Category Archives: Translations

Party Building as the Guide to Social Responsibility in Non-Public Enterprises

This post presents a translation of an article discussing the role of Party groups in CSR in private enterprises, published on the People’s Daily. The article was translated by Larry Catà Backer, and edited by me.

Party Building as the Guide to Social Responsibility in Non-Public Enterprises

Dang Qimin

November 06, 2017 16:27

People’s Daily

In 40 years of reform and opening up, non-public enterprises have become an important force to promote national economic development, ease the pressure on employment, and promote public innovation. The number, role and status of non-public enterprises determine the extreme necessity and importance of strengthening Party building in this area, and giving full play to the role of political core and political leadership of Party organizations. To make this work a reality, we do not only need to face the actual problems in our current work. We also need to find a breakthrough and a starting point for our work.

Read More

Resolution on Amending the Constitution of the Chinese Communist Party

Resolution of the 19th National Congress of the Chinese Communist Party on the Constitution of the Chinese Communist Party (Amendment)

Unofficial Translation

Xinhua News Agency, Beijing, October 24

Resolution of the 19th National Congress of the Chinese Communist Party on the Constitution of the Chinese Communist Party (Amendment)

(Adopted by the 19th National Congress of the Chinese Communist Party on October 24, 2017)

The 19th National Congress of the Chinese Communist Party considered and unanimously adopted the Constitution of the Communist Party of China (Amendment) proposed by the 18th Central Committee, deciding that the amendment should take effect from the date of its adoption.

Read More

Study Times: Strengthen the Construction of a Social Integrity System from the Institutional System

The following is an article published on the ‘Study Times‘, the official magazine of the Central Party School, on October 23, 2017.

Strengthen the construction of a Social Integrity System from the institutional system

Study Times, 23 October 2017

Li Haibing

The construction of a social integrity system is a complex systemic project. At present, in our society there are many social unhealthy phenomena such as economic disputes, telecommunications fraud, indifference for human feelings, and lack of trust, and one of the important reasons lies in problems in the construction of the integrity system. It is not difficult to understand that the construction of an integrity system in the process of social governance is particularly important. It should start with the institutional system, and earnestly strengthen a social integrity system [based on] honesty and the keeping of promises, observance of morality and customs.

Read More

NDRC: Requirements Related to Credit Mentioned Several Times in Report to the 19th Congress

As the 19th Congress of the CCP opens in Beijing, international observers are parsing and summarizing Xi Jinping’s work report. In the meantime, the National Development and Reform Commission has published an article excerpting sections of the work report relevant to social credit.

Requirements Related to Credit Mentioned Several Times in Report to the 19th Congress.

On October 18, the 19th Congress of the Chinese Communist Party opened in the Great Hall of the People, in Beijing. Xi Jinping delivered the work report to the 19th Congress, on behalf of the 18th Central Committee.

Read More

Notice on Conducting the 10th Round of Enterprises Credit Rating Evaluation

Notice on Conducting the 10th Round of Enterprises Credit Rating Evaluation by the

China Association of Environmental Protection Industry

CAEPI Notice (2017) no.153

To all member units, to all provinces (autonomous regions, municipalities), to all professional committees of the China Association of Environmental Protection Industry:

Read More

New ‘Blacklisting Platform’ Launched [Changes in Social Credit and the 19th CCP Congress – 5]

Only eight days before the 19th Congress of the Chinese Communist Party, the People’s Daily has published an article extolling the virtues of a little known (until today) public project that has been going on in Jiangxi Province.

The project involves the creation of a credit platform managed by local Party organs, the judiciary, banking supervision organs, and the media.

To promote the nation-wide adoption of this platform, the Central Propaganda Department, the SPC, CRBC have issued a notice on ‘Creating and Improving a Platform to Expose Persons Subject to Enforcement for Breaches of Trust’. At the moment of writing the full text of the Notice does not yet seem to be available.

Given the timing of its announcement, this is an important development. The article follows. More comments will be posted once the full text of the Notice becomes available.

Read More

Social Credit and the 19th CCP Congress. Article – Privacy protection in the age of big data

Information security problems are becoming a hidden danger

Building a privacy protection security wall in the age of big data

Meng Wei

People’s Daily (October 10, 2017)

In the contemporary era, big data, its use and developement, are a resource government, enterprises and individuals scramble for.With the development of big data technology, data mining, integration and exchange are more and more convenient, and the knowledge and use of personal information by some enterprise is becoming deeper and deeper.A large number of personal information is stored, produced, used, exchanged on the internet. On the one hand this facilitates people’s lives, but on the other hand, a large-scale, deep violation of privacy becomes a possibility. The sale of records of personal location, which happened in recent years, the theft of information about one’s list of friends, leakages of electronic business data, the flooding of internet fora with personal data and other similar phenomena show that information security problems in the development and use of big data have become a hidden danger.

Big data technology can extracts valuable practical information and knowledge from a vast sea of incomplete and non-determinate information resources through their classification, clustering, regression analysis, association rules and other algorithms.But the use of this technology will also cause information security problems.At the different stages of data storage, processing and transmission, people’s words and deeds may be controlled and used by others, in their unawareness.The precision marketing so highly praised by commercial enterprises and the advertising industry is just the integration of online and offline big data about users’ interests and hobbies, behaviors, habits and other information that is collected and then used to form a precise positioning of the user, in order to push them to purchase products.


Information security threats in the age of big data do not just come from leaking personal information that is then grabbed and recorded. In fact, the deep integration among big data and cloud computing, the internet of things and other technologies is such as to allow to link machines, objects, people, services and other elements, ed establish links among seemingly unrelated objects through computing, analyses, production and other methods, and on this basis make predictions about people’s life conditions and mode of behavior. In addition, the development of big data and related technologies has also made the means to violate privacy more diverse and covert, which makes it difficult to identify parties responsible for violations of privacy.Because information is constantly downloaded, stored, arranged, disseminated through the internet through all kinds of sharing and commercial transactions, those responsible for violations morph from individuals to a vague group, and the specific tortious liability is difficult to trace.


The lack of strict and uniform standards and supervision of the collection, storage, management and use of personal information is an important reason causing the frequent occurrence of personal privacy incidents. For example, clear provisions on what kind of information can be collected by which agencies, when and where information can be disclosed, retained and used, and how long should the information be used for, are currently lacking.This leads personal information security having to rely to a large extent on the self-regulation of enterprises and other information users, with binding effects that are obviously limited


Information security in the era of big data has become an important issue in the governance of the internet.In practice, a relatively effective solution would be strengthening legislation and protecting citizens’ basic information rights according to the law from new technologies.At present, our country has promulgated dozens of laws and regulations to protect citizen’s personal information security, and the criminal law also has relevant punishment clauses.However, laws and regulations on the computer firms, and on Weibo, Wechat and Sohu [“The Two Wei and the One Duan”] and other organizations conducting a large-scale collection of personal information have an insufficient binding force.Therefore, it is urgent to strengthen the legal regulation and supervision of personal information collection, storage and use.


In addition to strengthening legislation, the protection of personal information security should be vigorously pursued in other areas.For example, industry organizations related to big data having the advantage of a timely and highly efficient perception of market development dynamics should strengthen self-regulation within the industry, formulate industry codes of self-regulation on privacy certification rules, and technical protection rules, thus binding the conduct of enterprises. Then, we should promote the regulation of data use for the whole of society, and protect personal information security beginning with the precision of data processing, the manual scraping of data, data cycle protection, the special protection of private data.At the same time, we should also raise citizens’ awareness of personal information security protection according to the law, promote a moderate use of personal information, and evade the information security risks brought about by the development of big data technology.

(Researcher, Institute of Journalism and Communication, CASS)

Zhejiang Province Regulations on Managing Public Credit Information

Table of Contents

Chapter 1 – General Principles

Chapter 2 – Information Collection and Disclosure

Chapter 3 – Incentives and Punishments

Chapter 4 – Protecting the Rights and Interests of Information Subjects

Chapter 5 – Legal Responsibility

Chapter 6 – Supplementary Provisions

Read More

[Social Credit and the 19th CCP Congress (2)] People’s Daily: One Should Not Let Algorithms Determine Content

One Should Not Let Algorithms Determine Content

Xuan Yan

People’s Daily, October 5, 2017, p. 4

With the advent of big data and the wide application of artificial intelligence, some commercial websites, mobile news clients, including live broadcasting platforms, browsers, internet search engines, audio-visual software, and so on, are using algorithms to “read minds”, to tailor information to the user, and to create a new personalized reading experience. The acquisition of information has changed from the model of “finding a needle in a haystack” to the model of “individual customization”. However, technology is often a cold two-edged sword. In the weighing of values and interests, so-called algorithms have become the standard weight of interests. Everything revolves around the traffic volumes of websites, the number of clicks, reposts are blindly followed, clickbait headlines are spreading uncontrolled, while the value orientation is deviating, and content has been reduced to an appendage.

Read More