enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Cybersecurity Law of the People's Republic of China - Wikipedia

    en.wikipedia.org/wiki/Cybersecurity_Law_of_the...

    [4]: 129 The Cybersecurity Law was part of China's response following policymakers' heightened concerns of foreign surveillance and data collection after these disclosures. [4]: 250 This law was enacted by the Standing Committee of the National People's Congress on November 7, 2016, and was implemented on June 1, 2017. [5]

  3. Cryptography law - Wikipedia

    en.wikipedia.org/wiki/Cryptography_law

    On 26 October 2019, the Standing Committee of the National People's Congress promulgated the Cryptography Law of the People's Republic of China. This law went into effect at the start of 2020. [25] [26] The law categorizes cryptography into three categories: [25] [26] Core cryptography, which is a state secret and suitable for information up to ...

  4. Data Security Law of the People's Republic of China - Wikipedia

    en.wikipedia.org/wiki/Data_Security_Law_of_the...

    The law is seen to be primarily targeted at technology companies which have grown increasingly powerful in China over the years. [1] The law is part of a series of interlocking but related national security legislation including the National Security Law of the People's Republic of China, Cybersecurity Law and National Intelligence Law, passed ...

  5. Electronic signatures and law - Wikipedia

    en.wikipedia.org/wiki/Electronic_signatures_and_law

    Electronic Signature Law of the People's Republic of China (Chinese/English) - The stated purposes include standardizing the conduct of electronic signatures, confirming the legal validity of electronic signatures and safeguarding the legal interests of parties involved in such matters. This law was revised on 23 April 2019 with immediate ...

  6. SM9 (cryptography standard) - Wikipedia

    en.wikipedia.org/wiki/SM9_(cryptography_standard)

    Identity Based Cryptography is a type of public key cryptography that uses a widely known representation of an entity's identity (name, email address, phone number etc.) as the entity's public key. This eliminates the need to have a separate public key bound by some mechanism (such as a digitally signed public key certificate) to the identity ...

  7. National Administration of State Secrets Protection - Wikipedia

    en.wikipedia.org/wiki/National_Administration_of...

    The National Administration of State Secret Protection (Chinese: 国家保密局; pinyin: Guójiā Bǎomì Jú) of the People's Republic of China is an institution of the State Council of the People's Republic of China that is responsible for the protection of classified information. [1]

  8. List of statutes of China - Wikipedia

    en.wikipedia.org/wiki/List_of_statutes_of_China

    Laws Voting results (Yea / Nay / Abstain) Amendment(s) 8 November 1988: Wild Animal Conservation Law: 2004, 2009, 2016, 2018 7 September 1990: Law on the Protection of the Rights and Interests of Returned Overseas Chinese and the Family Members of Overseas Chinese: 2000, 2009 28 December 1990: Law on the Protection of Disabled Persons: 2008, 2018

  9. Personal Information Protection Law of the People's Republic ...

    en.wikipedia.org/wiki/Personal_Information...

    The law, which took effect on November 1, 2021, applies to the activities of handling the personal information of natural persons within the borders of the China. In comparison to countries in the West, China has developed its privacy laws over time at a slower pace.