China’s Internet watchdog tightens mobile app rules for national security, requires promotion of ‘core socialist values’


New rules from the Cybersecurity Administration of China go into effect on Aug 1 and align with last year’s data security laws. While China still has a vibrant developer community, recently praised by Apple CEO Tim Cook, the number of apps available halved between 2018 and 2020. — SCMP

China’s Internet watchdog has updated its rules regulating mobile app development with stricter requirements for content and data protections, a move that could deal a fresh blow to the country’s developer community after more than two million apps disappeared from the market in a three-year span.

The Cybersecurity Administration of China (CAC) on Tuesday published the revised version of the Provisions on the Administration of Mobile Internet Applications Information Services, which will take effect on Aug 1, doubling the document’s length over the previous version published in 2016.

Get 20% OFF The Star Digital Access

Monthly Plan

RM 13.90/month

RM 11.12/month

Billed as RM 11.12 for the 1st month, RM 13.90 thereafter.

Best Value

Annual Plan

RM 12.33/month

RM 9.87/month

Billed as RM 118.40 for the 1st year, RM 148 thereafter.

Follow us on our official WhatsApp channel for breaking news alerts and key updates!

Next In Tech News

Anthropic's Mythos sends US banks rushing to plug cyber holes
Canvas' parent company reaches agreement with hacking group behind breach
OpenAI gives European companies access to its latest models to bolster resilience
Netflix spent over $135 billion on film, TV over last decade
Tesla’s robotaxi rollout features Texas-sized wait times
EBay rejects GameStop's $56 billion bid as 'neither credible nor attractive'
TikTok challenges EU 'gatekeeper' status at Europe's top court
OpenAI chief Altman denies Elon Musk's claim he betrayed ChatGPT maker's mission
Samsung Elec union threatens to walk out of pay talks if no mediation proposal
Maker of Canvas learning platform strikes deal for hackers to return data

Others Also Read