ILMA Compoundings - August 2020 - 16
INDUSTRY RUNDOWN
International Insight
China Cybersecurity Impact: Hong Kong in
the Crosshairs
By James Eggenschwiler
As mentioned in a Compoundings article earlier this year,
China began enforcement of its new cybersecurity law
on Dec. 1, 2019. Since that time, Chinese government officials in Beijing have extended the applicability of that
law to Hong Kong. In concert with this extension, Beijing
has also become confrontational with Hong Kong and
its citizens and has added new restrictions against privacy rights and personal conduct, as well as a new law
authorizing extradition of violators to mainland China
government authorities.
In addition to the threat and risks to U.S. businesses that
operate in mainland China, this recent aggressive posture by
Beijing is precipitating new risks and consequences to U.S.
businesses operating in Hong Kong as well, particularly in
light of the most recent nature of threatened U.S. response.
CHINA'S CYBERSECURITY AND ENTITIES LAWS
Beginning Dec. 1, 2019, this new law made all computer
servers in China open to surveillance and data mining by
the Chinese government. The combination of this new law
with the new Chinese Foreign Vested Entities Law expands
Beijing's surveillance capability and authority to all businesses and individuals in mainland China. This latter law
removed the status difference previously enjoyed by U.S.
and other foreign-owned companies (including subsidiaries
and joint ventures) and made them subject to the same legal
requirements as Chinese-owned companies.
The combined impact of these two new laws redefines
personal and business life in Hong Kong. It strongly
suggests that U.S. and other foreign businesses in Hong
Kong will be required to allow Communist Party representation in board meetings and management meetings. It also
implies that all businesses and individuals must reveal all
information requested to inquiring authorities, even if it is
otherwise confidential.
In addition, all IT servers of U.S. and other foreign
businesses may become subject to search (on-site or
16
AUGUST 2020
| COMPOUNDINGS | ILMA.ORG
remotely) without notice. Because the cybersecurity law
permits government surveillance at the Chinese server level,
this necessarily jeopardizes the security of information
maintained outside of mainland China that has connectivity
with servers located in mainland China. With these recent
developments by Beijing extending its jurisdictional authority to include Hong Kong, the risks associated with these
new laws inherently expand to U.S. and foreign businesses
(and individuals) located in Hong Kong.
Similarly, the risks mentioned above are likely to include
the presence of mainland Chinese- and Hong Kong-owned
business locations that are situated outside of mainland China
or Hong Kong. Consequently, anyone engaged in business
transactions with Chinese or Hong Kong businesses could
face downstream risk concerning their data security.
NEW U.S. SANCTIONS RISKS
In response to Beijing's recent extension of authority over
Hong Kong, the U.S. is responding by systematically
eliminating Hong Kong's special status under U.S. law.
Defense exports to Hong Kong have been interrupted, and
Hong Kong's access to U.S. high-technology products is
now blocked. For instance, the U.S. Commerce Department
will no longer grant export license exceptions for controlled
goods intended for Hong Kong. It also appears that the sale
of all dual-use technologies and commodities to Hong Kong
businesses will be prohibited.
Also, U.S. sanctions that currently apply against China
are very likely to be applied to Hong Kong due to the
erosion of the jurisdictional separation. Be aware that the
path this could take might not involve promulgation of a
new sanction against Hong Kong. Instead, U.S. authorities
simply interpret that current U.S. sanctions against China
also apply to Hong Kong. Either way, keep in mind that
each U.S. sanction against China imposes severe penalties
on violators, but the more recent sanctions that respond to
the exportation (including unintentional) of U.S. intellectual property are particularly severe - imposing fines of up
to $1 million and imprisonment of 20 years, per violation.
http://www.ILMA.ORG
ILMA Compoundings - August 2020
Table of Contents for the Digital Edition of ILMA Compoundings - August 2020
ILMA Compoundings - August 2020 - Cover1
ILMA Compoundings - August 2020 - Cover2
ILMA Compoundings - August 2020 - 1
ILMA Compoundings - August 2020 - 2
ILMA Compoundings - August 2020 - 3
ILMA Compoundings - August 2020 - 4
ILMA Compoundings - August 2020 - 5
ILMA Compoundings - August 2020 - 6
ILMA Compoundings - August 2020 - 7
ILMA Compoundings - August 2020 - 8
ILMA Compoundings - August 2020 - 9
ILMA Compoundings - August 2020 - 10
ILMA Compoundings - August 2020 - 11
ILMA Compoundings - August 2020 - 12
ILMA Compoundings - August 2020 - 13
ILMA Compoundings - August 2020 - 14
ILMA Compoundings - August 2020 - 15
ILMA Compoundings - August 2020 - 16
ILMA Compoundings - August 2020 - 17
ILMA Compoundings - August 2020 - 18
ILMA Compoundings - August 2020 - 19
ILMA Compoundings - August 2020 - 20
ILMA Compoundings - August 2020 - 21
ILMA Compoundings - August 2020 - 22
ILMA Compoundings - August 2020 - 23
ILMA Compoundings - August 2020 - 24
ILMA Compoundings - August 2020 - 25
ILMA Compoundings - August 2020 - 26
ILMA Compoundings - August 2020 - 27
ILMA Compoundings - August 2020 - 28
ILMA Compoundings - August 2020 - 29
ILMA Compoundings - August 2020 - 30
ILMA Compoundings - August 2020 - 31
ILMA Compoundings - August 2020 - 32
ILMA Compoundings - August 2020 - 33
ILMA Compoundings - August 2020 - 34
ILMA Compoundings - August 2020 - 35
ILMA Compoundings - August 2020 - 36
ILMA Compoundings - August 2020 - Cover3
ILMA Compoundings - August 2020 - Cover4
https://www.nxtbook.com/ygsreprints/ILMA/G127535ILMA_vol71_no7
https://www.nxtbook.com/ygsreprints/ILMA/G126213ILMA_vol71_no6
https://www.nxtbook.com/ygsreprints/ILMA/G125546_ILMA_vol71_no5
https://www.nxtbook.com/ygsreprints/ILMA/G124996_ILMA_vol71_no4
https://www.nxtbook.com/ygsreprints/ILMA/G123886_ILMA_vol71_no3
https://www.nxtbook.com/ygsreprints/ILMA/G123315_ILMA_vol71_no2
https://www.nxtbook.com/ygsreprints/ILMA/G122980_ILMA_vol71_no1
https://www.nxtbook.com/ygsreprints/ILMA/G121540_ILMA_vol70_no11
https://www.nxtbook.com/ygsreprints/ILMA/G120882_ILMA_vol70_no10
https://www.nxtbook.com/ygsreprints/ILMA/G120035_ILMA_vol70_no9
https://www.nxtbook.com/ygsreprints/ILMA/G121XXX_ILMA_vol70_no8
https://www.nxtbook.com/ygsreprints/ILMA/G120XXX_ILMA_vol70_no7
https://www.nxtbook.com/ygsreprints/ILMA/G119XXX_ILMA_vol70_no6
https://www.nxtbook.com/ygsreprints/ILMA/G118112_ILMA_vol70_no5
https://www.nxtbook.com/ygsreprints/ILMA/G117382_ILMA_vol70_no4
https://www.nxtbook.com/ygsreprints/ILMA/G116888_ILMA_vol70_no3
https://www.nxtbook.com/ygsreprints/ILMA/G115555_ILMA_vol70_no2
https://www.nxtbook.com/ygsreprints/ILMA/G114774_ILMA_vol70_no1
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no12
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no11
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no10
https://www.nxtbook.com/ygsreprints/ILMA/g109884_ILMA_vol69_no9
https://www.nxtbook.com/ygsreprints/ILMA/g109284_ILMA_vol69_no8
https://www.nxtbook.com/ygsreprints/ILMA/g108494_ILMA_vol69_no7
https://www.nxtbook.com/ygsreprints/ILMA/g107507_ILMA_vol69_no6
https://www.nxtbook.com/ygsreprints/ILMA/g106483_ILMA_vol69_no5
https://www.nxtbook.com/ygsreprints/ILMA/g105803_ILMA_vol69_no4
https://www.nxtbook.com/ygsreprints/ILMA/g104743_ILMA_vol69_no3
https://www.nxtbook.com/ygsreprints/ILMA/g103647_ILMA_vol69_no2
https://www.nxtbook.com/ygsreprints/ILMA/g102869_ILMA_vol69_no1
https://www.nxtbook.com/ygsreprints/ILMA/g101930_ILMA_vol68_no12
https://www.nxtbook.com/ygsreprints/ILMA/g100836_ILMA_vol68_no11
https://www.nxtbook.com/ygsreprints/ILMA/g99200_ILMA_vol68_no10
https://www.nxtbook.com/ygsreprints/ILMA/g98468_ILMA_vol68_no9
https://www.nxtbook.com/ygsreprints/ILMA/g97711_ILMA_vol68_no8
https://www.nxtbook.com/ygsreprints/ILMA/G96767ILMA_vol68_no7
https://www.nxtbook.com/ygsreprints/ILMA/G95397ILMA_vol65_no6
https://www.nxtbook.com/ygsreprints/ILMA/G94323ILMA_vol68_no5
https://www.nxtbook.com/ygsreprints/ILMA/G93127_ILMA_vol69_no4
https://www.nxtbook.com/ygsreprints/ILMA/G91785_ILMA_vol68_no3
https://www.nxtbook.com/ygsreprints/ILMA/G90956_ILMA_vol68_no2
https://www.nxtbook.com/ygsreprints/ILMA/G89146_ILMA_vol68_no1
https://www.nxtbook.com/ygsreprints/ILMA/G87981_ILMA_vol67_no12
https://www.nxtbook.com/ygsreprints/ILMA/G85409_ILMA_vol67_no11
https://www.nxtbook.com/ygsreprints/ILMA/G83595_ILMA_vol67_no10
https://www.nxtbook.com/ygsreprints/ILMA/G81672_ILMA_vol67_no9
https://www.nxtbook.com/ygsreprints/ILMA/G80238_ILMA_vol7_no8
https://www.nxtbook.com/ygsreprints/ILMA/G79388_ILMA_vol7_no7
https://www.nxtbook.com/ygsreprints/ILMA/G78361_ILMA_vol7_no6
https://www.nxtbook.com/ygsreprints/ILMA/G77448_ILMA_vol7_no5
https://www.nxtbook.com/ygsreprints/ILMA/G75899_ILMA_vol67_no4
https://www.nxtbook.com/ygsreprints/ILMA/G75036_ILMA_vol67_no3
https://www.nxtbook.com/ygsreprints/ILMA/G72720_ILMA_vol67_no2
https://www.nxtbook.com/ygsreprints/ILMA/G72220_ILMA_vol67_no1
https://www.nxtbook.com/ygsreprints/ILMA/G70970_ILMA_vol66_no12
https://www.nxtbook.com/ygsreprints/ILMA/G69813_ILMA_vol66_no11
https://www.nxtbook.com/ygsreprints/ILMA/G67522_ILMA_vol66_no10
https://www.nxtbook.com/ygsreprints/ILMA/G66343_ILMA_vol66_no9
https://www.nxtbook.com/ygsreprints/ILMA/G64859_ILMA_vol66_no8
https://www.nxtbookmedia.com