• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    China'S Network Security Review System Will Be Introduced: Involving Foreign IT Enterprises

    2014/5/27 17:32:00 20

    China'S Network Security Review SystemForeign CapitalIT Enterprises

    < p > it is reported that the state Internet Information Office, 22, said that China will soon launch a network security review system for enterprise technology products and services. The institution was established in 2011, and its main responsibilities include implementing policies, promoting the construction of the legal system, and having relevant management and handling powers according to law. < /p >
    The message "P" was subsequently quoted as saying, "all foreign IT products and services sold in China are subject to new safety reviews. Any company, product or service that fails to pass the safety test will be banned from entering the Chinese market. " The financial times also quoted news that China has ordered state-owned enterprises to break up relations with American consulting companies such as McKinsey and Boston Consulting Group, for fear that the latter acts on behalf of the US government. < /p >
    < p > insiders told Tencent that the deterioration of security relations between China and the United States will directly affect the survival of many IT enterprises in the United States, especially IT enterprises in China, such as IBM, Oracle and EMC. The reason is that these enterprises mostly involve communications, finance, energy, national security or "public interest". < /p >
    < p > however, the above enterprises have not made any public response. < /p >
    < p > in fact, since last week, due to security concerns, China has banned central government agencies from purchasing Microsoft's latest operating system Windows 8, instead of supporting domestic operating systems, in order to find alternatives. The specific way of operation is through the notice issued by the central government organ government procurement center on the notice of supplementary bidding for mandatory energy saving products supplied by information related agreements. < /p >
    < p > another person who did not want to be named revealed that the country's disclosure from the government level is mainly a policy consideration, and it is not specific to the specific business. The view is that Chinese enterprises have become dependent on the software of overseas enterprises, and it is difficult to completely prohibit them. < /p >
    < p > but considering the adjustment of government procurement orientation under the influence of policy, it will affect the income of the above enterprises in China in a certain period. This is another major crisis after the announcement of the IEO movement by some Chinese enterprises. < /p >
    < p > it is understood that the current domestic operating system mainly includes: the closed source server Galaxy Kirin operating system developed by National University of Defense Technology, China soft Corporation, Lenovo Inc, wave group and national Star Inc. The operating system is a major research project of the 863 plan, which aims to break the monopoly of foreign operating systems; domestic computer operating system Hongqi Linux and so on. < /p >
    "P", Li Jingchun, chief engineer of the national information technology security research center, said: "in the past, our country only carried out superficial management of the network, mainly including functional compliance and low level safety review. At present, network products and services are developing to a deeper level. If we continue to follow the previous regulatory measures, it is very likely that there will be loopholes in the network supervision, which will cause losses to national security and user safety. " Therefore, the introduction of the network security review system is considered to be one of the most important solutions at present. < /p >
    < p > it is understood that the review system will be implemented by the national Internet information office and the National Standardization Committee for information security. The process of examination requires the participation of third party professional testing organizations and expert groups in addition to the assistance of a number of relevant departments. < /p >
    According to Xinhua news agency, China is not the first one to carry out different forms of network security review for it products and their suppliers. It has a precedent in the United States: < /p > P.
    < p > 2012, the House Intelligence Committee conducted a safety review of Chinese enterprises on the ground of national security. In addition, in response to the increasingly widespread application of cloud computing, the US government has also made safety reviews for cloud computing service providers, and clearly stipulates that the federal government departments can only choose services provided by the cloud computing service providers reviewed. < /p >
    < p > however, media reports do not indicate when the regulation will be formally implemented and what specific criteria will be included. < /p >
    < p > by this news, many Chinese listed IT software companies benefited from the increase, including China software, wave information, wave software, purple light shares, North Xinyuan and so on. < /p >
    < p > it is reported that the Sino US side's "a href=" http://www.91se91.com/news/index_c.asp "network" /a "security problem is still in bad faith. It started in May 19th, the us a href=" http://www.91se91.com/news/index_c.asp "and the Ministry of justice" /a "announced the prosecution of 5 Chinese officers on the grounds of so-called cyber theft. In response, a spokesman for China's Internet Information Office responded by calling it a nonsense and announces the latest data on the US attack on China network. < /p >
    < p > data show that between March 19th and May 18th this year, 2077 Trojan horses or botnets control servers located in the United States directly control about 1 million 180 thousand hosts in our country. 2016 IP located in the United States imported 1754 websites into China's backdoor, involving about 57 thousand times of backdoor attacks. < /p >
    Yesterday, the Xinhua news agency also issued the US global surveillance action record issued by the Internet news research center. Some of the contents pointed out that the US surveillance against China is pervasive, and even online games and chat software have become the channel for the us to obtain intelligence. P < /p >
    < p > it is reported that last year's a href= "http://www.91se91.com/news/index_c.asp" > IOE < /a > event has led to a decline in the volume of business of many related enterprises. With the increasing friction between China and the United States on network security issues, the situation of US technology companies in China may become more difficult this year. < /p >
    • Related reading

    Insufficient Attention Is Paid To The Safety And Order Of Domestic Property Spanactions.

    Foreign laws and regulations
    |
    2014/5/25 19:46:00
    31

    The Law Applicable To Foreign-Related Negotiable Securities Is Not Comprehensive.

    Foreign laws and regulations
    |
    2014/5/25 19:39:00
    42

    The Introduction Of Autonomy In Foreign Ownership Of Movable Property Is Too Much.

    Foreign laws and regulations
    |
    2014/5/25 19:36:00
    37

    As Long As It Does Not Involve Commercial Secrets Protection, Etc.

    Foreign laws and regulations
    |
    2014/5/24 15:33:00
    22

    Shenzhen Promotes The Establishment Of A Legal Mechanism For Shenzhen And Hong Kong

    Foreign laws and regulations
    |
    2014/5/24 15:25:00
    28
    Read the next article

    Electricity Supplier Delivery Market Later, Shun Feng: Do Not Want Price War.

    Although a series of products that have been launched by Shun Feng have not directly affected the existing market structure, they also show that the concern of SF to the electricity supplier market has exceeded any previous stage. The later delivery supplier of electric power delivery market: Shun Feng: do not want to price war. Next, let's take a look at the detailed information with the world clothing shoes and hat net.

    主站蜘蛛池模板: 被两个体育生双龙9| 亚洲福利精品一区二区三区| 亚洲毛片免费观看| 久久国产精品一国产精品金尊| 99这里只有精品66视频| 青青青在线观看视频免费播放| 欧美牲交a欧美牲交aⅴ免费下载| 成人欧美一区二区三区视频| 国产精品东北一极毛片| 免费看美女被靠到爽的视频 | 日本三级在线视频| 在车子颠簸中进了老师的身体| 国产一区二区在线视频| 亚洲成a人不卡在线观看| 中文字字幕在线| 好吊色青青青国产在线观看| 波多野结衣免费| 成人区人妻精品一区二区不卡网站 | BT天堂新版中文在线| 香港三级绝色杨贵妃电影| 欧美一级欧美一级高清| 在线观看免费亚洲| 免费又黄又硬又大爽日本| 中文字幕无码不卡免费视频| 黄色免费在线网址| 欧美一级在线看| 夫不再被公侵犯美若妻| 全免费a级毛片免费看| 久久久久亚洲av片无码| 里番肉片h排行榜| 日本系列1页亚洲系列| 国产精品爽黄69天堂a| 亚洲理论电影在线观看| ASS日本少妇高潮PICS| 美女黄网站人色视频免费| 日韩精品无码久久一区二区三| 国产精品91视频| 亚洲另类无码专区丝袜| 69视频在线观看| 欧美日韩精品在线| 国产麻豆天美果冻无码视频|