Chapters logo

China Announces New Cybersecurity Procurement

An examination of policy measures affecting technology purchases from specific foreign companies.

By Saad Published about 13 hours ago 4 min read



Introduction: A Policy Announcement
In April 2024, Chinese authorities announced new cybersecurity regulations. The measures were presented as part of an ongoing effort to secure the country's information technology supply chains. The policy document stated that products from specific foreign companies would be subject to stricter scrutiny. Officials cited concerns over what they termed "network security vulnerabilities." The announcement was reported by state media and noted by international news agencies.

The Official Rationale: National Security and Supply Chains
The Cyberspace Administration of China (CAC), the country's top internet regulator, released the policy. The stated goal is to protect China's critical information infrastructure from supply chain attacks. The government's position, as communicated through its channels, is that over-reliance on foreign technology creates risks. The policy frames the measures as a standard practice of national sovereignty, similar to procurement rules in other nations that restrict technology from certain foreign vendors on security grounds.

Scope and Target of the Measures
The policy does not constitute a blanket ban. It establishes a formal review process for the purchase of technology products and services intended for use in China's critical infrastructure sectors. These sectors include telecommunications, energy, finance, and transportation. The review will assess products from companies based in the United States and Israel, among others. The policy specifically mentions concerns about products from U.S. firms like Intel and AMD, and from Israeli cybersecurity company Check Point.

The Concept of "Clean" Supply Chains
This move aligns with a longer-term Chinese policy initiative often referred to as the "dual circulation" strategy. A key aspect involves fostering domestic innovation and reducing dependency on foreign technology, particularly from geopolitical rivals. The government promotes the use of "secure and controllable" Chinese-made technology in sensitive sectors. These new procurement rules are a practical enforcement mechanism for that strategic goal.

Timing and Geopolitical Context
The announcement occurs within a broader climate of technological competition. The United States has implemented its own restrictions, notably export controls on advanced semiconductors and chip-making equipment to China. The U.S. has also moved to limit the use of technology from Chinese firms like Huawei and ZTE in American networks. Analysts view China's new rules as a proportionate regulatory response, creating leverage and reducing exposure within its own market.

The U.S. and Israeli Technology Landscape
The named countries are leaders in specific high-tech sectors. U.S. companies like Intel, AMD, and Microsoft provide foundational hardware and software for global computing. Israeli firms, particularly in cybersecurity like Check Point, are world-renowned for their security products. These companies have significant market presence in China. The new rules create uncertainty for their future sales to Chinese government entities and state-owned enterprises in critical sectors.

Operationalizing the Policy: The Review Process
The policy mandates that operators of critical infrastructure must report planned procurements of covered products to the CAC. A government-led expert committee will then conduct a cybersecurity review. The review will evaluate potential risks, including the possibility of backdoors, data leakage, or disruptions caused by geopolitical events. Purchases can be blocked if deemed to pose a national security threat. The process gives the Chinese government direct oversight into key technology decisions.

Impact on Multinational Corporations
For the foreign companies named, the immediate impact is operational. They must now navigate a new layer of bureaucratic approval for a significant segment of their Chinese customer base. This may slow sales cycles and increase compliance costs. In the longer term, it incentivizes these firms to deepen partnerships with Chinese companies or establish local data and R&D centers to alleviate security concerns, a practice known as "localization."

Domestic Industry Implications
The policy is a direct benefit to Chinese technology competitors. Companies that produce domestic alternatives to foreign CPUs, operating systems, and cybersecurity software stand to gain market share. This includes firms like Huawei (Kunpeng processors, HarmonyOS), Phytium, and Deepin. The rules provide a protected customer base within the state sector, which can provide revenue to fuel further domestic research and development.

International Trade and WTO Considerations
Such procurement rules can raise questions under World Trade Organization (WTO) agreements. The WTO's Government Procurement Agreement (GPA) aims to ensure openness, fairness, and transparency in public purchasing. However, national security is widely accepted as a valid exception to these rules under Article XXI of the General Agreement on Tariffs and Trade (GATT). China's policy will likely be defended under this national security exemption, mirroring arguments used by other nations for their own restrictions.

Potential for Escalation and Response
The policy risks further tit-for-tat measures. U.S. officials have previously criticized China's cybersecurity regulations as non-transparent and protectionist. Washington could respond by further tightening its own investment or export rules. The situation underscores a trend toward the "balkanization" or splitting of the global internet and technology ecosystem into separate spheres with differing standards and preferred vendors.

Historical Precedents in Chinese Cyber Policy
This is not China's first major cybersecurity regulation. The Multi-Level Protection Scheme (MLPS) has long graded networks by their importance. The 2017 Cybersecurity Law established a broad framework for data governance and network security. The more recent Data Security Law and Personal Information Protection Law added layers of compliance. The 2024 procurement rules are a specific application within this existing legal and regulatory architecture.

The Role of Standards and Testing
A key component of enforcement will be the establishment of Chinese national standards for cybersecurity testing. Products may be required to pass certifications performed by approved Chinese laboratories. This controls the criteria for what is deemed "secure." Foreign companies often note that these standards can be difficult to meet and may favor domestic designs with which local testers are more familiar.

Long-Term Strategic Decoupling
Analysts see this as another step in the gradual process of technological decoupling between the U.S. and China in strategic industries. While commercial trade in consumer goods continues, the infrastructure that underpins economies and national security is increasingly viewed as a sovereign domain. These rules institutionalize that separation within China's most sensitive networks, reducing interoperability and mutual dependence.

Conclusion: A Calculated Regulatory Move
China's announcement of new cybersecurity procurement rules is a significant policy development. It is a defensive measure aimed at reducing perceived supply chain risks in critical infrastructure. It is also an offensive tool to nurture domestic technology champions. The policy is a direct reflection of ongoing geopolitical tensions and represents the formalization of "digital sovereignty" into concrete procurement guidelines. Its effects will be felt through longer sales cycles for foreign firms, increased market opportunities for Chinese companies, and a further fragmentation of the global technology landscape along geopolitical lines.

TechnologyPolitics

About the Creator

Saad

I’m Saad. I’m a passionate writer who loves exploring trending news topics, sharing insights, and keeping readers updated on what’s happening around the world.

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments

There are no comments for this story

Be the first to respond and start the conversation.

Sign in to comment

    Find us on social media

    Miscellaneous links

    • Explore
    • Contact
    • Privacy Policy
    • Terms of Use
    • Support

    © 2026 Creatd, Inc. All Rights Reserved.