding against cyber security risks, and safeguarding the national security, and in accordance with the laws and regulations such as National Security Law of the People’s Republic of China and the Cybersecurity Law of the People’s Republic of China.
Article 2 Important network products and services procured for use in networks and information systems that touch on national security are subject to a cybersecurity review.
Article 3 A cybersecurity review shall be conducted for network products and services and their supply chains, in a manner that combines enterprise commitments with public supervision, combines third-party assessments with government continuous regulation, and combines laboratory testing with on-site checks, on-line monitoring and background investigations. Read the rest of this entry »
This translation was kindly provided by John Costello
State Internet Information Office
Decree No. 2
“Regulations for Internet Content Management Administration Law Enforcement Procedures” approved in a meeting of the State Internet Information Office is hereby announced, to be implemented from June 1, 2017 onward.
Director Xu Lin
May 2, 2017
Regulations for Internet Content Management Administration Law Enforcement Procedures Read the rest of this entry »
This translation was published first on China Law Translate, and is reposted here with kind permission.
Article 1: These Provisions are formulated on the basis of the “Standing Committee of the National of the National People’s Congress’s Decision on Strengthening Protections for Online Information”, the “State Council’s Notification of Authorization of the State Internet Information Office to be Responsible for Efforts to Management Internet Information Content”, “Measures for the Management of Internet Information Services”, and the “Provisions on the Management of Internet News Information Services” so as to strengthen management of internet live-streaming services, to protect the lawful rights and interests of citizens, legal persons, and other organizations, safeguard national security and the public interest.
Article 1: In order to strengthen management of mobile Internet application (apps) information services, protect the lawful rights of citizens, legal persons and other organizations, safeguard national security and the public interest, on the basis of the “National People’s Congress Standing Committee Decision concerning Strengthening Online Information Protection” and the “State Council Notice concerning Authorizing the Cyberspace Administration of China to Take Responsibility of Internet Information Content Management”, these Regulations are formulated.
Article 1: In order to standardize Internet information search services, stimulate the healthy and orderly development of the Internet information search sector, protect the lawful rights and interests of citizens, legal persons and other organizations, and safeguard national security and the public interest, on the basis of the “National People’s Congress Standing Committee Decision concerning Strengthening Online Information Protection” and the “State Council Notice concerning Authorizing the Cyberspace Administration of China to Take Responsibility for Internet Information Content Management Work”, these Regulations are formulated.
Internet information search services as named in these Regulations refers to services using computer technology to collect and process all kinds of information from the Internet and present it to users for retrieval.
Article 3: The Cyberspace Administration of China is responsible for supervision, management and law enforcement work of Internet information search services nationwide. Local Internet information offices are, on the basis of their respective duties and responsibilities, responsible for supervision, management and law enforcement work of Internet information search services within their administrative areas.
Article 4: Internet information search services sectoral organizations shall establish and complete sectoral self-discipline structures and sectoral norms, guide Internet information search services towards establishing and creating service norms, supervise Internet information search service providers to provide services according to the law and accept social supervision, and increase the professional cultivation of Internet information search service employees.
Article 5: Internet information search service providers shall obtain corresponding qualifications as laid down in laws and regulations.
Article 6: Internet information search service providers shall implement their dominant responsibility, establish and complete information security management systems including information examination and verification, real-time public information inspections, emergency response and personal information protection, etc., have secure and controllable prevention measures, and provide the necessary support to relevant departments exercising their duties and responsibilities according to the law.
Article 7: Internet information search service providers may not provide information content prohibited by law or administrative regulation through links, abstracts, screenshots, keywords, related searches, related recommendations and other such forms.
Article 8: Internet information search service providers shall, when discovering search results clearly contain information, websites or applications prohibited by laws or administrative regulations during the process of providing services, they shall cease providing related search results, preserve relevant records, and timely report the matter to the national or local Internet information office.
Article 9: Internet information search service providers and their employees may not pursue improper gain through severing related links or providing search results containing false information, or other such means.
Article 10: Internet information search service providers shall provide objective, fair and authoritative search results, they may not harm the national interest, the public interest, or the lawful rights and interests of citizens, legal persons and other organizations.
Article 11: Internet information search service providers providing paid-for search information services, shall verify the relevant credentials of clients according to the law, determine an upper limit of the proportion of the page for the paid=for search information, visibly differentiate natural and paid-for search information, and indicate paid-for search information results with a clear symbol.
Internet information search service providers providing commercial advertising information services shall abide by relevant laws and regulations.
Article 12: Internet information search service providers shall establish and complete public complaints, reporting and user rights protection systems, publish complaints and reporting methods in a clear location, actively accept public supervision, timely deal with complaints and reports from the public, and bear liability for compensation for harm inflicted on users’ rights and interests.
Article 13: These Regulations take effect on 1 August 2016.
Procedural Regulations for Administrative Law Enforcement concerning Internet Information Content Management (Opinion-seeking Draft)
Chapter I: General Provisions
Article 1: In order to standardize and guarantee that Internet information content management departments exercise their powers according to the law, correctly impose administrative punishment, stimulate the healthy and orderly development of Internet information services, protect the lawful rights and interests of citizens, legal persons and other organizations, safeguard national security and the public interest, on the basis of the relevant provisions of the “Administrative Punishment Law of the People’s Republic of China”, the “Administrative Coercion Law of the People’s Republic of China”, the “National People’s Congress Standing Committee Decision concerning Strengthening the Protection of Online Information”, the “Internet Information Service Management Rules” and the “State Council Notice concerning Empowering the Cyberspace Administration of China to Take Responsibility of Internet Information Content Management Work”, etc., these Regulations are formulated. Read the rest of this entry »