China’s Positions on International Rules-making in Cyberspace 09/08/2022, 19:59 简体中⽂ Français Русский Español ‫ﻋرﺑﻲ‬ search Home The Ministry Policies and Activities Press and Media Service Countries and Regions About China Resources Home > The Ministry > Departments > The Department of Arms Control > Positions > Others China’s Positions on International Rules-making in Cyberspace 2021-10-20 14:29 The phenomenal development of information technology revolution and digital economy is exerting far-reaching influence over social and economic development of States and human civilization. All parties should uphold multilateralism, ensure fairness and justice, put equal emphasis on security and development, step up dialogue and cooperation, promote global governance and international rules-making, and build a community of shared future in cyberspace. I. Cyberspace and physical space are deeply interconnected, which brings us immense development opportunities as well as risks and challenges. Some States take cyberspace as a new battlefield for military advantages, where they pursue a strategy of deterrence by forging military alliance and introducing rules of engagement, thus increasing the risk of conflicts in cyberspace and undermining international peace and security. Critical ICT infrastructure faces considerable vulnerability and potential risk. Cyber attacks and crimes surge, and cyber terrorism becomes a global menace. Fake news floods with massive leak and abuse of personal data. The current distribution and management system of critical Internet resources is imbalanced and unjust. The unbalanced development and widening digital divide among countries and regions are prominent. Certain States politicize technology and cybersecurity issues, willfully suppress other States' ICT enterprises and impose unfair and unjust barriers on global ICT supply chain and trade, jeopardizing global development and cooperation. II. The international community should develop universally accepted norms, rules and principles within the framework of the UN, to jointly address the risks and challenges, and uphold peace, security and prosperity in cyberspace. The Shanghai Cooperation Organization Member States submitted to the General Assembly in 2011 "International Code of Conduct for Information Security" and a revised version in 2015. With a view to furthering international efforts, China submitted to the General Assembly in 2020 the "Global Initiative on Data Security". China believes that the following norms, rules and principles should be observed: i. States should foster a cyberspace featuring peace, security, openness, cooperation and order, and should not use ICTs to carry out activities inconsistent with the objectives of maintaining international peace and security. ii. The principle of sovereignty applies in cyberspace. States should exercise jurisdiction over the ICT infrastructure, resources, data as well as ICT-related activities within their territories, and have the rights to protect their information systems and important data against damage resulting from threats, interference, attack and sabotage. States have the right to make ICT-related public policies, laws and regulations to protect legitimate interests of their citizens, enterprises and social organizations. States should refrain from using ICTs to interfere in intermal affairs of other States and undermine their political, economic and social stability, or to conduct activities that undermine other States' national security and public interests. States should participate in the management and distribution of international Internet resources on equal footings, and build a global Internet governance system of multilateralism, democracy and transparency. iii. States should enhance critical ICT infrastructure protection. States should stand against ICT activities that impair other States' critical infrastructure, impair or steal important data of other States' critical infrastructure. States should increase exchanges on legislation, best practices and technologies with regard to critical ICT infrastructure protection, and promote international cooperation on personnel training, technological innovation, early warning and prevention, emergency response, standards and regulations, and information sharing. iv. States should handle data security in a comprehensive, objective and evidence-based manner. States should foster an open, fair and non-discriminatory business environment, and maintain an open, secure and stable supply chain of global ICT products and services. States should take actions to prevent and put an end to activities that jeopardize personal information through the use of ICTs, and oppose mass surveillance against other States and unauthorized collection of personal information of other States with ICTs as a tool. States should encourage companies to abide by laws and regulations of the State where they operate, should not request domestic companies to store data generated and obtained overseas in their own territory, or obtain data located in other States through companies or individuals without other States' permission. ICT products and services providers should abide by laws and regulations of the State where they operate, not install backdoors in their products and services to illegally obtain users' data, control or manipulate users' systems and devices. ICT companies should not seek illegitimate interests by taking advantage of users' https://www.fmprc.gov.cn/mfa_eng/wjb_663304/zzjg_663340/jks_665232/kjlc_665236/qtwt_665250/202110/t20211020_9594981.html Page 1 of 2

Select target paragraph3