<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>China Business Review</provider_name><provider_url>https://www.chinabusinessreview.com</provider_url><author_name>USCBC</author_name><author_url>https://www.chinabusinessreview.com/author/uscbc/</author_url><title>The 5 Levels of Information Security in China - China Business Review</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content"&gt;&lt;a href="https://www.chinabusinessreview.com/the-5-levels-of-information-security-in-china/"&gt;The 5 Levels of Information Security in China&lt;/a&gt;&lt;/blockquote&gt;
&lt;script type='text/javascript'&gt;
&lt;!--//--&gt;&lt;![CDATA[//&gt;&lt;!--
		/*! This file is auto-generated */
		!function(c,d){"use strict";var e=!1,n=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},!c.wp.receiveEmbedMessage)if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(t)if(t.secret||t.message||t.value)if(!/[^a-zA-Z0-9]/.test(t.secret)){for(var r,a,i,s=d.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),n=d.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),o=0;o&lt;n.length;o++)n[o].style.display="none";for(o=0;o&lt;s.length;o++)if(r=s[o],e.source===r.contentWindow){if(r.removeAttribute("style"),"height"===t.message){if(1e3&lt;(i=parseInt(t.value,10)))i=1e3;else if(~~i&lt;200)i=200;r.height=i}if("link"===t.message)if(a=d.createElement("a"),i=d.createElement("a"),a.href=r.getAttribute("src"),i.href=t.value,i.host===a.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener("message",c.wp.receiveEmbedMessage,!1),d.addEventListener("DOMContentLoaded",t,!1),c.addEventListener("load",t,!1);function t(){if(!n){n=!0;for(var e,t,r=-1!==navigator.appVersion.indexOf("MSIE 10"),a=!!navigator.userAgent.match(/Trident.*rv:11\./),i=d.querySelectorAll("iframe.wp-embedded-content"),s=0;s&lt;i.length;s++){if(!(e=i[s]).getAttribute("data-secret"))t=Math.random().toString(36).substr(2,10),e.src+="#?secret="+t,e.setAttribute("data-secret",t);if(r||a)(t=e.cloneNode(!0)).removeAttribute("security"),e.parentNode.replaceChild(t,e)}}}}(window,document);
//--&gt;&lt;!]]&gt;
&lt;/script&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.chinabusinessreview.com/the-5-levels-of-information-security-in-china/embed/" width="600" height="338" title="&#x201C;The 5 Levels of Information Security in China&#x201D; &#x2014; China Business Review" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;</html><thumbnail_url>https://www.chinabusinessreview.com/wp-content/uploads/2016/11/cybersecurity-cmi.jpg</thumbnail_url><thumbnail_width>768</thumbnail_width><thumbnail_height>520</thumbnail_height><description>While cybersecurity challenges have long affected foreign companies operating in China and raised concerns about discriminatory treatment of foreign products&#x2014;particularly China&#x2019;s recent push for &#x201C;secure and controllable&#x201D; technology&#x2014;the beginnings of this trend can be traced to the early 1990s with China&#x2019;s adoption of the multi-level protection scheme (MLPS). Today, companies describe an increasingly restrictive environment that is squeezing their market share as regulators increasingly link national and cybersecurity to government procurement, data management, and IT system integration. This squeeze is particularly evident in China&#x2019;s implementation of MLPS.</description></oembed>
