Cybersecurity Law of the People's Republic of China

Chinese policymakers became increasingly concerned about the risk of cyberattacks following the 2010s global surveillance disclosures by Edward Snowden, which demonstrated extensive United States intelligence activities in China.

[4]: 129  The Cybersecurity Law was part of China's response following policymakers' heightened concerns of foreign surveillance and data collection after these disclosures.

Article 28: Network operators shall provide technical support and assistance to public security organs and national security organs that are safeguarding national security and investigating criminal activities in accordance with the law.Article 35 is targeted at purchases of foreign software or hardware by government agencies or other "critical information infrastructure operators", requiring any hardware of software purchased to undergo review by agencies such as China's SCA or State Cryptography Administration, potentially involving the provision source codes and other sensitive proprietary information to government agencies paving the way state theft of intellectual property or transmission to domestic competitors.

Article 35: Critical information infrastructure operators purchasing network products and services that might impact national security shall undergo a national security review organized by the State cybersecurity and informatization departments and relevant departments of the State Council.The law establishes stringent data localization requirements.

For different types of illegal conduct, the law sets a variety of punishments, such as fines, suspension for rectification, revocation of permits and business licenses, and others.

[16] Along with the Great Firewall, restrictions stipulated in the law have raised concerns, especially from foreign technology companies operating in China.

[17] Regarding the requirements for spot-checks and certifications, international law firms have warned that companies could be asked to provide source code, encryption, or other crucial information for review by the authorities, increasing the risk of intellectual property theft, information being lost, passed on to local competitors, or being used by the authorities themselves.

[25] The law forces foreign technology and other companies operating within China to either invest in new server infrastructure in order to comply with the law or partner with service providers such as Huawei, Tencent, or Alibaba, which have already have server infrastructure on the ground, saving capital expenditure costs for companies.

The law is widely seen to be in line with 12th Five-Year Plan (2011–2015) which aims to create domestic champions in industries such as cloud computing and big data processing.

Activists have argued this policy dissuades people from freely expressing their thoughts online, further stifling dissent by making it easier to target and surveil dissidents.