Category Archives: Uncategorized

Strengthening Party Groups in Enterprises Abroad, and Providing a Solid Guarantee for the Development of the “Going Out Policy”

What follows is a 5,600-characters article on Party Committees in Chinese multinational corporations. The article was authored by the Party Committee of the China Fisheries  Corporation some time ago, and it discusses the role and responsibilities of the Corporation’s Party Group.

The article was published by an official source of the People’s Republic of China, and it is presented here in its original version.

This content is for Gold members only.
Log In Register

Regulations of the Central Commission for Discipline Inspection and the Ministry of Supervision on the Protection of Persons Making Reports and Accusations

Unofficial Translation

Regulations of the Central Commission for Discipline Inspection and the Ministry of Supervision on the Protection of Persons Making Reports and Accusations

(19 January 1996)

Article 1. The Present Regulations are enacted according to the “Provisions on Protecting the Rights and Interests of Members of the Communist Party of China”, and laws and regulations on administrative supervision in order to protect the right to make reports and accusations according to the law, to safeguard the lawful rights and interests of persons who make reports and accusations, promote the construction of a clean work-style within the Party, and the struggle against corruption.

This content is for Bronze, Silver and Gold members only.
Log In Register

China Extends Enterprise Rating Systems to Transnational Economic Cooperation

Less than a month after the 19th Congress of the CCP, China has decided to extend monitoring and rating mechanisms to all legal entities involved in transnational economic cooperation. The announcement came through a document enacted by 28 Party organs, State ministries, and commissions, and available in our database.

Entitled ‘Guiding Opinions on Strengthening the Construction of a Credit System in the Field of Economic Cooperation’, the document has the goals to improve enterprise responsibility systems, regulate participation to transnational economic cooperation, and promote competition.

Read More

Social Credit, Big Data and the Interplay Between the Party and the State Constitution

The weight and importance China’s new leadership will afford to the Party Constitution and State Constitution will set the broader policy background against which big data governance and social credit will evolve.

Signals of a fast evolution of social credit have been visible for some time. Xi Jinping’s Work Report mentioned several of the elements which, together, constitute social credit. Regulatory development in this area has been extraordinarily fast, too.

Read More

Party Building as the Guide to Social Responsibility in Non-Public Enterprises

This post presents a translation of an article discussing the role of Party groups in CSR in private enterprises, published on the People’s Daily. The article was translated by Larry Catà Backer, and edited by me.

Party Building as the Guide to Social Responsibility in Non-Public Enterprises

Dang Qimin

November 06, 2017 16:27

People’s Daily

In 40 years of reform and opening up, non-public enterprises have become an important force to promote national economic development, ease the pressure on employment, and promote public innovation. The number, role and status of non-public enterprises determine the extreme necessity and importance of strengthening Party building in this area, and giving full play to the role of political core and political leadership of Party organizations. To make this work a reality, we do not only need to face the actual problems in our current work. We also need to find a breakthrough and a starting point for our work.

Read More

Study Times: Strengthen the Construction of a Social Integrity System from the Institutional System

The following is an article published on the ‘Study Times‘, the official magazine of the Central Party School, on October 23, 2017.

Strengthen the construction of a Social Integrity System from the institutional system

Study Times, 23 October 2017

Li Haibing

The construction of a social integrity system is a complex systemic project. At present, in our society there are many social unhealthy phenomena such as economic disputes, telecommunications fraud, indifference for human feelings, and lack of trust, and one of the important reasons lies in problems in the construction of the integrity system. It is not difficult to understand that the construction of an integrity system in the process of social governance is particularly important. It should start with the institutional system, and earnestly strengthen a social integrity system [based on] honesty and the keeping of promises, observance of morality and customs.

Read More

New ‘Blacklisting Platform’ Launched [Changes in Social Credit and the 19th CCP Congress – 5]

Only eight days before the 19th Congress of the Chinese Communist Party, the People’s Daily has published an article extolling the virtues of a little known (until today) public project that has been going on in Jiangxi Province.

The project involves the creation of a credit platform managed by local Party organs, the judiciary, banking supervision organs, and the media.

To promote the nation-wide adoption of this platform, the Central Propaganda Department, the SPC, CRBC have issued a notice on ‘Creating and Improving a Platform to Expose Persons Subject to Enforcement for Breaches of Trust’. At the moment of writing the full text of the Notice does not yet seem to be available.

Given the timing of its announcement, this is an important development. The article follows. More comments will be posted once the full text of the Notice becomes available.

Read More

Social Credit and the 19th CCP Congress. Article – Privacy protection in the age of big data

Information security problems are becoming a hidden danger

Building a privacy protection security wall in the age of big data

Meng Wei

People’s Daily (October 10, 2017)

In the contemporary era, big data, its use and developement, are a resource government, enterprises and individuals scramble for.With the development of big data technology, data mining, integration and exchange are more and more convenient, and the knowledge and use of personal information by some enterprise is becoming deeper and deeper.A large number of personal information is stored, produced, used, exchanged on the internet. On the one hand this facilitates people’s lives, but on the other hand, a large-scale, deep violation of privacy becomes a possibility. The sale of records of personal location, which happened in recent years, the theft of information about one’s list of friends, leakages of electronic business data, the flooding of internet fora with personal data and other similar phenomena show that information security problems in the development and use of big data have become a hidden danger.

Big data technology can extracts valuable practical information and knowledge from a vast sea of incomplete and non-determinate information resources through their classification, clustering, regression analysis, association rules and other algorithms.But the use of this technology will also cause information security problems.At the different stages of data storage, processing and transmission, people’s words and deeds may be controlled and used by others, in their unawareness.The precision marketing so highly praised by commercial enterprises and the advertising industry is just the integration of online and offline big data about users’ interests and hobbies, behaviors, habits and other information that is collected and then used to form a precise positioning of the user, in order to push them to purchase products.

  

Information security threats in the age of big data do not just come from leaking personal information that is then grabbed and recorded. In fact, the deep integration among big data and cloud computing, the internet of things and other technologies is such as to allow to link machines, objects, people, services and other elements, ed establish links among seemingly unrelated objects through computing, analyses, production and other methods, and on this basis make predictions about people’s life conditions and mode of behavior. In addition, the development of big data and related technologies has also made the means to violate privacy more diverse and covert, which makes it difficult to identify parties responsible for violations of privacy.Because information is constantly downloaded, stored, arranged, disseminated through the internet through all kinds of sharing and commercial transactions, those responsible for violations morph from individuals to a vague group, and the specific tortious liability is difficult to trace.

  

The lack of strict and uniform standards and supervision of the collection, storage, management and use of personal information is an important reason causing the frequent occurrence of personal privacy incidents. For example, clear provisions on what kind of information can be collected by which agencies, when and where information can be disclosed, retained and used, and how long should the information be used for, are currently lacking.This leads personal information security having to rely to a large extent on the self-regulation of enterprises and other information users, with binding effects that are obviously limited

  

Information security in the era of big data has become an important issue in the governance of the internet.In practice, a relatively effective solution would be strengthening legislation and protecting citizens’ basic information rights according to the law from new technologies.At present, our country has promulgated dozens of laws and regulations to protect citizen’s personal information security, and the criminal law also has relevant punishment clauses.However, laws and regulations on the computer firms, and on Weibo, Wechat and Sohu [“The Two Wei and the One Duan”] and other organizations conducting a large-scale collection of personal information have an insufficient binding force.Therefore, it is urgent to strengthen the legal regulation and supervision of personal information collection, storage and use.

  

In addition to strengthening legislation, the protection of personal information security should be vigorously pursued in other areas.For example, industry organizations related to big data having the advantage of a timely and highly efficient perception of market development dynamics should strengthen self-regulation within the industry, formulate industry codes of self-regulation on privacy certification rules, and technical protection rules, thus binding the conduct of enterprises. Then, we should promote the regulation of data use for the whole of society, and protect personal information security beginning with the precision of data processing, the manual scraping of data, data cycle protection, the special protection of private data.At the same time, we should also raise citizens’ awareness of personal information security protection according to the law, promote a moderate use of personal information, and evade the information security risks brought about by the development of big data technology.

(Researcher, Institute of Journalism and Communication, CASS)

[Social Credit and the 19th CCP Congress (2)] People’s Daily: One Should Not Let Algorithms Determine Content

One Should Not Let Algorithms Determine Content

Xuan Yan

People’s Daily, October 5, 2017, p. 4

With the advent of big data and the wide application of artificial intelligence, some commercial websites, mobile news clients, including live broadcasting platforms, browsers, internet search engines, audio-visual software, and so on, are using algorithms to “read minds”, to tailor information to the user, and to create a new personalized reading experience. The acquisition of information has changed from the model of “finding a needle in a haystack” to the model of “individual customization”. However, technology is often a cold two-edged sword. In the weighing of values and interests, so-called algorithms have become the standard weight of interests. Everything revolves around the traffic volumes of websites, the number of clicks, reposts are blindly followed, clickbait headlines are spreading uncontrolled, while the value orientation is deviating, and content has been reduced to an appendage.

Read More

Changes in Social Credit and the 19th CCP Congress (1)

While the 19th Congress of the CCP is less than a month away, a debate tracing the possible future trajectories of social credit has already started, and it is focussing on local legislation.

This far, local legislation on social credit has been adopted by Shanghai Municipality, by Hubei, Hebei, Zhejiang, Shaanxi Province, and Shenzhen. While each one of these pieces of legislation is important in its own respect, the Shanghai social credit regulations play a unique role in driving change in social credit. The first Chinese city to introduce a credit rating system, since 2000 Shanghai has been shaping national trends in social credit.

Comments on the Shanghai social credit regulations – which went into effect yesterday – have been produced by Professor Lin Yu (Shanghai Academy of Social Sciences), and published on the latest issue of The Monthly Magazine of Shanghai People’s Congress (Shanghai Renda Yuekan). To enable readers to form an independent opinion on ongoing trends, the full translation of the article is available below. The original article can be found here.

The article provides a window into a little-known domestic debate on social credit. It lets all those with a stake in social credit understand how social credit is on the brink of change.

Change is always dense with possibilities. At the moment, there are signs that “social credit” may be morphing into a more sophisticated policy, designed to govern economic actors through big data management. While it is not possible to predict what shape and direction this process will take, one thing is certain.

Only those with the knowledge and skills needed to read and comprehend the ‘signals’ coming from within China will be able to understand possible future impacts on their activities, and on their rating. Ignoring upcoming changes or dismissing them as meaningless will entail significant risks.

Read More