• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    China'S Network Security Review System Will Be Introduced: Involving Foreign IT Enterprises

    2014/5/27 17:32:00 20

    China'S Network Security Review SystemForeign CapitalIT Enterprises

    < p > it is reported that the state Internet Information Office, 22, said that China will soon launch a network security review system for enterprise technology products and services. The institution was established in 2011, and its main responsibilities include implementing policies, promoting the construction of the legal system, and having relevant management and handling powers according to law. < /p >
    The message "P" was subsequently quoted as saying, "all foreign IT products and services sold in China are subject to new safety reviews. Any company, product or service that fails to pass the safety test will be banned from entering the Chinese market. " The financial times also quoted news that China has ordered state-owned enterprises to break up relations with American consulting companies such as McKinsey and Boston Consulting Group, for fear that the latter acts on behalf of the US government. < /p >
    < p > insiders told Tencent that the deterioration of security relations between China and the United States will directly affect the survival of many IT enterprises in the United States, especially IT enterprises in China, such as IBM, Oracle and EMC. The reason is that these enterprises mostly involve communications, finance, energy, national security or "public interest". < /p >
    < p > however, the above enterprises have not made any public response. < /p >
    < p > in fact, since last week, due to security concerns, China has banned central government agencies from purchasing Microsoft's latest operating system Windows 8, instead of supporting domestic operating systems, in order to find alternatives. The specific way of operation is through the notice issued by the central government organ government procurement center on the notice of supplementary bidding for mandatory energy saving products supplied by information related agreements. < /p >
    < p > another person who did not want to be named revealed that the country's disclosure from the government level is mainly a policy consideration, and it is not specific to the specific business. The view is that Chinese enterprises have become dependent on the software of overseas enterprises, and it is difficult to completely prohibit them. < /p >
    < p > but considering the adjustment of government procurement orientation under the influence of policy, it will affect the income of the above enterprises in China in a certain period. This is another major crisis after the announcement of the IEO movement by some Chinese enterprises. < /p >
    < p > it is understood that the current domestic operating system mainly includes: the closed source server Galaxy Kirin operating system developed by National University of Defense Technology, China soft Corporation, Lenovo Inc, wave group and national Star Inc. The operating system is a major research project of the 863 plan, which aims to break the monopoly of foreign operating systems; domestic computer operating system Hongqi Linux and so on. < /p >
    "P", Li Jingchun, chief engineer of the national information technology security research center, said: "in the past, our country only carried out superficial management of the network, mainly including functional compliance and low level safety review. At present, network products and services are developing to a deeper level. If we continue to follow the previous regulatory measures, it is very likely that there will be loopholes in the network supervision, which will cause losses to national security and user safety. " Therefore, the introduction of the network security review system is considered to be one of the most important solutions at present. < /p >
    < p > it is understood that the review system will be implemented by the national Internet information office and the National Standardization Committee for information security. The process of examination requires the participation of third party professional testing organizations and expert groups in addition to the assistance of a number of relevant departments. < /p >
    According to Xinhua news agency, China is not the first one to carry out different forms of network security review for it products and their suppliers. It has a precedent in the United States: < /p > P.
    < p > 2012, the House Intelligence Committee conducted a safety review of Chinese enterprises on the ground of national security. In addition, in response to the increasingly widespread application of cloud computing, the US government has also made safety reviews for cloud computing service providers, and clearly stipulates that the federal government departments can only choose services provided by the cloud computing service providers reviewed. < /p >
    < p > however, media reports do not indicate when the regulation will be formally implemented and what specific criteria will be included. < /p >
    < p > by this news, many Chinese listed IT software companies benefited from the increase, including China software, wave information, wave software, purple light shares, North Xinyuan and so on. < /p >
    < p > it is reported that the Sino US side's "a href=" http://www.91se91.com/news/index_c.asp "network" /a "security problem is still in bad faith. It started in May 19th, the us a href=" http://www.91se91.com/news/index_c.asp "and the Ministry of justice" /a "announced the prosecution of 5 Chinese officers on the grounds of so-called cyber theft. In response, a spokesman for China's Internet Information Office responded by calling it a nonsense and announces the latest data on the US attack on China network. < /p >
    < p > data show that between March 19th and May 18th this year, 2077 Trojan horses or botnets control servers located in the United States directly control about 1 million 180 thousand hosts in our country. 2016 IP located in the United States imported 1754 websites into China's backdoor, involving about 57 thousand times of backdoor attacks. < /p >
    Yesterday, the Xinhua news agency also issued the US global surveillance action record issued by the Internet news research center. Some of the contents pointed out that the US surveillance against China is pervasive, and even online games and chat software have become the channel for the us to obtain intelligence. P < /p >
    < p > it is reported that last year's a href= "http://www.91se91.com/news/index_c.asp" > IOE < /a > event has led to a decline in the volume of business of many related enterprises. With the increasing friction between China and the United States on network security issues, the situation of US technology companies in China may become more difficult this year. < /p >
    • Related reading

    Insufficient Attention Is Paid To The Safety And Order Of Domestic Property Spanactions.

    Foreign laws and regulations
    |
    2014/5/25 19:46:00
    31

    The Law Applicable To Foreign-Related Negotiable Securities Is Not Comprehensive.

    Foreign laws and regulations
    |
    2014/5/25 19:39:00
    42

    The Introduction Of Autonomy In Foreign Ownership Of Movable Property Is Too Much.

    Foreign laws and regulations
    |
    2014/5/25 19:36:00
    37

    As Long As It Does Not Involve Commercial Secrets Protection, Etc.

    Foreign laws and regulations
    |
    2014/5/24 15:33:00
    22

    Shenzhen Promotes The Establishment Of A Legal Mechanism For Shenzhen And Hong Kong

    Foreign laws and regulations
    |
    2014/5/24 15:25:00
    28
    Read the next article

    Electricity Supplier Delivery Market Later, Shun Feng: Do Not Want Price War.

    Although a series of products that have been launched by Shun Feng have not directly affected the existing market structure, they also show that the concern of SF to the electricity supplier market has exceeded any previous stage. The later delivery supplier of electric power delivery market: Shun Feng: do not want to price war. Next, let's take a look at the detailed information with the world clothing shoes and hat net.

    主站蜘蛛池模板: 蕾丝av无码专区在线观看| 双乳奶水被老汉吸呻吟视频| 向日葵app在线观看下载视频免费| 久久精品国产亚洲AV香蕉| 欧美一级黄视频| 日韩经典在线观看| 在线日本妇人成熟| 午夜性伦鲁啊鲁免费视频| 中文在线а√天堂| 韩国三级hd中文字幕| 欧美日韩亚洲一区二区三区 | 调教15小男生gay脱裤子| 日韩日韩日韩日韩日韩| 国产精品视频一区二区三区不卡 | 国产AV成人一区二区三区| 亚洲中文字幕久久精品无码喷水| xxxx性开放xxxx| 老子影院午夜理伦手机不卡| 暴力调教一区二区三区| 国产精品福利一区二区| 伊人久久大香线蕉亚洲| 一级成人毛片免费观看| 窝窝社区在线观看www| 无码一区二区三区中文字幕| 国产成人精品999在线观看| 亚洲欧美另类国产| www.天天色.com| 波多野结衣第一页| 天天躁日日躁狠狠躁一级毛片| 伊人影院中文字幕| 91精品国产肉丝高跟在线| 波多野结衣的av一区二区三区| 国产视频一二三| 亚洲精品欧美精品国产精品| 4hc88四虎www在线影院短视频| 澳门特级毛片免费观看| 国产精品无码素人福利免费| 亚洲AV无码一区二区三区网站| 娇喘午夜啪啪五分钟娇喘| 日韩欧美一区二区三区| 国产-第1页-浮力影院|