Breaking‼️
美東時間1月5日傍晚,川普以國家安全為由,用行政命令方式禁止阿里支付寶、微信支付、QQ錢包在內的8款中國應用程式(App)。
行政命令發佈後45天,禁止任何人與實體與這8款中國應用程式(App)進行交易。
按照日程,美國下任政府將在15天後,1月20日上任。
—
美國商務部長在同一時間發聲明表示,已指示商務部按行政命令執行禁令,「支持川普總統保護美國人民隱私與安全,免於受到中國共產黨的威脅。」
—
▫️8款App:
支付寶(Alipay)、掃描全能王(CamScanner)、QQ錢包(QQ Wallet)、茄子快傳(SHAREit)、騰訊QQ(Tencent QQ)、阿里巴巴旗下海外短視頻應用VMate、微信支付(WeChat Pay)和辦公型App WPS Office。
圖三:美國商務部聲明
圖四:美國國安顧問聲明
—
▫️白宮行政命令全文:
The White House
Office of the Press Secretary
FOR IMMEDIATE RELEASE
January 5, 2021
EXECUTIVE ORDER
- - - - - - -
ADDRESSING THE THREAT POSED BY APPLICATIONS AND OTHER SOFTWARE DEVELOPED OR CONTROLLED BY CHINESE COMPANIES
By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the National Emergencies Act (50 U.S.C. 1601 et seq.), and section 301 of title 3, United States Code,
I, DONALD J. TRUMP, President of the United States of America, find that additional steps must be taken to deal with the national emergency with respect to the information and communications technology and services supply chain declared in Executive Order 13873 of May 15, 2019 (Securing the Information and Communications Technology and Services Supply Chain). Specifically, the pace and pervasiveness of the spread in the United States of certain connected mobile and desktop applications and other software developed or controlled by persons in the People's Republic of China, to include Hong Kong and Macau (China), continue to threaten the national security, foreign policy, and economy of the United States. At this time, action must be taken to address the threat posed by these Chinese connected software applications.
By accessing personal electronic devices such as smartphones, tablets, and computers, Chinese connected software applications can access and capture vast swaths of information from users, including sensitive personally identifiable information and private information. This data collection threatens to provide the Government of the People's Republic of China (PRC) and the Chinese Communist Party (CCP) with access to Americans' personal and proprietary information -- which would permit China to track the locations of Federal employees and contractors, and build dossiers of personal information.
The continuing activity of the PRC and the CCP to steal or otherwise obtain United States persons' data makes clear that there is an intent to use bulk data collection to advance China's economic and national security agenda. For example, the 2014 cyber intrusions of the Office of Personnel Management of security clearance records of more than 21 million people were orchestrated by Chinese agents. In 2015, a Chinese hacking group breached the United States health insurance company Anthem, affecting more than 78 million Americans. And the Department of Justice indicted members of the Chinese military for the 2017 Equifax cyber intrusion that compromised the personal information of almost half of all Americans.
In light of these risks, many executive departments and agencies (agencies) have prohibited the use of Chinese connected software applications and other dangerous software on Federal Government computers and mobile phones. These prohibitions, however, are not enough given the nature of the threat from Chinese connected software applications. In fact, the Government of India has banned the use of more than 200 Chinese connected software applications throughout the country; in a statement, India's Ministry of Electronics and Information Technology asserted that the applications were "stealing and surreptitiously transmitting users' data in an unauthorized manner to servers which have locations outside India."
The United States has assessed that a number of Chinese connected software applications automatically capture vast swaths of information from millions of users in the United States, including sensitive personally identifiable information and private information, which would allow the PRC and CCP access to Americans' personal and proprietary information.
The United States must take aggressive action against those who develop or control Chinese connected software applications to protect our national security.
Accordingly, I hereby order:
Section 1. (a) The following actions shall be prohibited beginning 45 days after the date of this order, to the extent permitted under applicable law: any transaction by any person, or with respect to any property, subject to the jurisdiction of the United States, with persons that develop or control the following Chinese connected software applications, or with their subsidiaries, as those transactions and persons are identified by the Secretary of Commerce (Secretary) under subsection (e) of this section: Alipay, CamScanner, QQ Wallet, SHAREit, Tencent QQ, VMate, WeChat Pay, and WPS Office.
(b) The Secretary is directed to continue to evaluate Chinese connected software applications that may pose an unacceptable risk to the national security, foreign policy, or economy of the United States, and to take appropriate action in accordance with Executive Order 13873.
(c) Not later than 45 days after the date of this order, the Secretary, in consultation with the Attorney General and the Director of National Intelligence, shall provide a report to the Assistant to the President for National Security Affairs with recommendations to prevent the sale or transfer of United States user data to, or access of such data by, foreign adversaries, including through the establishment of regulations and policies to identify, control, and license the export of such data.
(d) The prohibitions in subsection (a) of this section apply except to the extent provided by statutes, or in regulations, orders, directives, or licenses that may be issued pursuant to this order, and notwithstanding any contract entered into or any license or permit granted before the date of this order.
(e) Not earlier than 45 days after the date of this order, the Secretary shall identify the transactions and persons that develop or control the Chinese connected software applications subject to subsection (a) of this section.
Sec. 2. (a) Any transaction by a United States person or within the United States that evades or avoids, has the purpose of evading or avoiding, causes a violation of, or attempts to violate the prohibition set forth in this order is prohibited.
(b) Any conspiracy formed to violate any of the prohibitions set forth in this order is prohibited.
Sec. 3. For the purposes of this order:
(a) the term "connected software application" means software, a software program, or group of software programs, designed to be used by an end user on an end-point computing device and designed to collect, process, or transmit data via the Internet as an integral part of its functionality.
(b) the term "entity" means a government or instrumentality of such government, partnership, association, trust, joint venture, corporation, group, subgroup, or other organization, including an international organization;
(c) the term "person" means an individual or entity;
(d) the term "personally identifiable information" (PII) is information that, when used alone or with other relevant data, can identify an individual. PII may contain direct identifiers (e.g., passport information) that can identify a person uniquely, or quasi-identifiers (e.g., race) that can be combined with other quasi-identifiers (e.g., date of birth) to successfully recognize an individual.
(e) the term "United States person" means any United States citizen, permanent resident alien, entity organized under the laws of the United States or any jurisdiction within the United States (including foreign branches), or any person in the United States.
Sec. 4. (a) The Secretary, in consultation with the Secretary of the Treasury and the Attorney General, is hereby authorized to take such actions, including adopting rules and regulations, and to employ all powers granted to me by IEEPA, as may be necessary to implement this order. All agencies shall take all appropriate measures within their authority to implement this order.
(b) The heads of agencies shall provide, in their discretion and to the extent permitted by law, such resources, information, and assistance to the Department of Commerce as required to implement this order, including the assignment of staff to the Department of Commerce to perform the duties described in this order.
Sec. 5. Severability. If any provision of this order, or the application of any provision to any person or circumstance, is held to be invalid, the remainder of this order and the application of its other provisions to any other persons or circumstances shall not be affected thereby.
Sec. 6. General Provisions. (a) Nothing in this order shall be construed to impair or otherwise affect:
(i) the authority granted by law to an executive department, agency, or the head thereof; or
(ii) the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.
(b) This order shall be implemented consistent with applicable law and subject to the availability of appropriations.
(c) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.
DONALD J. TRUMP
THE WHITE HOUSE,
January 5, 2021.
同時也有10000部Youtube影片,追蹤數超過2,910的網紅コバにゃんチャンネル,也在其Youtube影片中提到,...
「cyber security policy」的推薦目錄:
- 關於cyber security policy 在 唐家婕 - Jane Tang Facebook 的最佳解答
- 關於cyber security policy 在 Scholarship for Vietnamese students Facebook 的最佳貼文
- 關於cyber security policy 在 US Taiwan Watch: 美國台灣觀測站 Facebook 的最佳解答
- 關於cyber security policy 在 コバにゃんチャンネル Youtube 的最佳貼文
- 關於cyber security policy 在 大象中醫 Youtube 的最佳解答
- 關於cyber security policy 在 大象中醫 Youtube 的最佳貼文
cyber security policy 在 Scholarship for Vietnamese students Facebook 的最佳貼文
[Rome, Italy] [Cử nhân/Thạc sĩ]
HỌC BỔNG TOÀN PHẦN TỪ ĐẠI HỌC LUISS!!
Các bạn ơi, dù mùa học bổng đã gần như qua rồi và còn rất ít chương trình học bổng tầm này nhưng mình vừa tìm được một đại học ở Rome, Ý, có những chương trình học bổng rất xịn xò đây ạ. Học bổng sẽ bao trọn chi phí học tập và sinh hoạt cho các bạn nên tha hồ bay nhảy vui chơi nhé. Hầu hết các chương trình được bao gồm trong học bổng là mảng Business, Economics và Laws các bạn nhé. Nếu bạn nào năm nay chưa apply thì lưu lại để năm sau app nhớ!
Các ngành được cover:
Law
International Bussiness
Digital Cyber Security
Public Policy
Marketing
Politics
Management
Business
Economics
Social Science
Finance
Deadline: 3.7.2020
Xem chi tiết tại:
https://programs.luiss.it/fees-and-aid/financial-aid/
https://backoffice.luiss.it/sites/default/files/2020-03/Call_%20Masters_8_2020_English.pdf
<3 Like page, tag và share bạn bè nhé <3
#HannahEd #sanhocbong #duhoc #scholarshipforVietnamesestudents
cyber security policy 在 US Taiwan Watch: 美國台灣觀測站 Facebook 的最佳解答
週五情人節(14日),大家在慶祝(或哀悼)的同時,我們的魔法阿嬤佩洛西(Nancy Pelosi)可沒閒著,她和國務卿龐佩奧(Mike Pompeo)和國防部長艾斯培(Mark Esper)到慕尼黑安全會議(Munich Security Conference, MSC)—— 全球最大的國際安全政策決策論壇 —— 對歐洲各國元首和政界人士允許華為建設5G網路一事,訓斥了一番!於此同時,先前才剛簽署的美中第一階段貿易協議,恐怕因為武漢肺炎疫情爆發,而即將有跳票風險。
▍慕尼黑安全會議,三巨頭烙狠話
事情要回到1月底,縱使美國不斷地施壓,英國國家網絡安全中心(National Cyber Security Centre)的分析也指出華為是高風險的5G供應商,但英國首相莊漢生(Boris Johnson)仍舊表示將允許華為在英國建造5G網絡(1月28日),只要求英國公司「有限地使用華為,以便管理風險。」隔天29日,歐盟也跟進,告訴成員應限制但不該禁止包括華為在內的高風險5G供應商。
到了本月11日,德國總理梅克爾(Angela Merkel)領導的保守政黨又支持了一項內容包含不排除華為參與德國 5G 建設的戰略文件。相反的,兩天後(13日)美國司法部則是對華為追加新指控,包括密謀違反《反黑法案》(Racketeer Influenced and Corrupt Organizations Act,簡稱RICO)、竊取六家美國科技公司的商業機密,以及違反國際制裁令,與受制裁國家(如伊朗和朝鮮)交易等。很明顯的,美國與歐洲各國領導人對華為爭議的處理方式有著極大的分歧,華為爭議也成了慕尼黑安全會議的一大焦點。
佩洛西在開幕演講中,對在場來自40多國的政界高層人士表示,#美國兩黨 對華為持一致的立場,並警告如果讓華為參與5G技術,就是在「選擇專制而不是民主」,還提到:「讓5G通訊網絡由一個不與我們共享價值觀的專制政府主導,是個最陰險的侵略方式。」
對於佩洛西的言論,中方代表在會議上回應,在衝突發生時,華為的設備沒有能力攔截消息或關閉網絡(後來還有佩洛西VS中國前副外長傅瑩的交鋒,請看留言補充連結)。不過艾斯培反駁並對各國元首說,華為在商業網絡中的存在,將可能破壞北大西洋公約組織(NATO)的同盟,警告:「中國共產黨正以更快、更大的步伐,往錯誤的方向前進—對內更高壓的統治、更具掠奪性的經濟手段、更嚴厲的行徑,以及最令我擔憂的,更具侵略性的軍事動作。」龐佩奧更接著說,那些考慮讓華為建立下一代通信網絡的國家,#要做好減少與美國情報單位合作的準備。
這次三位美國高官在慕尼黑安全會議上抨擊華為和施壓歐洲各國的力道相當重,尤其是國防部長和國務卿二人的火力更是強大,而且也講了不少與台灣相關的發言(其實美國國防部對於要不要全面禁華為是有疑慮的,但現在看來疑慮愈來愈消了,演說開頭就直指中國是五角大廈的主要顧慮,推薦大家讀一下,真的很嗆)。不過會議上的英國和德國官員皆保持沈默,要想讓這些歐洲官員停止避免觸犯中國,看來是相當有難度。
➤ 國防部長發言全文:https://pse.is/QQDL2
最新一期(Mar/Apr 2020)的《外交事務》(Foreign Affairs)期刊,主題就是「數位獨裁者」(Digital Dictator)。內容有多篇文章討論美國在面對強權競爭時的角色以及作法,也有威權政治專家專文討論科技如何讓獨裁政權變得更強(Kendall-Taylor, Frantz, and Wright)。他們發現,數位科技顯著地幫助獨裁者去打擊異議者。其中,中共政權即是運用數位科技,來實行對公民社會以及政治菁英監控的佼佼者。美國對華為通訊設備行遍全球的擔憂並非無中生有,在許多相關領域已經有很多討論了,推薦讀者們有興趣可到圖書館找這本期刊來翻一翻。
▍武漢肺炎,貿易協議能源條款將跳票?
三巨頭在慕尼黑出席安全會議的同一天,美中「第一階段貿易協議」中所提到的「爭端處理的專案辦公室」及「投訴熱線」( dispute resolution office and complaint hotline)也在華府正式成立,不過這個專案辦公室恐怕將很快就要面臨到中國跳票的問題了!
俗稱「武漢肺炎」的2019新型冠狀病毒肺炎(抱歉我們記不住WHO花了兩個月才重新命名的那個名字,而且俗稱跟正式名稱本來就不必一致)不只在全球多處造成恐慌和歧視,這場疫情更是讓全球的製造供應鏈,以及世界各地仰賴中國消費力的商家和企業,帶來巨大的經濟損失。而上個月才剛簽署好的第一階段協議,其中的「能源條款」,恐怕馬上要因為武漢肺炎的爆發而無法兌現了。
在協議當中,中國承諾在今年和明年分別向美國購買185億美元和340億美元的能源產品,如此巨大的金額代表著,相較2017年,中國在今年和明年的石油需求量要分別增加275%和500%。過去,中國占去年全球石油需求增長的四分之三左右,但國際能源組織在13日表示,因為武漢肺炎疫情的爆發,原先預計中國將在2020年推動三分之一的全球石油消費增長,將下降到不到五分之一。
《外交政策》(Foreign Policy)雜誌資深編輯強森(Keith Johnson)就表示,在武漢肺炎爆發之前,協議中的條款就已經幾乎難以兌現了,如今又爆發了如此嚴重的疫情,危及中國經濟,這項條款更是不可能達成了。武漢疫情爆發後,美方持續給予中國援助,但縱使有再多的同情,第一階段協議才剛結束,其中的條款就被認定難以落實,這勢必將影響到接下來的第二階段談判,看來剛成立的「爭端處理的專案辦公室」有得忙了!
▍延伸閱讀:
- 武漢肺炎疫情的爆發將加速美中貿易關係脫鉤:
https://pse.is/NV3CR
- 美國疾病管制中心提供中國援助卻遭拒:
https://pse.is/QM5SN
- 國務卿蓬佩奧促各州政府抵制中國對台灣的壓力
https://pse.is/Q852B
cyber security policy 在 コバにゃんチャンネル Youtube 的最佳貼文
cyber security policy 在 大象中醫 Youtube 的最佳解答
cyber security policy 在 大象中醫 Youtube 的最佳貼文
cyber security policy 在 6 Examples of Essential Cybersecurity Policies for Businesses 的相關結果
A security policy is a set of standardized practices and procedures designed to protect a business's network from threat activity. Typically, ... ... <看更多>
cyber security policy 在 Company cyber security policy template - Workable Resources 的相關結果
Our company cyber security policy outlines our guidelines and provisions for preserving the security of our data and technology infrastructure. The more we rely ... ... <看更多>
cyber security policy 在 Cyber Security Policy - Betterteam 的相關結果
A company cyber security policy helps clearly outline the guidelines for transferring company data, accessing private systems, and using company-issued ... ... <看更多>