Personal Information Protection in China

advertisement
Personal Information Protection in China Recent Development of the Chinese Civil and
Criminal Cases
Prepared for The Third Asian Privacy Scholars Network Conference, Faculty
of Law, UHK, 8-9 July, 2013
Dr George Tian
Senior Lecturer, Faculty of Law
University of Technology Sydney (UTS)
Email: George.Tian@uts.edu.au
Structure
 Part I: Overview of Personal Information Protection Laws in China
 Part II: Recent Cases on Personal Information Protection in China
 2.1. Recent Development of the Chinese Civil Cases
 2.2. Recent Development of the Chinese Criminal Cases
 Part III: Challenges & Recommendations
 3.1. Challenges of protecting personal information in China
 3.2. Suggestions for future Legal Reform
Part I: Overview of the Personal Information
Protection Regime in China
 1.1. General Feature
 1.2. Existing Laws and regulations
 1.3. Comments and Remarks
1.1. General Feature
 China is still in the process of establishing
 a comprehensive legal framework to regulate the use and
disclosure of personal data
 not currently have
 a national level law that delineates how a company can legally
collect, process and retain personal data.
 “The country’s information protection regime consists of a
patchwork of
 sector-specific laws and guidelines,
 stand-alone provisions in broader laws, and
 regional laws”.
 --- (Cave, 2013)
1.1. General Feature
 But … it seems that such a situation is changing
gradually….
 New Efforts of Harmonization
 Particularly in the recent two or three years, China made a
good progress in harmonizing its personal data protection
laws.
 E.g. making law, regulations and guidelines for protecting
personal information protection on the Internet
 E.g. MIIT Guideline 2013 (more details will be discussed later)
 Draft of Personal Information Protection Law (since 2005)
1.2. Existing Personal Data Protection Rules in China
1. Constitution Law
Articles
38 and 40
Rights that relate to privacy, e.g.
- right of dignity of the person,
- prohibitions against insult, defamation,
false accusation or false information
directed against Chinese citizens, and
- right of freedom and secrecy of
correspondence.
2. Civil Law
Article 120
the
General
Principles
of the Civil
Law
protect a citizen’s right of
- personal name,
- portrait,
- reputation or honor.
6
6
Existing Personal Data Protection Rules in China
3. Criminal Law
(7th Amendment)
Article
253
(1) make working personnel of state agencies, or of
organizations in particular industry sectors,
potentially subject to criminal liability,
- if they sell or illegally provide to other persons
individual information of citizens obtained
- during the course of such organization’s
performance of official duties or provision of
services.
(2) An organization and its responsible officers could
also be made subject to the same criminal liability,
- if it obtains information that had been
misappropriated in this way.
7
7
Existing Personal Data Protection Rules in China
4. Tort Liability Law 2009
(effective on July 1st,
2010)
5. Interpretation of the
Supreme People’s Court
on Issues regarding the
Ascertainment of Liability
for Compensation for
Psychological Damages in
Civil Torts
Articles 2,
6, 3, 15, 36,
61, 62
contains provisions which establish
a right of a private citizen to sue for
damages or other remedies in tort,
- in cases where medical records
are mishandled and
- in cases where the internet is
used to harm the interests of the
private citizen or, more generally,
- in cases where the private
citizen’s right of privacy, health,
name, reputation, honor or
portrait has been infringed upon
and damages have occurred
protect an individual’s rights of
personality, including an
individual’s privacy,
- by granting a right to claim for
psychological damages.
8
8
Existing Personal Data Protection Rules in China
6 The Guidelines for
Payment and Clearing
Organizations on Antimoney Laundering and
Anti-terrorist Financing
2009
(issued by the People’s
Bank of China)
7 Interim Measures for the
Administration of the
Basic Data of Individual
Credit Information 2005
(issued by the People’s
Bank of China)
require payment and clearing organizations and
their branches
- to establish internal control systems to prevent
money laundering and terrorist financing, and
- to establish systems for the ascertainment of
client identities, for the reporting of suspicious
transactions, and for the preservation of client
identity and transaction records..
prohibit governmental authorities and other
organizations, as well as their staff, from
disclosing personal information which they may
obtain in the course of their work.
Violators will be subject to administrative
punishment and civil compensation.
9
9
Existing Personal Data Protection Rules in China
8.
The Norms for Electronic
Medical Records of
Traditional Chinese
Medicine (for Trial
Implementation) 2010
(issued by the State
Administration of
Traditional Chinese
Medicine)
9.
The Basic Norms for
Electronic Medical Records
2010
(issued by the Ministry of
Health)
require medical organizations to
- set up information security schemes for
electronic medical records and
- establish corresponding powers for doctors,
nurses and other management staff in the
hospital to read, copy, and type electronic
medical records, and
require hospitals to establish usage records for the
electronic medical records.
prohibit any entity or individual from reading or
copying electronic medical records without due
authorization.
prohibit unauthorized review of patients’ medical
records
- by other institutions and persons besides the
medical personnel that perform the medical
activity and quality control personnel.
[Exemption]
permit the review of medical records, after
obtaining consent of the medical institution, for the
10
purpose10of scientific research and education.
Existing Personal Data Protection Rules in China
10. Social Insurance Law 2010
prohibit governmental authorities and other
organizations, as well as their staff, from disclosing
personal information which they may obtain in the
course of their work.
Violators will be subject to administrative
punishment and civil compensation.
11. The Provisions on the
Management of Social
Insurance Records (for Trial
Implementation) 2009
(issued by the Ministry
of Human Resources and
Social Insurance and State
Archives Administration)
require
- that social insurance records, including medical
insurance records, comply with applicable
requirements on storage, confidentiality, use,
transfer, validation, and destruction of archives,
- that they be stored properly, and
- that damage to or destruction, loss, and
disclosure of social insurance records be
prevented.
11
11
Existing Personal Data Protection Rules in China
10.
MIIT Regulation of December 2011 (effective 15 March
2012) - ‘Several Regulations on Standardizing Market Order
for Internet Information Services’
11. The Decision of the Standing Committee of the National
People’s Congress on Strengthening Information Protection
on Nation Network – December 28, 2012
12 MIIT Guidelines for Personal Information Protection within
Public and Commercial Services Information Systems (2013)
Sectorial and Provincial Laws..
Administrative Laws and regulations…
12
12
China’s internet Laws & Regulations
PKU Report 2011 – Existing Internet Laws in China
 Group 1: Laws on Internet: 2
 Decision of the Standing Committee of the National People’s
Congress on the Internet Security 2000
 Digital Signature Law 2004
 Group 2: Other laws related to Internet governance: 21
 E.g. Patent Law, Trade Mark Law, Copyright Law, et al
 Group 3: Administrative regulations & Ministerial Rules.
 Administrative regulations: 51
 Ministerial rules: 843.
China’s internet Laws & Regulations
PKU Report 2011 – Existing Internet Laws in China
 Group 4: Juridical interpretations
 E.g. digital copyright and ISP safe harbour provisions
 Group 5: Self-regulations: 46.
 After 2011….
 New Development in 2012:
 Laws on the Internet
 Decision of the Standing Committee of the National People’s
Congress on Strengthening Information Protection on Na
Network – December 28, 2012
3.2. Recent development of the personal data regulations
3.2.1. MIIT Guidelines 2013
 MIIT Guidelines for Personal Information Protection within
Public and Commercial Services Information Systems (2013)
 In theory, these voluntary guidelines are not as important as
the two regulatory instruments of 2011/12 covering part of the
same territory (primarily Internet IISPs),
 The Decision of the Standing Committee of the National People’s
Congress on Strengthening Information Protection on Nation
Network – December 28, 2012
 the MIIT Regulation of December 2011 (effective 15 March 2012) ‘Several Regulations on Standardizing Market Order for Internet
Information Services’.
3.2. Recent development of the personal data regulations
3.2.1. MIIT Guidelines 2013 - PI
 However, these 2013 Guidelines apply to a much broader
range of businesses, and
 they cover key issues (such as data exports, sensitive data, and
subject access and correction rights), and
 provide some details, not covered in the earlier instruments.
 Definition of Personal Information
1.3. Remarks: Existing Laws and regulations
 Remarks:
 The current features of the Chinese personal
information protection framework
 do affect the effective enforcement of PI protection
laws at both civil and criminal levels.
Part II: Recent Cases on Personal Information
Protection in China
 2.1. Recent Development of the Chinese Civil Cases
 2.1.1. Overviews
 2.1.2. Civil Case – Mr Guo vs Minsheng Bank
 2.2. Recent Development of the Chinese Criminal Cases
 2.2.1. Overview & Statistics
 2.2.2. Criminal Case against Individual - China vs. Xu [2013]
 2.2.3. Criminal Case against Company - China vs. Shanghai
XX IT Company [2013]
 2.2.4. Progress vs. Uncertainty
2.1. Recent Development of the Chinese Civil Cases
2.1.1. Overview
 “The country’s information protection regime consists of a
patchwork of
 sector-specific laws and guidelines,
 stand-alone provisions in broader laws, and
 regional laws”.
 --- (Cave, 2013)
 Challenges to the Courts
 Civil Law Code
 Laws/regulations/guideline at different levels
2.1. Recent Development of the Chinese Civil Cases
2.1.2. Guo vs. Minsheng Bank [2012]
 Case: Tort of Privacy Invasion by Bank
 Mr. Guo, a citizen in Nanjing (Capital city of Jiangshu Province) sued the
Minsheng Bank in the Nangjing Xuanwu District Court in 2012.
 The Court held that the bank’s conducts constitute the tort of privacy
invasion.
 Mr Guo was a former Credit Card users of the Minsheng Bank Nanjing
Branch.
 But, in May 2011, he surprisingly discovered that, although he got his
Minsheng credit card cancelled, without his authorization, the Minsheng
Bank, has twice investigated his personal credit information from the
Nanjing Branch of the People's Bank of China (his current bank) under the
names of credit card approval and loan approval in 2010 and in 2011
respectively.
2.1. Recent Development of the Chinese Civil Cases
2.1.2. Guo vs. Minsheng Bank [2012]
 Case: Tort of Privacy Invasion by Bank
 The explanation given by the Minsheng Bank Nanjing Branch was that the
bank is conducting “2nd Round customer development”.
 Mr. Guo did not accept this explanation, and filed a Complaint to the
Management Division of the People’s Bank Nanjing Branch.
 In December 2011, after investigation, the People’s Bank Nanjing Branch
found that Minsheng bank indeed inspected the credit record of Mr. Guo
without his authorization.
 According to the Interim Measures for the Administration of the Basic Data of
Individual Credit Information 2005 (issued by the People’s Bank of China),
 It imposed 20,000 CNY (3,278 USD) monetary penalty to Minsheng Bank.
2.1. Recent Development of the Chinese Civil Cases
2.1.2. Guo vs. Minsheng Bank [2012]
 Case: Tort of Privacy Invasion by Bank
 Mr. Guo believed that the conducts of the Minshen Bank infringed his
privacy right, and initiated a civil litigation against Minshen Bank in the
Nanjing Xuanwu District Court, and asked the bank to make a written
apology on Newspapers.
 In March 2012, the Xuanwu district court made a decision in favour of Mr.
Guo, and requested the Minsheng Bank Nanjing Branch to make a written
apology to Guo.
2.1. Recent Development of the Chinese Civil Cases
2.1.2. Guo vs. Minsheng Bank [2012]
 Hints from this Case: Tort of Privacy Invasion by Bank
 Enforcement Agencies
 The People’s Bank Nanjing Branch
 Nanjing Xuanwu District Court
 Relevant Laws and regulations:
 Civil Law
 Civil Tort of Liability Law
 Interim Measures for the Administration of the Basic Data of Individual Credit
Information 2005 (issued by the People’s Bank of China)
2.2. Recent Development of the Chinese Criminal Cases
2.2.1. Overview & Statistics
 Criminal Law (7th Amendment 2009)
 Crime of selling Personal Information of Citizens
 Crime of illegally providing Personal Information of Citizens
 Crime of illegally obtaining Personal Information of Citizens
 Based on the information provided by the Public Prosecutate of
Beijing Haidian District,
 In 2010, they handled 31 cases (41 people involved), which were
related to a breach of the Criminal Law for illegally obtaining to
Personal Information of Citizens.
 VII. An Article is inserted after Article 253 of the Criminal Law as Article
253 (A):
 “Where any staff member of a state organ or an entity in such a field as
finance, telecommunications, transportation, education or medical
treatment, in violation of the state provisions, sells or illegally provides
personal information on citizens, which is obtained during the organ’s
or entity’s performance of duties or provision of services, to others
shall, if the circumstances are serious, be sentenced to fixed-term
imprisonment not more than three years or criminal detention, and/or
be fined.
 Whoever illegally obtains the aforesaid information by stealing or any
other means shall, if the circumstances are serious, be punished under
the preceding paragraph.
 Where any entity commits either of the crimes as described in the
preceding two paragraphs, it shall be fined, and the direct liable person
in charge and other directly liable persons shall be punished under the
applicable paragraph.”
2.2. Recent Development of the Chinese Criminal Cases
2.2.1. Overview & Statistics
 Key Features of this type of criminal cases:
 1. Measures of Crime – Online trading
 20 of 31 cases happened on the Internet – 64.5% of the total cases




Step 1: Buyers search online via Baidu or Google to find Sellers
Step 2: Join in special QQ Group
Step 3: communicate via QQ or Emails
Step 4: Bank transfer and Data Transfer
 7 of 31 cases – face-to-to trading – 22.5%
2.2. Recent Development of the Chinese Criminal Cases
2.2.1. Overview & Statistics
Measures of Crime
Via the Internet
Face-to-Face
Others
2.2. Recent Development of the Chinese Criminal Cases
2.2.1. Overview & Statistics
 Key Features of this type of criminal cases:
 …
 2. Purpose of Crimes – Expand their market & sell for money
 26 of 41 people used the obtained personal information for
marketing purposes – 63.4%
 14 of 41 is for selling to others – 34.1%.
2.2. Recent Development of the Chinese Criminal Cases
2.2.1. Overview & Statistics
Purposes of Crime
Marketing
purposes
Re-selling
purpose
Others
2.2. Recent Development of the Chinese Criminal Cases
2.2.1. Overview & Statistics
 Key Features of this type of criminal cases:
 …
 3. Targeted Information




Car owner information – 15 of 31 cases – 48.3%
Bank customer information – 10 of 31 cases – 32.2%
Company CEO – 5 of 31 cases – 16.5%
Phone records/ID card information/shopping records – 3 * 3 - 9.6%
respectively
 Customer information of Carrier company & new-born information –
2*2 – 6.4% respectively, et al…
 In many cases, parties involved obtained multi-type information
2.2. Recent Development of the Chinese Criminal Cases
2.2.1. Overview & Statistics
Targeted Information
Car owner
information
Bank customer
information
2.2. Recent Development of the Chinese Criminal Cases
2.2.1. Overview & Statistics
 Key Features of this type of criminal cases:
 …
 4. High Risk Group – employees in marketing and insurance
sectors
 11 of 41 people - salesman – 26.8%
 5. New High Risk Group: Company leaders & private detectors
companies
 Company leaders – 10 of 31 cases (13 of 41 people) – 32.2%
 Mangers of private detectors companies – 4 of 31 cases (5/41) – 12.9%
2.2. Recent Development of the Chinese Criminal Cases
2.2.2. China vs. Xu [2013]
 Criminal Case against Individual
 Criminal Judgments by the People’s Court of Shanghai Pudong New District
 Case Number: (2013) Pu Criminal First 1087((2013)浦刑初字第1087号)
 Prosecutor: People's Procuratorate of Shanghai Pudong New District
 Defendant: Xu
 On April 1, 2013, the Prosecutor initiated a criminal litigation against the
Defendant on the ground that the Defendant breached the Criminal Law by
illegally obtaining personal information of citizens.

 On the same day, the Court filed the case and applied a summary procedure
(simplified) to this case. A single judge was appointed and the case was
concluded.
2.2. Recent Development of the Chinese Criminal Cases
2.2.2. China vs. Xu [2013]
 The Prosecutor claimed that:
 On April 25, 2012, the Defendant Xu spent 500 Yuan (around 80 USD),
and purchased more than one million pieces of Customer Order
Information of the “No.1 Store” site - personal information of citizens –
from Zhang (handled separately) via the Internet.
 On November 23, 2013, the Defendant Xu was arrested and confessed all
above facts.
 The Defendant Xu has indicated no objection to the facts that the
Prosecutor claimed above in the court proceeding.
2.2. Recent Development of the Chinese Criminal Cases
2.2.2. China vs. Xu [2013]
 The Court also took into account the evidences, such as:
 - Testimonies made by Witness Wang and Witness Zhang
 - QQ Screenshots,
 - Chat records
 - Alipay transaction records (Chinese PayPal)
 - the list of seized items,
 - and other evidences.
 ‘The Court found that the Defendant Xu illegally obtained personal
information of citizens, and the circumstances are serious. As such,
his conducts constituted a breach of the Criminal Law.’
2.2. Recent Development of the Chinese Criminal Cases
2.2.2. China vs. Xu [2013]
 ‘The Court upheld the claims made by the Prosecutor.
 By virtue of Article 253 (1)(2), Article 67(3), Article 72, Article
73(2)(3) and Article 53 of the Criminal Law, the Court made a
judgment as follows:
 Defendant Xu beached the provision of illegally obtaining to
personal information of citizens, and
 was sentenced to six months imprisonment, suspended for
one year (probation) and
 a monetary penalty of one thousand Yuan (around 163 USD)
applied.’
 上海市浦东新区人民法院 刑事判决 (2013)浦刑初字第1087号
被告人徐某,因本案于2012年11月23日被刑事拘留,同年12月21日被逮捕,2013年1月29日被上海市公安局浦东
分局取保候审,同年3月22日被上海市浦东新区人民检察院取保候审。
辩护人赵振华,上海市世通律师事务所
律师。
上海市浦东新区人民检察院以沪浦检刑诉〔2013〕969号起诉书指控被告人徐某犯非法获取公民个人信
息罪,于2013年4月1日向本院提起公诉。本院于同日立案并依法适用简易程序,实行独任审判,公开开庭审理了本
案。上海市浦东新区人民检察院指派代理检察员席娜出庭支持公诉,被告人徐某及其辩护人赵振华到庭参加诉讼。
现已审理终结。
上海市浦东新区人民检察院指控,2012年4月25日,被告人徐某在互联网上从张某某(另案处
理)处,以人民币500元的价格购得一号店网站100余万条(以收货人姓名为关键项去除重复处理后共计28万余条)
订单信息数据的公民个人信息。
2013年11月23日,被告人徐某被公安机关抓获,到案后如实供述了上述犯罪事
实。
上述事实,被告人徐某在开庭审理过程中亦无异议,并有经庭审质证属实的证人王某某、张某某的证
言,QQ截屏图片、聊天记录、支付宝交易记录,扣押物品清单,公安机关出具的案发经过及工作情况,被告人徐
某的户籍资料等证据证实,足以认定。
本院认为,被告人徐某非法获取公民个人信息,情节严重,其行为已
构成非法获取公民个人信息罪。公诉机关指控的事实及罪名成立,予以支持。被告人徐某到案后能如实供述并自愿
认罪,系坦白,依法从轻处罚。依照《中华人民共和国刑法》第二百五十三条之一第一、二款、第六十七条第三
款、第七十二条、第七十三条第二、三款、第五十三条之规定,判决如下:
被告人徐某犯非法获取公民个人
信息罪,判处有期徒刑六个月,缓刑一年,罚金人民币一千元。
(缓刑考验期限,自判决确定之日起计算;
罚金自判决生效后一个月内缴纳。)
被告人徐某回到社区后,应当遵守法律、法规,服从监督、管理,接受
教育,参加公益劳动,做一名有益于社会的公民。
如不服本判决,可在接到判决书的第二日起十日内,通过
本院或者直接向上海市第一中级人民法院提出上诉。书面上诉的,应当提交上诉状正本一份,副本二份。
代理审判员 师坤鹏

二〇一三年四月十八日

书记员
陆玮
2.2. Recent Development of the Chinese Criminal Cases
2.2.3. China vs. Shanghai XX Information Technology Company
[2013]
 Criminal Case against Company
 Criminal Judgments by the People’s Court of Shanghai Pudong New District
 Case Number: (2013) Pu Criminal First 864((2013)浦刑初字第864号)
 Prosecutor: People's Procuratorate of Shanghai XX District
 Defendants: Shanghai XX Information Technology Company (referred to XX
company); Legal Representative: Bai XX.
 On March 13, 2013, the Prosecutor initiated a criminal litigation against the
Defendant on the ground that the Defendant breached the Criminal Law by
illegally obtaining personal information of citizens.

 The Court filed the case and applied a (simplified) summary procedure to
this case. A single judge was appointed and the case was concluded.
2.2. Recent Development of the Chinese Criminal Cases
2.2.3. China vs. Shanghai XX IT Company [2013]
 The Prosecutor claimed that:
 In July 2012, in order to expand the Company’s market, the Defendant
Bai authorized Zuo (handled separately), the Manger of the Marketing
Division of the Company, to purchase more than one million pieces of
Customer Order Information - personal information of citizens – from Liu
(handled separately) at the price of 900 Yuan (around 146 USD) via the
Internet.
 On February 21, 2013, the Defendant Bai went to the Public Security
authority and make a voluntary confession.
 The Defendants, XX Company and Bai, have indicated no objection to the
facts that Prosecutor claimed above in the Court proceeding.

2.2. Recent Development of the Chinese Criminal Cases
2.2.3. China vs. Shanghai XX IT Company [2013]
 The Court has also taken into account the evidences, such as:
 - Alipay transaction screenshot (Chinese PayPal)
 - Relevant invoices
 - Testimony by Witness Cui
 - Testimonies by related parties Zuo and Liu
 the list of seized items,
 - and other evidences.
2.2. Recent Development of the Chinese Criminal Cases
2.2.3. China vs. Shanghai XX IT Company [2013]
 ‘The Court found that the Defendants, XX Company and Bai, illegally
obtained personal information of citizens, and the circumstances were
serious.
 The conducts of Bai, who was directly in charge of personnel of the
Company, has constituted a breach of the Criminal Law.
 Given that the XX Compand and Bai voluntarily confessed to the Public
Security Authority and pleaded guilty in the Court, by virtues of
relevant laws, the Court decided to apply a lighter punishment.’
2.2. Recent Development of the Chinese Criminal Cases
2.2.3. China vs. Shanghai XX IT Company [2013]
 By virtue of Article 253 (1), Article 67(1), Article 72(1)(3), Article
73(2)(3) and Article 53 of the Criminal Law, the Court made a
judgment as follows:
 1. Defendant XX Company beached the provision of illegally
obtaining to personal information of citizens, and needs to
pay a monetary penalty of 30,000 Yuan (around 5,000 USD).
 2. Defendant BAI beached the provision of illegally obtaining
personal information of citizens, and was sentenced to six
months imprisonment, suspended for one year and a
monetary penalty of 10,000 Yuan (around 1,630 USD).

 Judge Ling Hong
 March 21, 2013
 VII. An Article is inserted after Article 253 of the Criminal Law as Article
253 (A):
 “Where any staff member of a state organ or an entity in such a field as
finance, telecommunications, transportation, education or medical
treatment, in violation of the state provisions, sells or illegally provides
personal information on citizens, which is obtained during the organ’s
or entity’s performance of duties or provision of services, to others
shall, if the circumstances are serious, be sentenced to fixed-term
imprisonment not more than three years or criminal detention, and/or
be fined.
 Whoever illegally obtains the aforesaid information by stealing or any
other means shall, if the circumstances are serious, be punished under
the preceding paragraph.
 Where any entity commits either of the crimes as described in the
preceding two paragraphs, it shall be fined, and the direct liable person
in charge and other directly liable persons shall be punished under the
applicable paragraph.”
2.2. Recent Development of the Chinese Criminal Cases
2.2.4. Remarks: Progress vs. Uncertainty
 Progress:
 The new amendment started to be well enforced.
 Uncertainty:
 Lack of a clear definition of “personal information”
 The meaning of “state provisions”
 The meaning of “if the circumstances are serious”/ “severe
consequence”
 Next, BACK to the issues at the national level…
Part III: Challenges & Recommendations
 3.1. General Challenges of protecting personal data in China
 3.1.1. Hints from 2013 BSA Global Cloud Computing Scorecard
 Ranking improved
 Lack of laws and industrial rules
 3.1.2. Challenges from Legal Tradition
 3.2. Suggestions for future reform
 3.2.1. Three models: US, EU and Australia
 3.2.2. Enforcement Agencies
3.1. General Challenges
3.1.1. Hints from 2013 BSA Global Cloud Computing Scorecard
 The BSA survey examined the policy environment for
CC in several countries around the world.
 The BSA survey examined 24 countries, which
together account for 80 percent of the global ICT
market.
 The BSA Scorecard Measuring CC Readiness
2013 BSA Global Cloud Computing Scorecard
 The BSA Scorecard Measuring CC Readiness
 It examines major laws and regulations relevant to CC in
seven policy categories as well as each country’s ICTrelated infrastructure and broadband deployment.





1. Data Privacy
2. Security
3. Cybercrime
4. IPRs
5. Support for Industry-Led Standards & International
Harmonization of Rules
 6. Promoting Free Trade
 7. ICT Readiness, Broadband Deployment.
3.1. General Challenges
3.1.1. Hints form 2013 BSA Global CC Scorecard
 China’s Ranking
 +2 (in comparison with 2011)
 19th of 24
 Screen Shot 2013-07-05 at 1.08.10 PM
3.1. General Challenges
3.1.1. Hints form 2013 BSA Global CC Scorecard
 As mentioned above….
 Progress:
 Recent development – all about protecting personal
information on the Internet (rather than general protection
measures)
 Further improvements:
 Lack of the Personal Information Protection Law at the
national level
 Lack of unified privacy enforcement authority at the national
level
 Challenges for the quick growth of Innovation Industry
3.1. General Challenges
3.1.2. Challenges from Legal Tradition
 China’s overall regulatory approach may presents challenges to the
development of innovation industry, such as cloud computing.
 1. China’s preference for top-down mandatory regulation is often at
odds with the type of public-private collaboration and industry selfregulation so critical to growing new technologies.
 2. data protection and data sovereignty fears, as well as
cybersecurity concerns, are creating barriers for deployment of
leading global technologies.
 3. complicating the policy environment is China’s drive to promote
domestic industry, as well as preserve its existing market access
controls.
 (USITO, 2012)
3.2. Suggestions for future laws and policies reform
3.2.1. Three models: US, EU and Australia
 EU Model: Centralized
 US Model: Decentralized
 Australia Model: Centralized law and principles + detailed
industrial guidelines.
 Recommendation 1 – May consider drawing on lessons
from the experiences of Australian Model to harmonize
the existing laws on personal data protection
3.2. Suggestions for future laws and policies reform
3.2.2. Enforcement Agencies
 Recommendation 2:
 May consider leaving privacy cases to Intellectual Property
Courts (IP, Antitrust, Personal Information Protection)
 Recommendation 3:
 Courts may play a more active role in explaining how existing
data protection laws could be applied
 Chinese Supreme Court may issue a Guideline on this issue –
more judicial interpretations
Conclusion and Remarks
 “Based on the global opportunity that Cloud
Computing presents, each country’s policy changes
will alter not just that country’s environment but the
global market for CC as a whole.”
 (BSA, 2013)
 …. apply this idea broadly….
Conclusion and Remarks
 “Based on the global opportunity that Information
Economy presents, each country’s policy changes will
alter not just that country’s environment but the
global Information Economy as a whole.”
Acknowledgment
 Prof. Graham Greenleaf, Faculty of Law, UNSW
 Mr. Yun Xuan, Director of IP Policy and Enforcement
Division, Microsoft (China) Co., Ltd
 Ms. Sophia Wang, Director & Chief Representative, China,
BSA, The Software Alliance
Thank You !
Download