Skip to main content Accessibility help
×
Home

Platform Patrol: China, the United States, and the Global Battle for Data Security

  • Aynne Kokas (a1)

Extract

In Apple CEO Tim Cook's keynote speech at the Chinese government's 2017 World Internet Conference, he extolled the values of “Privacy. Security. Decency” (Apple Newsroom 2017). The last two terms, “security” and “decency,” have long been closely associated with Chinese government efforts to control the Internet. Indeed, in 2017 Apple agreed to turn over user data to Chinese government servers and start a Chinese provincial government-run data storage center. Yet in 2015, Apple refused to turn over the passcode for one user in the United States during the FBI investigation following the San Bernardino terrorist attacks. The company's different policies in the United States and China relate directly back to Apple's concern for market share and access.

  • View HTML
    • Send article to Kindle

      To send this article to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about sending to your Kindle. Find out more about sending to your Kindle.

      Note you can select to send to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be sent to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

      Find out more about the Kindle Personal Document Service.

      Platform Patrol: China, the United States, and the Global Battle for Data Security
      Available formats
      ×

      Send article to Dropbox

      To send this article to your Dropbox account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your <service> account. Find out more about sending content to Dropbox.

      Platform Patrol: China, the United States, and the Global Battle for Data Security
      Available formats
      ×

      Send article to Google Drive

      To send this article to your Google Drive account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your <service> account. Find out more about sending content to Google Drive.

      Platform Patrol: China, the United States, and the Global Battle for Data Security
      Available formats
      ×

Copyright

References

Hide All
Apple Newsroom. 2017. “Tim Cook's Remarks at the 4th World Internet Conference.” December 4. https://www.apple.com/cn/newsroom/2017/12/tim-cooks-remarks-at-the-4th-world-internet-conference-in-english/ (accessed September 28, 2018).
Arsène, Séverine. 2016. “Global Internet Governance in Chinese Academic Literature: Rebalancing a Hegemonic World Order?China Perspectives 2:2535.
Chen, Wenhong. 2018. “Big Data, Big Dream, and Big Brother: The Emergence and Growth of Chinese Big Data.” International Communication Association Preconference on Data and Publics, Prague, Czech Republic.
Congressional Research Service. 2015. US-China Cyber Agreement. Washington, D.C.: Congressional Research Service.
DiGrazia, Kevin. 2018. “Cyber Insurance, Data Security, and Blockchain in the Wake of the Equifax Breach.” Journal of Business & Technology Law 13(2):255–77.
Farrell, Maureen, and Steele, Anne. 2018. “Tencent Music Files for U.S. IPO.” Wall Street Journal, October 2. https://www.wsj.com/articles/tencent-music-files-for-u-s-ipo-1538496869 (accessed October 4, 2018).
Garamone, Jim. 2018. “President Signs Fiscal 2019 Defense Authorization Act at Fort Drum Ceremony.” US Department of Defense. https://dod.defense.gov/News/Article/Article/1601016/president-signs-fiscal-2019-defense-authorization-act-at-fort-drum-ceremony/ (accessed October 7, 2018).
Guowuyuan 国务院 [State Council of the People's Republic of China] 2015. Zhongguo Zhizao 2025 中国制造 2025 [Made in China 2025]. Beijing: Guowuyuan.
Hughes, Kent H. 2005. Building the Next American Century: The Past and Future of American Economic Competitiveness. Washington, D.C.: Woodrow Wilson Center Press.
Information Office of the State Council of the People's Republic of China. 2010. The Internet in China. White paper. Beijing: Information Office of the State Council of the People's Republic of China.
Kokas, Aynne. 2014. Building a Transparent Web in China. Baker Institute Policy Report. Houston, Tex.: Baker Institute for Public Policy.
Kokas, Aynne. 2018. “Chilling Netflix: Financialization, and the Influence of the Chinese Market on the American Entertainment Industry.” Information, Communication & Society. doi:10.1080/1369118X.2018.1510534.
Office of the United States Trade Representative, ed. 2016. U.S. Fact Sheet for the 27th U.S.-China Joint Commission on Commerce and Trade. Washington, D.C.: Office of the United States Trade Representative.
Peters, Rachael M. 2014. “So You've Been Notified, Now What? The Problem with Current Data-Breach Notification Laws.” Arizona Law Review 56(4):11711202.
Quanguo Renmin Daibiao Dahui 全国人民代表大会 [National People's Congress of the People's Republic of China]. 2016. Zhongguo Renmin Gongheguo Wangluo Anquanfa 中华人民共和国网络安全法 [People's Republic of China Cybersecurity Law]. November 7. http://www.npc.gov.cn/npc/xinwen/2016-11/07/content_2001605.htm (accessed October 11, 2018).
Reddick, Christopher G., and Zheng, Yueping. 2018. “Online Privacy Protection in Chinese City Governments: An Analysis of Privacy Statements.” In International E-Government Development: Policy, Implementation and Best Practice, eds. Muñoz, Laura Alcaide and Bolivar, Manuel Pedro Rodriguez, 99120. Cham, Switzerland: Palgrave Macmillan.
Russell, Jon. 2017. “AWS Isn't Exiting China, but Amazon Did Sell Physical Assets to Comply with Chinese Law.” TechCrunch. https://techcrunch.com/2017/11/13/aws-exits-china/ (accessed September 28, 2018).
Russell, Jon. 2018. “Apple's China iCloud Data Migration Sweeps Up International User Accounts.” TechCrunch. https://techcrunch.com/2018/01/11/apple-china-icloud-international-users/ (accessed April 14, 2018).
Schindelheim, David. 2012. “Variable Interest Entity Structures in the People's Republic of China: Is Uncertainty for Foreign Investors Part of China's Economic Development Plan?Cardozo Journal of International and Comparative Law 21:196234.
Schmidt, Michael S., and Sanger, David E.. 2014. “5 in China Army Face U.S. Charges in Cyberattacks.” New York Times, May 19. https://www.nytimes.com/2014/05/20/us/us-to-charge-chinese-workers-with-cyberspying.html (accessed September 27, 2018).
Selby, John. 2017. “Data Localization Laws: Trade Barriers or Legitimate Responses to Cybersecurity Risks, or Both?International Journal of Law and Information Technology 25(3):213–32. doi:10.1093/ijlit/eax010.
Shi, Serena Y. 2014. “Dragon's House of Cards: Perils of Investing in Variable Interest Entities Domiciled in the People's Republic of China and Listed in the United States.” Fordham International Law Journal 37:12651308.
Wortzel, Larry M. 2014. The Chinese People's Liberation Army and Information Warfare. Carlisle Barracks, Pa.: United States Army War College Press.
Yue, Clarice, Werner, Sven-Michael, Chan, Michelle, and Shi, John. 2017. “China Cybersecurity Law Update: Critical Information Infrastructure in China—Any Clarification?” Bird & Bird, February 6. https://www.twobirds.com/en/news/articles/2017/china/cyber-security-law-update-critical-information-infrastructure-in-china-any-clarification (accessed September 29, 2018).
Zhang, Cinder Xinde, and King, Tao-Hsien Dolly. 2010. “The Decision to List Abroad: The Case of ADRs and Foreign IPOs by Chinese Companies.” Journal of Multinational Financial Management 20(1):7192. doi:10.1016/j.mulfin.2010.04.001.

Keywords

Platform Patrol: China, the United States, and the Global Battle for Data Security

  • Aynne Kokas (a1)

Metrics

Altmetric attention score

Full text views

Total number of HTML views: 0
Total number of PDF views: 0 *
Loading metrics...

Abstract views

Total abstract views: 0 *
Loading metrics...

* Views captured on Cambridge Core between <date>. This data will be updated every 24 hours.

Usage data cannot currently be displayed