
{"id":10843,"date":"2020-09-20T15:59:42","date_gmt":"2020-09-20T07:59:42","guid":{"rendered":"http:\/\/www.xxyyfy.com\/?p=10843"},"modified":"2020-09-20T15:59:42","modified_gmt":"2020-09-20T07:59:42","slug":"%e7%8e%8b%e6%af%85%e5%9c%a8%e5%85%a8%e7%90%83%e6%95%b0%e5%ad%97%e6%b2%bb%e7%90%86%e7%a0%94%e8%ae%a8%e4%bc%9a%e4%b8%8a%e7%9a%84%e4%b8%bb%e6%97%a8%e8%ae%b2%e8%af%9d","status":"publish","type":"post","link":"http:\/\/www.xxyyfy.com\/?p=10843","title":{"rendered":"\u738b\u6bc5\u5728\u5168\u7403\u6570\u5b57\u6cbb\u7406\u7814\u8ba8\u4f1a\u4e0a\u7684\u4e3b\u65e8\u8bb2\u8bdd"},"content":{"rendered":"<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u575a\u5b88\u591a\u8fb9\u4e3b\u4e49 \u5021\u5bfc\u516c\u5e73\u6b63\u4e49 \u643a\u624b\u5408\u4f5c\u5171\u8d62<\/span><br \/>\n<span style=\"font-size:14px;\">\u2014\u2014\u5728\u5168\u7403\u6570\u5b57\u6cbb\u7406\u7814\u8ba8\u4f1a\u4e0a\u7684\u4e3b\u65e8\u8bb2\u8bdd<\/span><br \/>\n<span style=\"font-size:14px;\">2020\u5e749\u67088\u65e5&nbsp;<\/span><br \/>\n<span style=\"font-size:14px;\">\u4e2d\u534e\u4eba\u6c11\u5171\u548c\u56fd\u56fd\u52a1\u9662\u56fd\u52a1\u59d4\u5458 \u738b\u6bc5<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">Upholding Multilateralism, Fairness and Justice and Promoting Mutually Beneficial Cooperation<\/span><br \/>\n<span style=\"font-size:14px;\">-Keynote Speech by State Councilor and Foreign Minister Wang Yi At the International Seminar on Global Digital Governance<\/span><br \/>\n<span style=\"font-size:14px;\">Beijing, 8 September 2020<\/span><br \/>\n<span style=\"font-size:14px;\">\u5404\u4f4d\u5609\u5bbe\uff0c<\/span><br \/>\n<span style=\"font-size:14px;\">\u5404\u4f4d\u540c\u4e8b\uff0c<\/span><br \/>\n<span style=\"font-size:14px;\">\u5973\u58eb\u4eec\uff0c\u5148\u751f\u4eec\uff0c\u670b\u53cb\u4eec\uff1a<\/span><br \/>\n<span style=\"font-size:14px;\">Distinguished Guests,<\/span><br \/>\n<span style=\"font-size:14px;\">Colleagues,<\/span><br \/>\n<span style=\"font-size:14px;\">Ladies and Gentlemen,<\/span><br \/>\n<span style=\"font-size:14px;\">Friends,<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u672c\u6b21\u7814\u8ba8\u4f1a\u4ee5\u201c\u6293\u4f4f\u6570\u5b57\u673a\u9047\uff0c\u5171\u8c0b\u5408\u4f5c\u53d1\u5c55\u201d\u4e3a\u4e3b\u9898\uff0c\u6070\u5f53\u5176\u65f6\u3002\u5e0c\u671b\u5404\u4f4d\u4e13\u5bb6\u5b66\u8005\u548c\u884c\u4e1a\u9886\u8896\u4e00\u9053\uff0c\u5c55\u671b\u6570\u5b57\u7ecf\u6d4e\u53d1\u5c55\u524d\u666f\uff0c\u5171\u5546\u5e94\u5bf9\u6570\u636e\u5b89\u5168\u98ce\u9669\u4e4b\u7b56\uff0c\u5171\u8c0b\u5168\u7403\u6570\u5b57\u6cbb\u7406\u4e4b\u9053\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">We are meeting under the theme &#8220;Seizing Digital Opportunities for Cooperation and Development&#8221;, a topic that is highly relevant. I hope this seminar will be a prime opportunity for participants, from experts, scholars to business leaders, to look into the future of the digital economy, discuss ways to manage data security risks and promote global governance in the digital domain.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u4eca\u5929\u7684\u4e16\u754c\uff0c\u6b63\u5904\u5728\u65b0\u4e00\u8f6e\u79d1\u6280\u9769\u547d\u548c\u4ea7\u4e1a\u53d8\u9769\u84c4\u52bf\u5f85\u53d1\u7684\u5386\u53f2\u65f6\u523b\u3002\u5404\u56fd\u9762\u4e34\u7684\u5171\u540c\u4efb\u52a1\u662f\uff0c\u4fc3\u8fdb\u6570\u5b57\u548c\u5b9e\u4f53\u7ecf\u6d4e\u878d\u5408\u53d1\u5c55\uff0c\u52a0\u901f\u65b0\u65e7\u53d1\u5c55\u52a8\u80fd\u8f6c\u6362\uff0c\u6253\u9020\u65b0\u7684\u4ea7\u4e1a\u548c\u65b0\u7684\u4e1a\u6001\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">Our world today has come to a historic juncture. A new round of technological revolution and industrial transformation is in the making. Countries face the common task of integrating the digital economy with the real economy, speeding up the shift to new growth drivers, and cultivating new industries and new forms of business.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u5e2d\u5377\u5168\u7403\u7684\u65b0\u51a0\u80ba\u708e\u75ab\u60c5\uff0c\u662f\u5bf9\u5404\u56fd\u4ee5\u53ca\u5168\u7403\u6cbb\u7406\u80fd\u529b\u7684\u91cd\u5927\u8003\u9a8c\u3002\u4eba\u5de5\u667a\u80fd\u3001\u5927\u6570\u636e\u3001\u4e91\u8ba1\u7b97\u7b49\u6570\u5b57\u6280\u672f\u5728\u5404\u56fd\u6297\u51fb\u75ab\u60c5\u8fdb\u7a0b\u4e2d\u5feb\u901f\u53d1\u5c55\uff0c\u8fdc\u7a0b\u529e\u516c\u3001\u4e91\u7aef\u7ecf\u6d4e\u7b49\u65b0\u4e1a\u6001\u4e3a\u7ef4\u6301\u793e\u4f1a\u6b63\u5e38\u8fd0\u8f6c\uff0c\u5bf9\u51b2\u7ecf\u6d4e\u4e0b\u884c\u538b\u529b\u53d1\u6325\u4e86\u91cd\u8981\u4f5c\u7528\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">The global spread of COVID-19 has presented a major test to all countries and to our capacity of global governance. In the course of epidemic response, digital technologies, including artificial intelligence, big data and cloud computing, have made rapid progress. Telecommuting, cloud economy and other new business forms have played an important role in keeping the society running and countering the downward pressure on the economy.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u6700\u65b0\u7edf\u8ba1\u663e\u793a\uff0c\u5168\u7403\u79fb\u52a8\u4e92\u8054\u7f51\u7528\u6237\u5df2\u8fbe\u523035\u4ebf\uff0c\u6570\u5b57\u7ecf\u6d4e\u89c4\u6a21\u5360\u5168\u7403GDP\u6bd4\u91cd\u5df2\u8d85\u8fc715%\u3002\u5168\u7403\u6570\u636e\u7206\u53d1\u589e\u957f\u3001\u6d77\u91cf\u96c6\u805a\uff0c\u5982\u540c\u65b0\u7684\u201c\u77f3\u6cb9\u201d\uff0c\u6b63\u5728\u6210\u4e3a\u5404\u56fd\u7ecf\u6d4e\u53d1\u5c55\u548c\u4ea7\u4e1a\u9769\u65b0\u7684\u52a8\u529b\u6e90\u6cc9\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">According to the latest statistics, the number of mobile Internet users has reached 3.5 billion around the world, and the digital economy now takes up more than 15 percent of the global GDP. The explosive growth and aggregation of data, like the discovery of oil, is providing a new source of energy for economic growth and industrial transformation.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u4e0e\u6b64\u540c\u65f6\uff0c\u6570\u636e\u5b89\u5168\u98ce\u9669\u4e0e\u65e5\u4ff1\u589e\uff0c\u6538\u5173\u56fd\u5bb6\u5b89\u5168\u3001\u516c\u5171\u5229\u76ca\u548c\u4e2a\u4eba\u6743\u5229\uff0c\u5bf9\u5168\u7403\u6570\u5b57\u6cbb\u7406\u6784\u6210\u65b0\u7684\u6311\u6218\u3002\u5927\u91cf\u6570\u636e\u9891\u7e41\u8de8\u5883\u6d41\u52a8\uff0c\u4ece\u7406\u5ff5\u3001\u7acb\u6cd5\u3001\u7ba1\u7406\u673a\u5236\u7b49\u65b9\u9762\u8003\u9a8c\u653f\u5e9c\u7684\u6cbb\u7406\u80fd\u529b\u3002\u5404\u56fd\u6cd5\u5f8b\u6cd5\u89c4\u6807\u51c6\u4e0d\u4e00\uff0c\u4e5f\u5728\u63a8\u9ad8\u5168\u7403\u4f01\u4e1a\u7684\u5408\u89c4\u6210\u672c\u3002\u9762\u5bf9\u5168\u7403\u6570\u5b57\u6cbb\u7406\u7684\u8d64\u5b57\uff0c\u5404\u56fd\u4e9f\u9700\u52a0\u5f3a\u6c9f\u901a\u3001\u5efa\u7acb\u4e92\u4fe1\uff0c\u5bc6\u5207\u534f\u8c03\uff0c\u6df1\u5316\u5408\u4f5c\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">In the meantime, the mounting risks of data security have put national security, public interests and personal rights at stake, and posed new challenges to global digital governance. The frequent and massive cross-border data flow puts to the test the governance capacity of national governments in terms of governance philosophy, legislative framework and regulatory mechanism. The divergence of data laws and regulations in different countries has pushed up the compliance costs for global businesses. To reduce the deficit in global digital governance, countries face a pressing need to step up communication and coordination, build up mutual trust and deepen cooperation with one another.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u5404\u4f4d\u5609\u5bbe\uff0c<\/span><br \/>\n<span style=\"font-size:14px;\">Distinguished Guests,<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u5168\u7403\u6027\u95ee\u9898\u9700\u8981\u5168\u7403\u6027\u89e3\u51b3\u4e4b\u9053\u3002\u4e60\u8fd1\u5e73\u4e3b\u5e2d\u6307\u51fa\uff0c\u5404\u56fd\u867d\u7136\u56fd\u60c5\u4e0d\u540c\u3001\u4e92\u8054\u7f51\u53d1\u5c55\u9636\u6bb5\u4e0d\u540c\u3001\u9762\u4e34\u7684\u73b0\u5b9e\u6311\u6218\u4e0d\u540c\uff0c\u4f46\u63a8\u52a8\u6570\u5b57\u7ecf\u6d4e\u53d1\u5c55\u7684\u613f\u671b\u76f8\u540c\u3001\u5e94\u5bf9\u7f51\u7edc\u5b89\u5168\u6311\u6218\u7684\u5229\u76ca\u76f8\u540c\u3001\u52a0\u5f3a\u7f51\u7edc\u7a7a\u95f4\u6cbb\u7406\u7684\u9700\u6c42\u76f8\u540c\u3002\u5404\u56fd\u5e94\u6df1\u5316\u52a1\u5b9e\u5408\u4f5c\uff0c\u8d70\u51fa\u4e00\u6761\u4e92\u4fe1\u5171\u6cbb\u4e4b\u8def\uff0c\u8ba9\u7f51\u7edc\u7a7a\u95f4\u547d\u8fd0\u5171\u540c\u4f53\u66f4\u5177\u751f\u673a\u6d3b\u529b\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">Global issues call for global solutions. As President Xi Jinping pointed out, countries, although varied in national conditions, development stage of Internet and challenges, hold the same desire for promoting digital economy, same interests in tackling cybersecurity challenges and same expectations for strengthened cyberspace governance. Countries need to intensify pragmatic cooperation and embark on a path of mutual trust and collective governance, adding more vitality to a community with a shared future in cyberspace.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u4e2d\u65b9\u8ba4\u4e3a\uff0c\u6709\u6548\u5e94\u5bf9\u6570\u636e\u5b89\u5168\u7684\u98ce\u9669\u6311\u6218\uff0c\u5e94\u8be5\u9075\u5faa\u4ee5\u4e0b\u539f\u5219\uff1a<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">China believes that to effectively address the risks and challenges to data security, the following principles must be observed:<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u7b2c\u4e00\uff0c\u79c9\u6301\u591a\u8fb9\u4e3b\u4e49\u3002\u5171\u5546\u3001\u5171\u5efa\u3001\u5171\u4eab\u662f\u89e3\u51b3\u5168\u7403\u6570\u5b57\u6cbb\u7406\u8d64\u5b57\u7684\u6b63\u786e\u51fa\u8def\u3002\u5e94\u5728\u5404\u65b9\u666e\u904d\u53c2\u4e0e\u7684\u57fa\u7840\u4e0a\uff0c\u8fbe\u6210\u53cd\u6620\u5404\u56fd\u610f\u613f\u3001\u5c0a\u91cd\u5404\u65b9\u5229\u76ca\u7684\u5168\u7403\u6570\u636e\u5b89\u5168\u89c4\u5219\u3002\u4e2a\u522b\u56fd\u5bb6\u5927\u641e\u5355\u8fb9\u4e3b\u4e49\uff0c\u4ee5\u201c\u6e05\u6d01\u201d\u4e3a\u540d\u5411\u522b\u56fd\u6cfc\u810f\u6c34\uff0c\u4ee5\u5b89\u5168\u4e3a\u501f\u53e3\u5bf9\u5176\u4ed6\u56fd\u5bb6\u9886\u5148\u4f01\u4e1a\u8fdb\u884c\u5168\u7403\u56f4\u730e\uff0c\u8fd9\u662f\u8d64\u88f8\u88f8\u7684\u9738\u51cc\u884c\u5f84\uff0c\u5e94\u8be5\u4e88\u4ee5\u53cd\u5bf9\u548c\u6452\u5f03\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">First, uphold multilateralism. Pursuing extensive consultation and joint contribution for shared benefits is the right way forward for addressing the deficit in global digital governance. It is important to develop a set of international rules on data security that reflect the will and respect the interests of all countries through broad-based participation. Bent on unilateral acts, a certain country keeps making groundless accusations against others in the name of &#8220;clean&#8221; network and used security as a pretext to prey on enterprises of other countries who have a competitive edge. Such blatant acts of bullying must be opposed and rejected.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u7b2c\u4e8c\uff0c\u517c\u987e\u5b89\u5168\u53d1\u5c55\u3002\u4fdd\u62a4\u6570\u636e\u5b89\u5168\u5bf9\u6570\u5b57\u7ecf\u6d4e\u5065\u5eb7\u53d1\u5c55\u81f3\u5173\u91cd\u8981\u3002\u5404\u56fd\u90fd\u6709\u6743\u4f9d\u6cd5\u4fdd\u62a4\u672c\u56fd\u7684\u6570\u636e\u5b89\u5168\u3002\u540c\u65f6\uff0c\u4e5f\u90fd\u5e94\u4e3a\u6240\u6709\u4f01\u4e1a\u63d0\u4f9b\u5f00\u653e\u3001\u516c\u6b63\u3001\u975e\u6b67\u89c6\u7684\u8425\u5546\u73af\u5883\u3002\u6570\u5b57\u4fdd\u62a4\u4e3b\u4e49\u8fdd\u80cc\u7ecf\u6d4e\u53d1\u5c55\u7684\u5ba2\u89c2\u89c4\u5f8b\uff0c\u4e0d\u7b26\u5408\u5168\u7403\u5316\u7684\u65f6\u4ee3\u6f6e\u6d41\uff0c\u4e0d\u4f46\u6709\u635f\u5168\u7403\u6d88\u8d39\u8005\u516c\u5e73\u83b7\u5f97\u6570\u5b57\u670d\u52a1\u7684\u6743\u5229\uff0c\u6700\u7ec8\u4e5f\u4f1a\u963b\u788d\u81ea\u8eab\u7684\u53d1\u5c55\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">Second, balance security and development. Protecting data security is essential for the sound growth of digital economy. Countries have the right to protect data security according to law. That said, they are also duty-bound to provide an open, fair and non-discriminatory environment for all businesses. Protectionism in the digital domain runs counter to the laws of economic development and the trend of globalization. Protectionist practices undermine the right of global consumers to equally access digital services and will eventually hold back the country&#8217;s own development.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u7b2c\u4e09\uff0c\u575a\u5b88\u516c\u5e73\u6b63\u4e49\u3002\u7ef4\u62a4\u6570\u5b57\u5b89\u5168\u5e94\u4ee5\u4e8b\u5b9e\u548c\u6cd5\u89c4\u4e3a\u4f9d\u636e\u3002\u628a\u6570\u636e\u5b89\u5168\u95ee\u9898\u653f\u6cbb\u5316\uff0c\u523b\u610f\u641e\u53cc\u91cd\u6807\u51c6\uff0c\u751a\u81f3\u4e0d\u60dc\u9020\u8c23\u62b9\u9ed1\uff0c\u8fdd\u80cc\u56fd\u9645\u5173\u7cfb\u57fa\u672c\u51c6\u5219\uff0c\u4e5f\u4e25\u91cd\u5e72\u6270\u548c\u963b\u788d\u5168\u7403\u6570\u5b57\u5408\u4f5c\u4e0e\u53d1\u5c55\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">Third, ensure fairness and justice. Protection of digital security should be based on facts and the law. Politicization of security issues, double standards and slandering others violate the basic norms governing international relations, and seriously disrupt and hamper global digital cooperation and development.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u5404\u4f4d\u5609\u5bbe\uff0c<\/span><br \/>\n<span style=\"font-size:14px;\">Distinguished Guests,<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u4e2d\u56fd\u6570\u5b57\u7ecf\u6d4e\u6b63\u5728\u84ec\u52c3\u53d1\u5c55\u3002\u4e2d\u56fd\u7f51\u6c11\u6570\u91cf\u8d85\u8fc79\u4ebf\uff0c5G\u7528\u6237\u6570\u91cf\u5feb\u901f\u589e\u957f\uff0c\u6700\u65b0\u7edf\u8ba1\u5df2\u8d85\u8fc78800\u4e07\uff0c\u6570\u5b57\u7ecf\u6d4e\u603b\u91cf\u8d85\u8fc7GDP\u7684\u4e09\u5206\u4e4b\u4e00\u3002\u4e2d\u56fd\u6cd5\u5f8b\u5bf9\u4e8e\u4fdd\u969c\u516c\u6c11\u548c\u7ec4\u7ec7\u7684\u5408\u6cd5\u6743\u76ca\uff0c\u5305\u62ec\u6570\u636e\u5b89\u5168\u548c\u4e2a\u4eba\u4fe1\u606f\u7b49\uff0c\u90fd\u505a\u51fa\u4e86\u660e\u786e\u89c4\u5b9a\u3002\u4e2d\u56fd\u653f\u5e9c\u4e25\u683c\u8df5\u884c\u6570\u636e\u5b89\u5168\u4fdd\u62a4\u6709\u5173\u539f\u5219\uff0c\u6ca1\u6709\u4e5f\u4e0d\u4f1a\u8981\u6c42\u4e2d\u65b9\u4f01\u4e1a\u8fdd\u53cd\u522b\u56fd\u6cd5\u5f8b\u5411\u4e2d\u56fd\u653f\u5e9c\u63d0\u4f9b\u5883\u5916\u6570\u636e\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">Digital economy in China has been thriving. There are over 900 million netizens, including a fast growing group of 5G subscribers of 88 million, in China. Digital economy takes up more than one-third of China&#8217;s GDP. We have clear legal provisions for protecting the lawful rights and interests of citizens and organizations, including data security and personal information. The Chinese government has acted in strict compliance with data security principles. We have not and will not ask Chinese companies to transfer data overseas to the government in breach of other countries&#8217; laws.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u4e2d\u56fd\u5efa\u8bbe\u6027\u53c2\u4e0e\u8054\u5408\u56fd\u3001\u4e8c\u5341\u56fd\u96c6\u56e2\u3001\u91d1\u7816\u56fd\u5bb6\u3001\u4e1c\u76df\u5730\u533a\u8bba\u575b\u7b49\u591a\u8fb9\u5e73\u53f0\u7684\u6570\u636e\u5b89\u5168\u8ba8\u8bba\uff0c\u81f4\u529b\u4e8e\u4e3a\u52a0\u5f3a\u5168\u7403\u6570\u5b57\u6cbb\u7406\u8d21\u732e\u4e2d\u56fd\u7684\u667a\u6167\u3002\u4e3a\u5e94\u5bf9\u65b0\u95ee\u9898\u65b0\u6311\u6218\uff0c\u4e2d\u56fd\u613f\u53d1\u8d77\u201c\u5168\u7403\u6570\u636e\u5b89\u5168\u5021\u8bae\u201d\uff0c\u6b22\u8fce\u5404\u65b9\u7684\u79ef\u6781\u53c2\u4e0e\u3002\u8fd9\u4e00\u5021\u8bae\u7684\u4e3b\u8981\u5185\u5bb9\u5305\u62ec\uff1a<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">China has taken a constructive part in multilateral discussions on data security including at the UN, G20, BRICS and the ASEAN Regional Forum, contributing China&#8217;s input to global digital governance. In view of the new issues and challenges emerging in this field, China would like to propose a Global Initiative on Data Security, and looks forward to the active participation of all parties. Let me briefly share with you the key points of our Initiative:<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u4e00\u662f\u5ba2\u89c2\u7406\u6027\u770b\u5f85\u6570\u636e\u5b89\u5168\uff0c\u81f4\u529b\u4e8e\u7ef4\u62a4\u5168\u7403\u4f9b\u5e94\u94fe\u5f00\u653e\u3001\u5b89\u5168\u548c\u7a33\u5b9a\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">First, approach data security with an objective and rational attitude, and maintain an open, secure and stable global supply chain.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u4e8c\u662f\u53cd\u5bf9\u5229\u7528\u4fe1\u606f\u6280\u672f\u7834\u574f\u4ed6\u56fd\u5173\u952e\u57fa\u7840\u8bbe\u65bd\u6216\u7a83\u53d6\u91cd\u8981\u6570\u636e\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">Second, oppose using ICT activities to impair other States&#8217; critical infrastructure or steal important data.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u4e09\u662f\u91c7\u53d6\u63aa\u65bd\u9632\u8303\u548c\u5236\u6b62\u4fb5\u5bb3\u4e2a\u4eba\u4fe1\u606f\u7684\u884c\u4e3a\uff0c\u4e0d\u5f97\u6ee5\u7528\u4fe1\u606f\u6280\u672f\u5bf9\u4ed6\u56fd\u8fdb\u884c\u5927\u89c4\u6a21\u76d1\u63a7\uff0c\u6216\u975e\u6cd5\u91c7\u96c6\u4ed6\u56fd\u516c\u6c11\u4e2a\u4eba\u4fe1\u606f\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">Third, take actions to prevent and put an end to activities that infringe upon personal information, oppose abusing ICT to conduct mass surveillance against other States or engage in unauthorized collection of personal information of other States.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u56db\u662f\u8981\u6c42\u4f01\u4e1a\u5c0a\u91cd\u5f53\u5730\u6cd5\u5f8b\uff0c\u4e0d\u5f97\u5f3a\u5236\u8981\u6c42\u672c\u56fd\u4f01\u4e1a\u5c06\u5883\u5916\u4ea7\u751f\u3001\u83b7\u53d6\u7684\u6570\u636e\u5b58\u50a8\u5728\u672c\u56fd\u5883\u5185\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">Fourth, ask companies to respect the laws of host countries, desist from coercing domestic companies into storing data generated and obtained overseas in one&#8217;s own territory.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u4e94\u662f\u5c0a\u91cd\u4ed6\u56fd\u4e3b\u6743\u3001\u53f8\u6cd5\u7ba1\u8f96\u6743\u548c\u5bf9\u6570\u636e\u7684\u7ba1\u7406\u6743\uff0c\u4e0d\u5f97\u76f4\u63a5\u5411\u4f01\u4e1a\u6216\u4e2a\u4eba\u8c03\u53d6\u4f4d\u4e8e\u4ed6\u56fd\u7684\u6570\u636e\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">Fifth, respect the sovereignty, jurisdiction and governance of data of other States, avoid asking companies or individuals to provide data located in other States without the latter&#8217;s permission.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u516d\u662f\u5e94\u901a\u8fc7\u53f8\u6cd5\u534f\u52a9\u7b49\u6e20\u9053\u89e3\u51b3\u6267\u6cd5\u8de8\u5883\u6570\u636e\u8c03\u53d6\u9700\u6c42\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">Sixth, meet law enforcement needs for overseas data through judicial assistance or other appropriate channels.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u4e03\u662f\u4fe1\u606f\u6280\u672f\u4ea7\u54c1\u548c\u670d\u52a1\u4f9b\u5e94\u4f01\u4e1a\u4e0d\u5e94\u5728\u4ea7\u54c1\u548c\u670d\u52a1\u4e2d\u8bbe\u7f6e\u540e\u95e8\uff0c\u975e\u6cd5\u83b7\u53d6\u7528\u6237\u6570\u636e\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">Seventh, ICT products and services providers should not install backdoors in their products and services to illegally obtain user data.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u516b\u662f\u4fe1\u606f\u6280\u672f\u4f01\u4e1a\u4e0d\u5f97\u5229\u7528\u7528\u6237\u5bf9\u4ea7\u54c1\u4f9d\u8d56\uff0c\u8c0b\u53d6\u4e0d\u6b63\u5f53\u5229\u76ca\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">Eighth, ICT companies should not seek illegitimate interests by taking advantage of users&#8217; dependence on their products.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u6211\u5e0c\u671b\uff0c\u4e2d\u65b9\u53d1\u8d77\u7684\u201c\u5168\u7403\u6570\u636e\u5b89\u5168\u5021\u8bae\u201d\u80fd\u591f\u4e3a\u5236\u5b9a\u6570\u5b57\u5b89\u5168\u56fd\u9645\u89c4\u5219\u63d0\u4f9b\u4e00\u4e2a\u84dd\u672c\uff0c\u5f00\u542f\u4e00\u4e2a\u5168\u7403\u8fdb\u7a0b\u3002\u6211\u4eec\u671f\u5f85\u5404\u56fd\u653f\u5e9c\u3001\u56fd\u9645\u7ec4\u7ec7\u53ca\u6240\u6709\u5229\u76ca\u6538\u5173\u65b9\u5171\u540c\u53c2\u4e0e\uff0c\u6b22\u8fce\u5404\u56fd\u901a\u8fc7\u53cc\u8fb9\u6216\u5730\u533a\u534f\u8bae\u7b49\u5f62\u5f0f\u652f\u6301\u5021\u8bae\u4e2d\u7684\u6709\u5173\u627f\u8bfa\u3002\u6211\u4eec\u4e5f\u613f\u672c\u7740\u5f00\u653e\u7684\u6001\u5ea6\uff0c\u542c\u53d6\u5404\u65b9\u5c31\u5021\u8bae\u63d0\u51fa\u7684\u6709\u76ca\u5efa\u8bae\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">I hope the Chinese initiative will serve as a basis for international rules-making on data security and mark the start of a global process in this area. We look forward to the participation of national governments, international organizations and all other stakeholders, and call on States to support the commitments laid out in the Initiative through bilateral or regional agreements. We are also open-minded to good ideas and suggestions from all sides.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u5e0c\u671b\u5404\u4f4d\u5609\u5bbe\u3001\u4e13\u5bb6\u5b66\u8005\u548c\u4f01\u4e1a\u4ee3\u8868\u5728\u4eca\u5929\u7684\u4f1a\u8bae\u4e0a\u7545\u6240\u6b32\u8a00\uff0c\u5c31\u52a0\u5f3a\u6570\u636e\u5b89\u5168\u4fdd\u62a4\u3001\u4fc3\u8fdb\u6570\u5b57\u7ecf\u6d4e\u96c6\u601d\u5e7f\u76ca\uff0c\u5efa\u8a00\u732e\u7b56\uff0c\u5171\u540c\u63a8\u8fdb\u5168\u7403\u6570\u5b57\u6cbb\u7406\uff0c\u5171\u540c\u6253\u9020\u6570\u5b57\u547d\u8fd0\u5171\u540c\u4f53\u3002<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">I encourage all of you to speak your mind at today&#8217;s seminar and pool your insights and suggestions on data security and digital economy. By working together, we can jointly advance global digital governance and build a community with a shared future in the digital world.<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u9884\u795d\u672c\u6b21\u7814\u8ba8\u4f1a\u53d6\u5f97\u5706\u6ee1\u6210\u529f\uff01<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">In conclusion, I wish the seminar a great success!<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t&nbsp;\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<span style=\"font-size:14px;\">\u6765\u6e90\uff1a\u5916\u4ea4\u90e8\u7f51\u7ad9 \u65e5\u671f\uff1a2020\u5e749\u67088\u65e5<\/span>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<a href=\"http:\/\/www.xinyifanyi.com\/\" target=\"_blank\"><span style=\"font-size:14px;\">\u5fc3\u8bd1\u7ffb\u8bd1\u5de5\u4f5c\u5ba4<\/span><\/a>\n<\/p>\n<p style=\"font-family:Verdana, Arial, Helvetica, sans-serif;background-color:#FFFFFF;\">\n\t<a href=\"http:\/\/www.xxyyfy.com\/\" target=\"_blank\"><span style=\"font-size:14px;\">\u82f1\u8bed\u7ffb\u8bd1<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"\u575a\u5b88\u591a\u8fb9\u4e3b\u4e49 \u5021\u5bfc\u516c\u5e73\u6b63\u4e49 \u643a\u624b\u5408\u4f5c\u5171\u8d62 \u2014\u2014\u5728\u5168\u7403\u6570\u5b57\u6cbb\u7406\u7814\u8ba8\u4f1a\u4e0a\u7684\u4e3b\u65e8\u8bb2\u8bdd 2020\u5e749\u67088\u65e5&nbsp; [&hellip;]","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[132],"tags":[],"class_list":["post-10843","post","type-post","status-publish","format-standard","hentry","category-132"],"views":2132,"_links":{"self":[{"href":"http:\/\/www.xxyyfy.com\/index.php?rest_route=\/wp\/v2\/posts\/10843"}],"collection":[{"href":"http:\/\/www.xxyyfy.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.xxyyfy.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.xxyyfy.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/www.xxyyfy.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10843"}],"version-history":[{"count":0,"href":"http:\/\/www.xxyyfy.com\/index.php?rest_route=\/wp\/v2\/posts\/10843\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.xxyyfy.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.xxyyfy.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10843"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.xxyyfy.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}