2020
DOI: 10.1365/s43439-020-00007-2
|View full text |Cite
|
Sign up to set email alerts
|

The institutional logic of security assessment of cross-border data transfers in China: context and progress

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…The CL clarifies the principle of "cyberspace sovereignty" and further establishes rules for the cross-border transfer of critical information infrastructure's crucial data (The NPC Standing Committee 2016). More specifically, it first introduces the concept of "important data", as well as attempts to define the scope and specific catalogue in the context of "critical infrastructure operators providing data abroad" (Hong 2020).…”
Section: Institutionsmentioning
confidence: 99%
“…The CL clarifies the principle of "cyberspace sovereignty" and further establishes rules for the cross-border transfer of critical information infrastructure's crucial data (The NPC Standing Committee 2016). More specifically, it first introduces the concept of "important data", as well as attempts to define the scope and specific catalogue in the context of "critical infrastructure operators providing data abroad" (Hong 2020).…”
Section: Institutionsmentioning
confidence: 99%