• About
  • Archive
  • China Business Review Historical Archive
  • Contact
  • Home 1
  • Submit a Story
  • Submit a Story
  • USCBC Podcasts
China Business Review
  • Operations
    Multinational Supply Chains in a Post-Pandemic China

    Multinational Supply Chains in a Post-Pandemic China

    Managing Risk in the “New Era”

    Managing Risk in the “New Era”

    Design Patents vs. Trade Dress: Protecting IP in China

    Design Patents vs. Trade Dress: Protecting IP in China

    As China Emerges from COVID-19, US Companies Invest to Compete

    As China Emerges from COVID-19, US Companies Invest to Compete

    Inside the Mad Rush for Masks – Anatomy of a 10 Million Mask Order

    Inside the Mad Rush for Masks – Anatomy of a 10 Million Mask Order

    Addressing Risk in the Era of US-China “Great Power” Competition

    Addressing Risk in the Era of US-China “Great Power” Competition

  • Politics
    Hong Kong’s National Security Law, Five Months In

    Hong Kong’s National Security Law, Five Months In

    China Implements its Long-Awaited Unreliable Entities List Mechanism

    China Implements its Long-Awaited Unreliable Entities List Mechanism

    Competing WTO Reform Agendas and the Contest for the Next Director-General

    Competing WTO Reform Agendas and the Contest for the Next Director-General

    China Eyes Further Northeast Asian Economic Integration in RCEP

    China Eyes Further Northeast Asian Economic Integration in RCEP

    COVID-19 Could Doom or Deliver US-China Commercial Relations

    COVID-19 Could Doom or Deliver US-China Commercial Relations

    A Game of Chicken

    A Game of Chicken

  • Tech
    China and CPTPP: Does China’s Emerging Data Regime Live Up to CPTPP Principles?

    China and CPTPP: Does China’s Emerging Data Regime Live Up to CPTPP Principles?

    Can China’s Beleaguered Gaming Industry Overcome the New Wave of Restrictions?

    Can China’s Beleaguered Gaming Industry Overcome the New Wave of Restrictions?

    Semiconductor Self-Sufficiency: MIIT’s Ambitions for 2021 and Beyond

    Semiconductor Self-Sufficiency: MIIT’s Ambitions for 2021 and Beyond

    The Growing Intersection of Digital Health and Data Processing in China

    The Growing Intersection of Digital Health and Data Processing in China

    Export Controls on Emerging and Foundational Technologies: A Null Set?

    Export Controls on Emerging and Foundational Technologies: A Null Set?

    How Companies Are Reacting to China’s New Data Security Scheme

    How Companies Are Reacting to China’s New Data Security Scheme

    Trending Tags

    • Intellectual Property
    • innovation
    • cybersecurity
    • ecommerce
    • tech
  • Society
    Can China’s Beleaguered Gaming Industry Overcome the New Wave of Restrictions?

    Can China’s Beleaguered Gaming Industry Overcome the New Wave of Restrictions?

    China Cracks Down on Education Industry in Effort to Increase Birthrate

    China Cracks Down on Education Industry in Effort to Increase Birthrate

    The Extraordinary Rise of China’s Pet Industry

    The Extraordinary Rise of China’s Pet Industry

    COVID-19 Could Doom or Deliver US-China Commercial Relations

    COVID-19 Could Doom or Deliver US-China Commercial Relations

    The Year in Social Credit: Where is Corporate Social Credit Going in 2020 and Beyond?

    The Year in Social Credit: Where is Corporate Social Credit Going in 2020 and Beyond?

    Open Government Developments in China: Implications for US Businesses

  • Media

    Gallery: Craig Allen’s Trip to China

    USCBC 45th Annual Membership Meeting

    USCBC 45th Anniversary DC Open House

    USCBC President’s China Visit

    USCBC Hosts Business Roundtable with Zhejiang Party Secretary Che Jun

    USCBC hosts Comprehensive Economic Dialogue (CED) Luncheon

  • Podcasts
  • Archive
No Result
View All Result
  • Operations
    Multinational Supply Chains in a Post-Pandemic China

    Multinational Supply Chains in a Post-Pandemic China

    Managing Risk in the “New Era”

    Managing Risk in the “New Era”

    Design Patents vs. Trade Dress: Protecting IP in China

    Design Patents vs. Trade Dress: Protecting IP in China

    As China Emerges from COVID-19, US Companies Invest to Compete

    As China Emerges from COVID-19, US Companies Invest to Compete

    Inside the Mad Rush for Masks – Anatomy of a 10 Million Mask Order

    Inside the Mad Rush for Masks – Anatomy of a 10 Million Mask Order

    Addressing Risk in the Era of US-China “Great Power” Competition

    Addressing Risk in the Era of US-China “Great Power” Competition

  • Politics
    Hong Kong’s National Security Law, Five Months In

    Hong Kong’s National Security Law, Five Months In

    China Implements its Long-Awaited Unreliable Entities List Mechanism

    China Implements its Long-Awaited Unreliable Entities List Mechanism

    Competing WTO Reform Agendas and the Contest for the Next Director-General

    Competing WTO Reform Agendas and the Contest for the Next Director-General

    China Eyes Further Northeast Asian Economic Integration in RCEP

    China Eyes Further Northeast Asian Economic Integration in RCEP

    COVID-19 Could Doom or Deliver US-China Commercial Relations

    COVID-19 Could Doom or Deliver US-China Commercial Relations

    A Game of Chicken

    A Game of Chicken

  • Tech
    China and CPTPP: Does China’s Emerging Data Regime Live Up to CPTPP Principles?

    China and CPTPP: Does China’s Emerging Data Regime Live Up to CPTPP Principles?

    Can China’s Beleaguered Gaming Industry Overcome the New Wave of Restrictions?

    Can China’s Beleaguered Gaming Industry Overcome the New Wave of Restrictions?

    Semiconductor Self-Sufficiency: MIIT’s Ambitions for 2021 and Beyond

    Semiconductor Self-Sufficiency: MIIT’s Ambitions for 2021 and Beyond

    The Growing Intersection of Digital Health and Data Processing in China

    The Growing Intersection of Digital Health and Data Processing in China

    Export Controls on Emerging and Foundational Technologies: A Null Set?

    Export Controls on Emerging and Foundational Technologies: A Null Set?

    How Companies Are Reacting to China’s New Data Security Scheme

    How Companies Are Reacting to China’s New Data Security Scheme

    Trending Tags

    • Intellectual Property
    • innovation
    • cybersecurity
    • ecommerce
    • tech
  • Society
    Can China’s Beleaguered Gaming Industry Overcome the New Wave of Restrictions?

    Can China’s Beleaguered Gaming Industry Overcome the New Wave of Restrictions?

    China Cracks Down on Education Industry in Effort to Increase Birthrate

    China Cracks Down on Education Industry in Effort to Increase Birthrate

    The Extraordinary Rise of China’s Pet Industry

    The Extraordinary Rise of China’s Pet Industry

    COVID-19 Could Doom or Deliver US-China Commercial Relations

    COVID-19 Could Doom or Deliver US-China Commercial Relations

    The Year in Social Credit: Where is Corporate Social Credit Going in 2020 and Beyond?

    The Year in Social Credit: Where is Corporate Social Credit Going in 2020 and Beyond?

    Open Government Developments in China: Implications for US Businesses

  • Media

    Gallery: Craig Allen’s Trip to China

    USCBC 45th Annual Membership Meeting

    USCBC 45th Anniversary DC Open House

    USCBC President’s China Visit

    USCBC Hosts Business Roundtable with Zhejiang Party Secretary Che Jun

    USCBC hosts Comprehensive Economic Dialogue (CED) Luncheon

  • Podcasts
  • Archive
No Result
View All Result
China Business Review
No Result
View All Result
Home Cybersecurity

The 5 Levels of Information Security in China

USCBC by USCBC
December 5, 2016
Share on FacebookShare on TwitterLinkedin

By Nick Marro

While cybersecurity challenges have long affected foreign companies operating in China and raised concerns about discriminatory treatment of foreign products—particularly China’s recent push for “secure and controllable” technology—the beginnings of this trend can be traced to the early 1990s with China’s adoption of the multi-level protection scheme (MLPS). Today, companies describe an increasingly restrictive environment that is squeezing their market share as regulators increasingly link national and cybersecurity to government procurement, data management, and IT system integration. This squeeze is particularly evident in China’s implementation of MLPS.

MLPS: What is it?

A draft MLPS system was first established in 2007, creating a “grading scale” to protect the information security of “critical infrastructure.” The origins of the MLPS framework can be traced to a government circular describing the construction of a similar system in 1994.

The MLPS sets five levels of information security based on potential consequences of damaged information systems:

  • Level 1   Damage of the information system results in harm to the legal rights of citizens, legal persons, and other organizations, but will not harm national security, social order, or public interest
  • Level 2   Damage of the information system results in serious harm to the legal rights of citizens, legal persons, and other organizations, as well as harm to social order and public interests, but will not harm national security
  • Level 3   Damage of the information system results in serious harm to social order and public interest, and will harm national security
  • Level 4   Damage of the information system results in very serious harm to social order and public interests, and will seriously harm national security
  • Level 5   Damage of the information system results in very serious harm to national security

An ongoing fundamental challenge for foreign companies is the fact that the term “critical infrastructure,” or “critical information infrastructure,” is undefined, creating uncertainty as to what products and operations are affected by the MLPS regime. Other critical terms, such as “damage” and “serious harm,” are also undefined.

Some language in the regulations, such as the requirement that encryption algorithms be submitted to the State Encryption Management Bureau (SEMB) for review, not only create onerous compliance challenges, but may also violate foreign companies’ internal intellectual property (IP) protection guidelines. Other language suggests an outright discriminatory preference for domestic IT solutions—for example, the requirement that Level 3 or higher information systems use indigenous IP within core IT systems and key hardware components, and undergo testing, certification, and authentication via the China Compulsory Certification for information security products (CCCi). The effect of this requirement is potentially sweeping, since Level 3 information systems may include systems used by commercial customers in sectors such as banking, healthcare, energy, and telecommunications. Other recent draft legislation on information security in these sectors underscores concerns about the potential breadth of Chinese regulations favoring domestic products.   

How is MLPS applied?

China has quietly implemented the MLPS framework since 2007, with reports emerging every few years of ramped-up inspections by government authorities. However, conversations with USCBC members indicate that implementation is not uniform. For instance, requirements that core technology components use indigenous IP may only be lightly enforced, or not enforced at all..

Some USCBC members indicate that testing and certification of their IT products and systems has occurred on a de-facto voluntary basis—with the MLPS framework is used as a reference. Other members indicate that as part of China’s quiet implementation of MLPS, operators of any system that might be considered “critical information infrastructure” have been instructed to use this standard. Despite this uneven implementation, the establishment of MLPS has provided a legal framework for authorities to demand compliance, creating uncertainty about how strictly these provisions will be enforced.

A bilateral priority

MLPS is a US priority on the bilateral agenda. At the 2012 Joint Commission on Commerce and Trade (JCCT), the United States announced that China had committed to revise language on indigenous IP requirements. Following the 2015 JCCT, the US fact sheet and the Chinese fact sheet noted that both countries would continue working together to address MLPS-related concerns and challenges.

But despite historically uneven enforcement by China and the high priority of the issue on the bilateral agenda, industry concerns have deepened as language calling for the construction or enhancement of MLPS has become increasingly common in a host of Chinese draft legislation. Companies are concerned that MLPS is taking on a “new life,” as regulators seek to address new security changes caused by technological advances since these regulations were first promulgated years ago. Most prominently, such language emerged in draft regulations on information security in the banking and insurance industries, as well as in China’s draft cybersecurity law. The National Informatization Development Strategy, released by the Cyberspace Administration of China (CAC) on July 28 as a comprehensive guideline for developing the domestic ICT sector, also calls for the creation of an MLPS framework.

Conversations with USCBC indicate that the new MLPS regime is currently under drafting by the China National Information Security Standards Technical Committee (also known as TC260). These new may be extended to explicitly cover areas such as cloud computing and critical information infrastructure (CII), a broad term that has remained undefined.

How are MNCs handling this?

China is not alone in adopting and promoting a framework to protect information security in critical systems. This is a trend increasingly reflected in global practices, and adapting to such frameworks is certainly a task that multinational companies have had to undertake in other markets. For instance, in 2008, both the United States and the European Union created a standard on information security evaluation guidelines adopted by the International Standardization Organization (ISO). China adopted a local version of this ISO standard and incorporated it as one of the standards under the MLPS framework.

In order to ensure compliance when handling data collected in China, foreign companies note the importance of balancing China’s domestic laws—including MLPS, as well as a number of policies restricting data from leaving China’s shores—with their own business needs, which often require the free flow of data between business units in China and overseas global headquarters.  

One company noted that they provide IT support and maintenance to customers in China, using data sets mined from hardware located in China to predict, identify, or handle any problems that may arise. Although their local teams can handle many of the issues that arise domestically, severe cases must sometimes be elevated to the global level, requiring input from international teams who are based outside of China. This company must ensure that any data sent being overseas is in compliance with China’s laws and regulations, including compliance under MLPS.

For instance, if this company is monitoring IT systems in hospitals or other public buildings, which may be in sectors considered Level 3 or above, the company must actively filter sensitive data, such as patients’ personal information, so as not to access Level 3 data. By screening this data from its system, this company has the flexibility to provide remote IT support and handle technical issues. The use of a filter allows it to sell products and provide IT maintenance to units otherwise considered Level 3 and off-limits.

However, filtering out data is counter to the mission of companies striving to seize upon the value of big data—such as by collating personal information to identify consumer trends, or using machine data to predict and prevent industrial accidents. These new ways of using big data are fast becoming pillars of the global economy, and will be increasingly important  for China’s successful economic transition and continued development.

MLPS and other Chinese cybersecurity policies that run counter to the development of an increasingly connected global marketplace not only present obstacles for China’s achievement of its own economic goals but also create challenges for MNCs seeking to identify and apply best practices for compliance and successful competition in the digital world. It is not clear to industry how MLPS will develop in the future, or if newly constructed MLPS frameworks will complement or supersede the existing framework. But no matter how this system develops, transparency and fair treatment concerns are likely to remain significant issues for some time.

USCBC

USCBC

Next Post

How Effective Chief Digital Officers Navigate Digital Transformations

Recommended.

China and CPTPP: Does China’s Emerging Data Regime Live Up to CPTPP Principles?

August 5, 2022

Reflections on the Phase One Agreement

January 20, 2022

Can China’s Beleaguered Gaming Industry Overcome the New Wave of Restrictions?

November 29, 2021

From Reshoring to Rightshoring: Dr. Sara Hsu on the Future of US-China Supply Chains

August 4, 2021

Latest Podcasts.

What recent chip export controls mean for business

January 25, 2023

Taking stock as we enter USCBC’s 50th year

January 13, 2023

What unexpected midterm results mean for China policy

November 16, 2022

Two tales of travel to China

November 7, 2022
China Business Review

China Business Review is the official magazine of the US-China Business Council, a nonprofit and nonpartisan trade association that represents more than 200 American companies doing business in China.

  • How to contribute to China Business Review

Categories

  • Bilateral Relations
  • Business Etiquette
  • CBR Spotlight
  • China Deals
  • Corruption
  • Cybersecurity
  • Ecommerce
  • Environment
  • Finance
  • Galleries
  • Getting Started
  • HR & Staffing
  • Infographics
  • Innovation
  • Intellectual Property
  • Management
  • Media
  • Operations
  • Opinion
  • Policy & Regulations
  • Politics
  • PR & Marketing
  • Rural Issues
  • Safety
  • Social Policy
  • Society
  • Standards + Licensing
  • Sustainability
  • Tax
  • Tech
  • Top Story
  • Trade
  • Uncategorized
  • US-China Business Council
  • Videos

Tags

Agreements Agriculture Alibaba Best Practices Business Environment China China's Investments Abroad China Market Intelligence Chinese Consumers Chinese Investment Commentary Consumer Trends E-Commerce Economic Trends Energy Environment Events Food Foreign Investment Going Global Healthcare Reform Human Resources Infrastructure Internet Interview Investment Investments into China IPO Joint Venture Labor Legal Analysis M&A Manufacturing Media National People's Congress Q&A Strategic and Economic Dialogue Supply Chains Technology Trade Transparency US-China Relations USCBC US Exports to China Xi Jinping

Join our Mailing List

Sign up for the US-China Business Council's newsletters to stay ahead of the game with roundups, analysis, and commentary.

Sign Up

Follow Us

  • About
  • USCBC
  • Submit a Story
  • Archive

© 2022 China Business Review

No Result
View All Result
  • Operations
  • Politics
  • Tech
  • Society
  • Media
  • Podcasts
  • Archive

© 2022 China Business Review