{"id":1268,"date":"2024-12-17T09:27:05","date_gmt":"2024-12-17T09:27:05","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=1268"},"modified":"2024-12-17T09:27:05","modified_gmt":"2024-12-17T09:27:05","slug":"us-moves-to-tighten-restrictions-on-china-telecom-amid-security-fears","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=1268","title":{"rendered":"US moves to tighten restrictions on China Telecom amid security fears"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>The US Commerce Department is intensifying its actions against China Telecom\u2019s US unit over concerns that its cloud and internet services could be used to funnel American data to Beijing, according to a Reuters\u00a0<a href=\"https:\/\/www.reuters.com\/business\/media-telecom\/us-moves-boost-crackdown-china-telecoms-us-unit-source-says-2024-12-17\/\">report<\/a>.<\/p>\n<p>The department issued a preliminary finding last week, stating that China Telecom Americas\u2019 involvement in US networks and cloud services presents a national security risk, the report said. The company was given 30 days to respond.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The US Commerce Department is intensifying its actions against China Telecom\u2019s US unit over concerns that its cloud and internet services could be used to funnel American data to Beijing, according to a Reuters\u00a0report. The department issued a preliminary finding last week, stating that China Telecom Americas\u2019 involvement in US networks and cloud services presents [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":1269,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1268","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1268"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1268"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1268\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/1269"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1268"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}