Feeds

China wants mobile app approval, tracking powers

Smartphone makers may need to have apps pre-approved before release

Internet Security Threat Report 2014

China's latest plans to regulate its domestic mobile apps industry could force smartphone manufacturers to conduct costly and time-consuming extra testing, as well as help the government track users.

The new regulations have been filed with the World Trade Organisation to notify it on potential barriers to trade and match a draft law unveiled in June by the Chinese authorities, according to Wall Street Journal.

China’s unregulated app market is a hotbed of malicious activity, with premium rate diallers and data stealing malware prevalent in the nation's many unofficial app stores.

The proposed laws can therefore be interpreted as an attempt to clean up the industry, making their call for smartphone makers and platform providers to ensure that pre-installed apps and those on official app stores comply with Chinese law before going on sale.

Whether the proposal is workable is another question, as the current wording means apps would likely require smartphone makers to get the green light from the Ministry of Industry and Information Technology (MIIT) before any software updates can be rolled out.

There’s also a requirement to build new phones according to China Communications Standards Association standards, which could mean phone makers in the future being forced to hand over data which could identify users and track their app use, the report said.

To be fair, back in April, MIIT deputy director Xiong Sihao was even forced to publicly criticise state-run operators China Telecom and China Mobile for “many problems” in their respective app stores.

However, as with all government-mandated regulations in the People’s Republic, alongside the promise of more secure systems there is also the threat that the authorities could use such power to censor any content deemed to be offensive or challenging its authority. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Managing SSL certificates with ease
The lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, and how the right SSL certificate management tool can help.