Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- CHINA
- China was voted the world's worst for internet freedom in 2015, according to Freedom on the Net survey: https://freedomhouse.org/report/freedom-net/2015/china
- China often has wide-raging and vaguely written laws. It has no proper national framework to govern the use or disclosure of personal data. Tech companies, both foreign and local, are often left confused as to what the laws mean for them. National Security is a term that can be used as a reason for just about anything relating to data privacy.
- China blocks a huge amount of outside traffic, and heavily censors its internal internet traffic. Being communist, privacy in China is not guaranteed. Data is intercepted and censored. Knowing they will be tracked, helps further censorship. The sweeping laws and punishments also help to ensure that Chinese people are careful and wary of what they post online.
- Despite serious censorship, and the estimation of having the most regular internet users in the world, China does not yet have major data protection and online privacy laws.
- ←-Law governing bodies:
- China's MIIT = Ministry of Industry and Information Technology.
- National People's Congress(NPC) – highest legislative authority
- State Internet Information Office
- Chief Information Office of the Chinese Government (falls under the PRC)
- LAWS/REGULATIONS – LINKS/NEWS ARTICLES
- ***Counter Terrorism Law of the People's Republic of China***
- http://chinalawtranslate.com/%E5%8F%8D%E6%81%90%E6%80%96%E4%B8%BB%E4%B9%89%E6%B3%95-%EF%BC%882015%EF%BC%89/?lang=en
- == Articles about it:
- http://thediplomat.com/2016/01/chinas-comprehensive-counter-terrorism-law/
- http://www.bbc.com/news/world-asia-china-35188137
- http://www.ibtimes.com/chinas-anti-terrorism-law-could-mean-trouble-apple-encryption-us-tech-companies-2242991
- http://globalriskinsights.com/2016/01/breaking-down-the-implications-of-chinas-new-anti-terrorism-law/
- ***National People's Congress Standing Committee Decision concerning Strenthening Network Information Protection (“Decision”)***
- https://chinacopyrightandmedia.wordpress.com/2012/12/28/national-peoples-congress-standing-committee-decision-concerning-strengthening-network-information-protection/
- ==Articles:
- https://www.coe.int/t/dghl/standardsetting/dataprotection/National%20laws/Taiwan-CP-DPLaw.pdf
- http://www.faegrebd.com/new-rules-for-personal-data-protection-in-china
- ==Summary article about it:
- http://www.dataprivacymonitor.com/online-privacy/china-adopts-privacy-legislation-strengthening-online-personal-data-protection/
- ***First National Standard of Personal Information Protection, Feb 1, 2013. This is the first national standard for personal information guidelines***
- - These are guidelines only and not backed by law or subject to penalties for non-compliance.
- http://www.china-briefing.com/news/2013/02/04/chinas-first-national-standard-on-personal-information-protection-to-take-effect.html
- ***Provisional Regulation for the Development of Management of Instant Messaging Tools and Public Information Services***
- http://www.hrichina.org/en/press-work/hric-bulletin/china-issues-new-regulations-mobile-text-and-voice-messaging-services-hric
- Summary of Laws
- ***Counter Terrorism Law of the People's Republic of China***
- Article 3 of this law briefly describes, in part, the definition of terrorism as follows:
- “Terrorism" as used in this Law refers to propositions and actions that create social panic, endanger public safety, violate person and property, or coerce national organs or international organizations, through methods such violence, destruction, intimidation, so as to achieve their political, ideological, or other objectives.
- - this law further strengthens censorship of foreign media
- - telecommunications and ISP companies must provide the government with technical assistance when required, including decryption
- - Everyone is forbidden to be reporting on the following subjects:
- *details of incidents that may lead to copycat attacks
- *no cruel or inhuman images
- *no ID information on response or hostage personnel, or anti-terror responses. Media may do so with permission.
- - this law has been criticised as it further censors an already heavily censored press
- -Privacy and human rights may be affected by this law, due to its far-reaching potential implications. China places huge empasis on being able to control and censor the internet and their people.
- ***National People's Congress Standing Committee Decision concerning Strenthening Network Information Protection (“Decision”)***
- This was enacted by the Standing Commitee of the Chinese NPC in December, 2012.
- - ISPs and other organisations are required to state their objectives, methods and scope of collection and use of data collection during their business tasks.
- - They must also obtain consent from the user.
- - ISPs must safeguard and strengthen the management of personal data.
- -Individuals and organisations are prohibited from personal online information via theft, or other illegal means. They are also prohibited from selling or providing that information to others.
- - Where citizens discover that individual privacy has been dissemenated or other network information infringes their lawful rights and interests, they have the power to require the network provider to delete the information or adopt measures to cease it.
- - State organs and their staff must keep the secrecy of citizens personal electronic information that they learn in the course of their duty. They may not divulge it or illegally sell it to another person.
- -Policies must be published outlining data collection by organisations.
- -People must be informed of how, for what purpose, and what range that their data is collected.
- - Consent must be given by the individuals prior to the collection of their data.
- ***First National Standard of Personal Information Protection, Feb 1, 2013. This is the first national standard for personal information guidelines***
- These are guidelines only and not subject to law or penalties for non-compliance.
- - They were brought about due to the increasingly large amount of data leakage.
- - Processing of personal information must be for specific, clear and reasonable purposes.
- -Data must be deleted once it has been used.
- - Consent must be gained first from a well-informed individual.
- -These guidelines divide information into general and sensitive; sensitive being info given via, or obtained by, express consent. Examples are ID cards, personal preferences, and finger prints. General information relates to other info that can be gathered so long as the indiviual does not object.
- -Also, information/personal data gathered outside the need for it is forbidden.
- -Consent is needed when Chinese information is passed outside of China.
- ***Provisional Regulation for the Development and Management of Instant Messaging Tools and Public Information Services***
- This regulation requires that:-
- -IM Service providers obtain qualifications (permits) before providing information services
- -Before registration, IM users must authorise with their true Ids.
- -Users must undergo examination and verification before providing public information. If the information they provide is news, it must already be recorded in China elsewhere.
- -Unless they have obtained qualifications, no account may publish or reprint content on current events.
- STORIES AROUND PRIVACY AND CENSORSHIP
- 1. http://www.rfa.org/english/news/china/three-online-activists-arrested-04022015110059.html?searchterm:utf8:ustring=Liang+Qinhui
- Three people were arrested because of tweets they had posted. They were arrested on suspicion of “incitement to subvert state power”. They had simply posted pro-democracy and satorial tweets, and tweets around political awakening. Liang Qinhui, Zheng Jingxian and Huang Qian were all detained separately by the police. See also below.
- 2. http://www.rfa.org/english/news/china/china-hongkong-04082016134146.html
- Four rights activists in the province of Guandong were each handed jail terms of up to four years. Liang Qinhui, also from the previous story, was handed an 18-mth sentence, but not before he was detained for many days, according to his fiancee. The other three were also given four – four and a half years all for “incitement to subvert state power.” All men had openly supported the Occupy movement. At least 100 more supporters of this were also jailed.
- To note: Posting online is enough to be charged with subversion. One of the lawyers said of the situation, “This verdict and sentence are ridiculous and...have been handed down in a situation where the ruling Chinese Communist Party has a total monopoly on power.” - Tan Chenshou
- 3. https://en.wikipedia.org/wiki/Li_Zhi_%28dissident%29
- https://en.wikipedia.org/wiki/Criticism_of_Yahoo!#Outing_of_Chinese_dissidents
- A few Chinese dissidents have been jailed aftre Yahoo cooperated with China to disclose their details. A journalist working for a Chinese newspaper, Shi Tao, was sentenced to ten years in 2005. She was charged with “providing state secrets to foreign entities.” The secrets were in fact a short list of censorship orders that were sent via an anonymous Yahoo email account. Yahoo were asked to provide the email registration information, IP addresses, all login times and other email content, which they did.
- Li Zhi was sentenced to eight years in prison in 2003, for criticising corruption and for trying to join the banned Democracy Pary of China. Yahoo also partly played a role in her capture by again providing account details.
- In September 2003, Wang Xiaoning was sentenced to ten years in prison. Yahoo provided his account details to Chinese authorities. He was using his Yahoo account to publish pro-democracy articles online. His wife sued Yahoo in 2007, for supplying his private information. It was settled out of court.
- FURTHER LINKS ON OTHER IMFORMATION OF INTEREST
- http://www.aljazeera.com/news/2015/12/china-expel-french-journalist-uighur-report-151226141810827.html – French journalist had visa cancelled after reporting on repression of a group in China. (more to do with censorship)
- http://qz.com/620076/beijing-is-banning-all-foreign-media-from-publishing-online-in-china/ - again, more to do with censorship than privacy
- https://www.insideprivacy.com/category/international/china/
- https://www.bluecoat.com/resources/cloud-governance-data-residency-sovereignty/china-data-privacy-laws
- https://www.hg.org/article.asp?id=5340 very brief overview of privacy
- https://cs.stanford.edu/people/eroberts/cs181/projects/communism-computing-china/privacy.html == explaining china approach or lack of it, towards privacy.
- VPNS
- - The Chinese use VPNs to access the normal internet in a severely censored country.
- - Current law requires VPN users to register with MIIT (see top)
- - Access to VPNs is now sometimes being blocked
- - After the latest updates had been done to China's firewall (“The Great Firewall of China”), at least three VPN service providers had their services affected. They include Astrill, Strong VPN and Golden Frog.
- Some further links to information:
- http://www.usatoday.com/story/tech/2015/01/23/china-internet-vpn-google-facebook-twitter/22235707/
- http://www.bbc.com/news/technology-30982198
- http://www.gov.cn/xinwen/2015-12/28/content_5028407.htm
- THE GREAT FIREWALL OF CHINA
- This is somewhat unrelated to privacy, but due to censorship dominating the internet and filtering literally everything, I thought I would include some brief information about it anyway. Feel free to discard if you wish.
- While some VPNs appear to have been blocked during updates, as mentioned above, others have reported that previously unsusable ones can now be accessed. This appears to be due to a serious vulnerability that has not been patched yet, despite being discovered in 2013.
- Google cached sites were once used to access blocked sites, now they seem unreliable. However, users contine to find new ways around the blocks and scrutiny.
- en.wikipedia.org/wiki/Internet_Censorship_in_China
- One clever way of getting around censorship is steganography. If you haven't herad of it, it involves concealing a message within a hidden file. For example, a text doc, image, program, etc. Media files are often used due to their large size. To find the hidden message, a user may change the colour of every 50 or 100th pixel to correspond to a colour of the alphabet. It is likely to go undetected.
- en.wikipedia.org/wiki/steganography
- The Golden Shield Project (a part of the Great Firewall of China) is China's censorship program to monitor internet traffic.
- - It is a censorship and surveillence project
- - It was initiated in 1998, and began in November 2003
- - It is operated by the Ministry of Public Security (MPS)
- - It blocks unfavourable foreign content
- - It is now used to attack foreign sites. One example was when it attacked Github, which caused it to shut down for 5 days.
- https://www.google.se/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0ahUKEwit-eP2j8zMAhVCVhQKHVfVCLwQFggbMAA&url=http%3A%2F%2Farstechnica.com%2Fsecurity%2F2015%2F03%2Fmassive-denial-of-service-attack-on-github-tied-to-chinese-government%2F&usg=AFQjCNHeLlr6q1W2Uw1QysTLQ-iw72uOVQ&bvm=bv.121421273,d.bGs
- Tor was blocked, also, and still is using http. But it is not blocked using https. However, almost all of its listed 3000 public relays are blocked. To counteract this and allow users access, tor uses non-public bridges. The Great Firewall of China are also targetting these.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement