• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    China'S Network Security Review System Will Be Introduced: Involving Foreign IT Enterprises

    2014/5/27 17:32:00 20

    China'S Network Security Review SystemForeign CapitalIT Enterprises

    < p > it is reported that the state Internet Information Office, 22, said that China will soon launch a network security review system for enterprise technology products and services. The institution was established in 2011, and its main responsibilities include implementing policies, promoting the construction of the legal system, and having relevant management and handling powers according to law. < /p >
    The message "P" was subsequently quoted as saying, "all foreign IT products and services sold in China are subject to new safety reviews. Any company, product or service that fails to pass the safety test will be banned from entering the Chinese market. " The financial times also quoted news that China has ordered state-owned enterprises to break up relations with American consulting companies such as McKinsey and Boston Consulting Group, for fear that the latter acts on behalf of the US government. < /p >
    < p > insiders told Tencent that the deterioration of security relations between China and the United States will directly affect the survival of many IT enterprises in the United States, especially IT enterprises in China, such as IBM, Oracle and EMC. The reason is that these enterprises mostly involve communications, finance, energy, national security or "public interest". < /p >
    < p > however, the above enterprises have not made any public response. < /p >
    < p > in fact, since last week, due to security concerns, China has banned central government agencies from purchasing Microsoft's latest operating system Windows 8, instead of supporting domestic operating systems, in order to find alternatives. The specific way of operation is through the notice issued by the central government organ government procurement center on the notice of supplementary bidding for mandatory energy saving products supplied by information related agreements. < /p >
    < p > another person who did not want to be named revealed that the country's disclosure from the government level is mainly a policy consideration, and it is not specific to the specific business. The view is that Chinese enterprises have become dependent on the software of overseas enterprises, and it is difficult to completely prohibit them. < /p >
    < p > but considering the adjustment of government procurement orientation under the influence of policy, it will affect the income of the above enterprises in China in a certain period. This is another major crisis after the announcement of the IEO movement by some Chinese enterprises. < /p >
    < p > it is understood that the current domestic operating system mainly includes: the closed source server Galaxy Kirin operating system developed by National University of Defense Technology, China soft Corporation, Lenovo Inc, wave group and national Star Inc. The operating system is a major research project of the 863 plan, which aims to break the monopoly of foreign operating systems; domestic computer operating system Hongqi Linux and so on. < /p >
    "P", Li Jingchun, chief engineer of the national information technology security research center, said: "in the past, our country only carried out superficial management of the network, mainly including functional compliance and low level safety review. At present, network products and services are developing to a deeper level. If we continue to follow the previous regulatory measures, it is very likely that there will be loopholes in the network supervision, which will cause losses to national security and user safety. " Therefore, the introduction of the network security review system is considered to be one of the most important solutions at present. < /p >
    < p > it is understood that the review system will be implemented by the national Internet information office and the National Standardization Committee for information security. The process of examination requires the participation of third party professional testing organizations and expert groups in addition to the assistance of a number of relevant departments. < /p >
    According to Xinhua news agency, China is not the first one to carry out different forms of network security review for it products and their suppliers. It has a precedent in the United States: < /p > P.
    < p > 2012, the House Intelligence Committee conducted a safety review of Chinese enterprises on the ground of national security. In addition, in response to the increasingly widespread application of cloud computing, the US government has also made safety reviews for cloud computing service providers, and clearly stipulates that the federal government departments can only choose services provided by the cloud computing service providers reviewed. < /p >
    < p > however, media reports do not indicate when the regulation will be formally implemented and what specific criteria will be included. < /p >
    < p > by this news, many Chinese listed IT software companies benefited from the increase, including China software, wave information, wave software, purple light shares, North Xinyuan and so on. < /p >
    < p > it is reported that the Sino US side's "a href=" http://www.91se91.com/news/index_c.asp "network" /a "security problem is still in bad faith. It started in May 19th, the us a href=" http://www.91se91.com/news/index_c.asp "and the Ministry of justice" /a "announced the prosecution of 5 Chinese officers on the grounds of so-called cyber theft. In response, a spokesman for China's Internet Information Office responded by calling it a nonsense and announces the latest data on the US attack on China network. < /p >
    < p > data show that between March 19th and May 18th this year, 2077 Trojan horses or botnets control servers located in the United States directly control about 1 million 180 thousand hosts in our country. 2016 IP located in the United States imported 1754 websites into China's backdoor, involving about 57 thousand times of backdoor attacks. < /p >
    Yesterday, the Xinhua news agency also issued the US global surveillance action record issued by the Internet news research center. Some of the contents pointed out that the US surveillance against China is pervasive, and even online games and chat software have become the channel for the us to obtain intelligence. P < /p >
    < p > it is reported that last year's a href= "http://www.91se91.com/news/index_c.asp" > IOE < /a > event has led to a decline in the volume of business of many related enterprises. With the increasing friction between China and the United States on network security issues, the situation of US technology companies in China may become more difficult this year. < /p >
    • Related reading

    Insufficient Attention Is Paid To The Safety And Order Of Domestic Property Spanactions.

    Foreign laws and regulations
    |
    2014/5/25 19:46:00
    31

    The Law Applicable To Foreign-Related Negotiable Securities Is Not Comprehensive.

    Foreign laws and regulations
    |
    2014/5/25 19:39:00
    42

    The Introduction Of Autonomy In Foreign Ownership Of Movable Property Is Too Much.

    Foreign laws and regulations
    |
    2014/5/25 19:36:00
    37

    As Long As It Does Not Involve Commercial Secrets Protection, Etc.

    Foreign laws and regulations
    |
    2014/5/24 15:33:00
    22

    Shenzhen Promotes The Establishment Of A Legal Mechanism For Shenzhen And Hong Kong

    Foreign laws and regulations
    |
    2014/5/24 15:25:00
    28
    Read the next article

    Electricity Supplier Delivery Market Later, Shun Feng: Do Not Want Price War.

    Although a series of products that have been launched by Shun Feng have not directly affected the existing market structure, they also show that the concern of SF to the electricity supplier market has exceeded any previous stage. The later delivery supplier of electric power delivery market: Shun Feng: do not want to price war. Next, let's take a look at the detailed information with the world clothing shoes and hat net.

    主站蜘蛛池模板: 久久国产精品99久久小说| 国产偷v国产偷v亚洲高清| 亚洲色成人网一二三区| sss欧美一区二区三区| 精品一区二区三区自拍图片区| 成年人看的毛片| 又粗又大又爽又紧免费视频| 中文人妻无码一区二区三区| 精精国产XXXX视频在线| 小蝌蚪视频在线观看www| 免费精品99久久国产综合精品| 一区二区三区四区在线播放 | 亚洲影视自拍揄拍愉拍| 欧美一级三级在线观看| 国产无遮挡裸体免费视频在线观看 | 欧美精品久久天天躁| 国产精品综合一区二区| 亚洲人免费视频| 黄色软件下载免费观看| 日本一道高清一区二区三区| 国产91精品高清一区二区三区| 一级做a爱片特黄在线观看免费看| 精品久久久噜噜噜久久久| 大又大又粗又硬又爽少妇毛片| 亚洲爆乳无码专区www| 456在线视频| 日本精品视频在线播放| 和阿同居的日子hd中字| a在线观看免费视频| 欧美午夜一区二区福利视频| 国产成人三级视频在线观看播放| 久久九九久精品国产免费直播| 美女隐私免费视频看| 夫前被强行侵犯在线观看| 亚洲欧洲日产国码久在线| 国产主播在线看| 扒开粉嫩的小缝喷出水视频| 免费在线视频a| 在线私拍国产福利精品| 日本大乳高潮视频在线观看 | 久久精品国产四虎|