China has initiated a comprehensive campaign to remove foreign influences from its technology sectors, covering hardware like semiconductors and software and data management systems.
The issuance of Document 79 outlines a clear objective: By 2027, all foreign software in critical industries such as finance and energy must be replaced. This policy, known as “Delete America,” mandates the exclusion of American software and the systematic substitution of U.S.-manufactured microprocessors with domestic alternatives. This includes a shift from Western operating systems and databases to local versions.
These measures demonstrate China’s aim to strengthen its technological independence and ensure national security.
China also made changes to cross-border data flows regulations in March with the “Regulations to Promote and Standardize Cross-Border Data Flows,” determining procedures based on information volume and critical infrastructure. While seemingly easing restrictions for foreign companies with exemptions, these nuanced policies indicate a move towards reinforcing a self-sufficient tech economy and influencing data governance norms.
China’s technology policies are characterized by opacity and strategic ambiguity, especially in the implementation of regulations. This vagueness is seen in documents like the “Guideline for Identification of Critical Data” and the Data Security Law, causing concerns for foreign enterprises due to unclear definitions and classifications.
The U.S. Response: Strengthening Data Security and National Defense
In response to China’s aggressive tech policies, the U.S. has increased regulatory oversight and defense measures under the Biden administration. Actions include investigating foreign-manufactured technology in connected vehicles and restricting sensitive genomic data transfers to China to mitigate cyber threats and espionage risks.
National security concerns now extend to various sectors beyond traditional areas, as shown through the introduction of the BIOSECURE Act by the U.S. Congress. This legislation aims to prevent U.S. biotechnological data from reaching entities linked to the Chinese government or military.
The bipartisan support for stringent measures against Chinese tech and data practices reflects a unified stance on national security, ensuring policy continuity and stability.
Future Perspective: Global Implications and Strategic Approaches
The technology competition between the U.S. and China has global implications, setting precedents for data governance, cybersecurity, and international trade protocols. As these nations adjust their tech and data approaches, the global economic dynamics, security policies, and geopolitical landscape will be influenced.
For businesses and investors, understanding and adapting to evolving regulatory frameworks is essential. Developing compliance systems and risk management strategies is crucial to navigate the complex environment.
As China reshapes data flow, the U.S. defends its data integrity and security. The international community must stay informed and engaged, as these developments reshape geopolitics, legal frameworks, and business landscapes.
This competition highlights the need for coordinated efforts to comprehend data’s crucial role and potential disruptions if misused by malicious actors.