Skip to main content

Global data resource competition and risk prevention

 The 21st century is the era of digitalization, and the data in cyberspace is growing exponentially. Big data has become an important resource for all countries, and it has also become a "rich mine" for capital to compete for. In the process of continuous capitalization and commodification of data, a new hegemony is gradually derived from the connection between capital and data. Some Internet platforms wantonly seize and occupy user information and data, snatch data resources, control the capital market, and even collude with some governments, use data hegemony to interfere in other countries’ internal affairs, manipulate public opinion and decision-making, and have a huge impact on mass material production activities, and also on other countries. Sovereignty and information security pose a great threat and lead to many risks.


1. Data enclosure: snatch data resources


The so-called data refers to any records of information electronically or otherwise, including similar chat records, call records, email records, transaction records, and government affairs records formed by individuals, enterprises, and organizations using various Internet applications or other methods. With the rapid development of the digital economy, from social interaction to employment, education to medical care, social development and public life are increasingly inseparable from digital technology and data. The importance of data has surpassed the status of land and machines in industrial capitalist society, and has become the core production factor of the contemporary information society. [1] Data has become an important resource for big countries and enterprises to compete and compete. Whoever owns the data has the initiative.


In order to maximize the capture and possession of massive data, some capital giants are trying their best to use modern information and communication technology to expand the "data domain", build a digital platform ecosystem around the world, and do everything possible to collect human production through the "enclosure movement". The information data of life to realize the depriving possession of data. In fact, this privatized "enclosure" behavior can be traced back to the 13th century, but unlike the early English farmers' spontaneous agreement enclosure behavior in order to maintain their livelihoods, the "enclosure movement" that continues to occur in modern society is for the purpose of conducted by the market. [2]


Compared with natural forms of land resources, the complexity of data resources lies in the use of data and its potential for value creation. From the nature of data, data is non-competitive, and can be used multiple times without losing its value, and it is not affected by the depreciation of tangible assets; however, the "true" value of data is virtual and hidden. The characteristics of data and extensiveness often depend on the ability of others to collect, transmit, store and analyze data. [3] Entering the era of big data, Internet giants represented by Amazon (Amazon), Apple (Apple), Facebook (Facebook), Google (Google), and Microsoft (Microsoft) have once again launched a “circle of competition for data resources”. Earth Movement". They take advantage of technology and capital to attract users to gather by providing a large amount of free information, services and entertainment. They connect the vast majority of digital resources and network users in the world in the form of information intermediaries, subverting the early stage of relying solely on Attention's "attention merchant" profit model has turned to the processing and control of user data. [4] By collecting and tracking users’ personal information, web browsing traces, likes, comments and other network behaviors, every search, every purchase, and even every choice of users are silently stored, and data resources are continuously privatized , the ownership and use rights of data are concentrated in the hands of a few people (platforms), and users have no other choice but to submissively sell their data rights in a "default" way.


In addition, these Internet platforms have not hesitated to carry out early acquisitions and cross-border mergers and acquisitions at super high premiums, and continue to embezzle international market share, that is, by controlling data production, circulation, manipulating industry standards and other "enclosure" behaviors to build a "landscape" "Walled garden" (walled garden), forming its own exclusive data flow and data pool, to gain a competitive advantage that others cannot surpass. [5] Taking Google as an example, the company has successively acquired Motorola, YouTube, Bufferbox, DoubleClick and other companies since 2013, thus expanding its business scope from search engines to operating systems, social platforms, urban brains, autonomous driving, Google Most of the digital frontier technology fields, such as maps, have gradually formed a "center-scattered" multi-industry chain extension [6], embedded in the daily life of the public, and become one of the most influential infrastructure service platforms to achieve their own digital Oligopoly monopoly. According to a 2019 survey by UNCTAD, Google holds about 90% of the world's Internet search market, Amazon has about 40% of global retail activity, and Facebook accounts for two-thirds of the world's social media The media market, which has more monthly active users than China's population, generates 4 megabits of data every day, including 10 billion messages, 350 million photos and 100 million hours of video viewing. [7]


2. Data Hegemony: Violation of Data Sovereignty


In the age of digital technology, power is based on data. [8] Since the 20th century, the digital divide and economic gap between countries have enabled American digital companies to maintain their absolute dominance in the global digital world, and also provided conditions for the data hegemony of developed capitalist countries led by the United States. As the birthplace of the Internet, the United States has only one main root server and nine auxiliary root servers, which is equivalent to controlling the "territorial rights" of the digital space. [9] The conspiracy with some monopoly platforms has further strengthened their control and monopoly on data, enlarged the scope of their control over data owners, and gradually transformed the Internet space with public attributes into one under hegemonic domination. private domain.


On the one hand, they break through national boundaries in the name of freedom, invade other countries’ markets, continue to accelerate cross-border data flow, control the output of digital capital, and obtain users from various countries by virtue of their first-mover advantage and monopoly on data resources. Information and behavioral traces, and even collect and monitor data of other countries through covert means, violate the data sovereignty and network sovereignty of other countries. In 2013, after Snowden's "Prismgate incident" exposed the inside story of US security services using some Internet companies to collect global data, "data sovereignty" has caused widespread discussion. [10] Data sovereignty is the extension and expansion of the connotation of a country’s national sovereignty, that is, the country’s jurisdiction and control over data and data-related technologies, equipment, service providers, etc., including the highest jurisdiction of data within the domain and the independence and autonomy of the outside world. , the right to participate in cooperation in international affairs, etc. [11] On March 1, 2017, the Cyberspace Administration of my country and the Ministry of Foreign Affairs jointly promulgated the International Strategy for Cyberspace Cooperation, which regards safeguarding the principle of data sovereignty as an important means of managing cybersecurity in my country, but those with absolute advantages in the Internet field The United States did not retreat after the Snowden case. Instead, it more openly promoted its so-called "data freedom" theory and used technical means to exercise data hegemony over other countries' data. In 2020, the US Central Intelligence Agency (CIA) was once again revealed to have a 60-year eavesdropping and monitoring plan with the Swiss Crypto company. The Washington Post said that the CIA was still using this company to eavesdrop on their opponents and allies until 2018. A total of 120 Yu Guo's intelligence information, while profiting millions of dollars. [12] From e-mails to communication information, it is impossible to escape surveillance, and a large amount of data also flows to the US data system under this bottomless illegal behavior. They can not only extract high value-added information applied to production practice from massive data, but also interpret and analyze political, economic, military and other information closely related to national security, directly threatening the national security of other countries.


On the other hand, the United States not only uses political, diplomatic and other means to maliciously suppress companies from other countries (such as Huawei, TikTok and other platform software) to help domestic digital companies conduct unfair competition, but also uses legislative provisions to "wash white" for itself, so that it can obtain Legalization of the behavior of data in other countries. After the "9.11" incident, the "USA PATRIOT Act" promulgated by the United States stipulated that U.S. intelligence agencies can directly access the servers and databases of Internet companies such as Microsoft, Yahoo, and Google in the United States to obtain relevant data;[13] In 2018, US President Trump signed the "Clarification of the Lawful Use of Overseas Data" (also known as the "Cloud Act"), which clarified that the power of US law enforcement agencies to retrieve data from network operators has extraterritorial effect; Federal law enforcement can prohibit or restrict sensitive data in key areas and industries, and can compel U.S.-based electronic service providers to disclose data in their possession, custody, or control. [14] In 2019, the United States, together with its 32 allies, held a meeting on 5G security guidelines in Prague, trying to use the “Prague Proposal”, which is not yet binding, to exclude competitors such as Huawei and lead the formulation of 5G International rules for cybersecurity. [15] In April 2020, U.S. Secretary of State Pompeo announced that the U.S. would prohibit all IT vendors (including ZTE and Huawei) deemed “untrustworthy” from receiving access through means including transmission, control, computing or storage equipment. Enter the 5G network of any country and operator, and update the Clean Network plan in June 2020, claiming to completely exclude Chinese information from telecom services, program stores, application software, cloud services, cables, and 5G. Industrial products and services. [16] It is not difficult to see that this series of "long-arm jurisdiction" policies of the United States not only expands its power to unilaterally obtain data from outside the territory, but also attempts to maintain its hegemonic rule by formulating international rules in cyberspace, constructing a system with the United States as the The Center's Global Data Governance System.


3. Data Tyranny: Manipulating Public Opinion in Decision-Making


In the era of big data, the extraction and application of data has become a new business model for realizing capital appreciation, and the data-driven cognitive model has gradually become a new standard for public decision-making and implementation, reconstructing people's understanding of the world and access to information. and access to knowledge. Faced with decision-making choices, the public's reliance on experience and intuition is gradually decreasing, while the reliance on data analysis is increasing. "Let data speak and make decisions based on data" is becoming a new "judgment criterion" in the production and life of the public. [17] However, the big data from the tracking, observation and recording of human behavior is not always the true representation of objective facts. Once these data are controlled by capital, they may become the power and benefit driven to satisfy the ambition of the capital owner. , a tool of tyranny of selfish desires.


During the 2016 U.S. election, Cambridge Analytica of the United Kingdom illegally obtained the private data of more than 50 million Facebook users, analyzed and characterized the psychological characteristics of users, and filtered and selected the information content that the public saw differently, including the form of information expression, topics, etc. tone, etc., and delivered customized political advertisements or fake news to them, which affected the results of the general election voting to a certain extent; [18] In the Hong Kong incident in 2019, social media such as Facebook and Twitter selectively "ignored" Activists use their platform to plan and organize a series of violent action plans, but label some pictures and information that reveal the truth as "to be verified", and even delete or disable these accounts in an attempt to influence the public opinion of the incident.


With the help of smart media, wearable devices and sensors, a large amount of data can be automatically uploaded even if the user does not actively save it. People's social relations, consumption records and even all aspects of life are clearly recorded like a lens. . These unprocessed "metadata" are easily used by some Internet platforms or institutions engaged in data transaction intermediary services to create user models and form user portraits through data analysis and description, so as to predict user behaviors and thoughts, and use this as a source of income. and means of market control. Especially when the right to aggregate and distribute news information is transferred to social platforms, the traditional "content-based" model based on news professionals' judgment of news value gradually gives way to "content-based" models based on user behavior data, attribute data and social network data. In the “data-driven” model, the degree of matching and arrival rate between media content and users is almost entirely dependent on the platform’s algorithmic mechanism, and capital platforms that hold user data begin to play more of the role of information gatekeepers.


The expansion of power increases the risk of data tyranny: advertisements and information can be selectively pushed and blocked based on data control, certain political opinions, issues or characters are deliberately highlighted or weakened, and user wishes are violated or even manipulated. For example, the "social death" incident of "Twitter President" Trump in January 2021: In just a few days, the "Presidential Account" with 80 million followers was "publicly disclosed" by platforms such as Twitter, Facebook, Instagram, YouTube, etc. Executed”, and the accounts were frozen one after another. The dignified incumbent president was reduced to being banned from the entire Internet, which also caused an uproar in the world. [19]


In the "equality myth" created by the Internet, we are often told that the Internet frees us from the control of information by the "masters". [20] These seemingly objective, fair, and de-ideological false impressions make people ignore the capital bias and many opaque problems hidden behind the technology. In fact, the data tyranny of the digital society is hidden in the process of data mining and analysis, hidden in the presentation and application of data, and manipulated by those with ulterior motives. The data used as the basis for decision-making has been embedded with strong preferences in the process of its quantification and interpretation, so that users are unknowingly confused and make decisions that they think are "heart",[21] The essence is capital power The carefully constructed information cocoon room and scene presets are used to control the public to "act according to the wishes of capital".


4. Data Governance and Risk Prevention


The types of risks faced by data security in the era of big data are diverse, and the competition for data resources among various parties in various countries has entered a white-hot stage. Although the increasingly huge Internet platform has provided a wealth of products and services for global netizens, it has also created the hegemony of capital and platforms due to its monopoly on data, technology and resources. The asymmetry, opacity and inequality in data resources, data processing and data flow have created unprecedented challenges to the original data security and national security.


How to ensure data security, maintain the relationship between data rights protection and the free flow of data, and effectively regulate platform behavior has become an important issue in the construction of governance capacity in various countries, and has become a brand-new element of national strength. Therefore, the state needs to start from the top-level design, and comprehensively implement systematic governance, legal governance, and source governance. Actively promote the formulation of international rules and standards in the digital field internationally, advocate an equal competition pattern for the safe and free flow of data, and ensure privacy security, data security and national security; strengthen the construction of big data infrastructure domestically, cultivate new models of digital economy industries, New business formats, build effective counter-forces, and create a healthy network ecological environment where multiple subjects cooperate and govern together. Specifically, it can be dealt with in the following aspects:


(1) Advocating the formulation of international rules in the digital field and promoting the safe and free flow of data


From a global perspective, data interconnection is the only way to break "digital islands" and prevent "data enclosures". The safe flow, development and utilization of data determines the asset value of data to a certain extent, which is related to the top-level design of data governance. In the face of data resource monopoly and hegemonic competition under capital control, the construction of a global digital domain rule system under the premise of ensuring data security will help prevent data monopoly risks, promote the international cooperation, utilization and open sharing of data resources. The development of my country's digital industry is of great significance.


At present, the most complete and strict data protection regulations in the world are the General Data Protection Regulation (GDPR), which was passed by the European Union in 2016 and formally implemented in 2018. Among them, strict regulations on the cross-border flow of various types of data: require data receiving countries (regions) to ensure that they meet a sufficient level of protection standards before allowing data to flow across borders, and highly emphasize the priority of data sovereignty. The formulation is far-reaching. [22] In February and June 2020, the EU successively released the A European Strategy for Data and the European Data Protection Authority Strategic Plan (2020-2024) - Shaping a Safer Digital Future (EDPS). Strategy 2020—2024—Shaping a Safer Digital Future) to further strengthen the rules of data space security governance, and put forward the concept of "digital solidarity" to formulate security and usage rules for general data and industrial data, aiming to create a safer and more secure environment. A fair and more sustainable EU data space for the economic development of the EU Single Data Market. The difference is that the UK advocates an "open" data governance concept. In 2017, the United Kingdom advocated the establishment of data sharing agreements in the "Digital Economy Act" to break the phenomenon of "separation" between government agencies [23], and in 2018, its data open platform "data.gov.uk" was upgraded to allow Government departments, social organizations, and the general public upload, download and process open data, and invest in the establishment of the world's first "Open Data Institute"; The National Data Strategy proposed to cooperate with various countries to develop "sharing standards", and established "supporting the international flow of data under the premise of security" as one of the five strategic goals to further promote the process of data opening between national governments. There are also some countries, such as Australia, which take relatively compromise measures to regulate the cross-border flow of data by classifying and managing data, classifying and labeling, and combining mandatory guidelines with recommended guidelines. [24] India, on the other hand, uses “data nationalism” as a starting point, emphasizing the necessity of outbound data control, as stated in its draft “National E-Commerce Policy” released in 2019, “India and its citizens have sovereignty over their data, but This right should not be extended to non-Indians”[25].


Due to their different national conditions and interest demands, different sovereign countries have different regulatory concepts and propositions on data ownership and cross-border data flow, and there are multiple conflicts in the construction of data governance mechanisms. An open, cooperative, mutually beneficial and win-win global data governance Rules and standards need to be established urgently. In September 2020, the "Global Data Security Initiative" launched by China puts data governance under the framework of international multilateral cooperation, calling on all countries to jointly discuss measures to deal with data security risks, and to deal with data development issues under the principle of equal emphasis on development and security. Formulate unified rules, and in the newly adopted "14th Five-Year Plan" once again proposed to establish basic systems and standards such as data resource transaction and circulation, cross-border transmission and security protection, and promote the safe development and utilization of data resources. [26] The Data Security Law, which came into effect on September 1, 2021, is my country’s first basic law in the field of data security. Article 3 of Chapter 1 clearly defines data security as “by taking necessary measures to ensure that data The state of effective protection and legal use, as well as the ability to ensure a continuous security state,” proposed a “dual-principle model” for managing data flow risks with “data security” as a restrictive condition and data sovereignty and national security as the bottom line [27] ]. This avoids too broad restrictions and hinders the development of data as much as possible, and puts forward responsibility requirements for data integrity, confidentiality, availability and dynamic development of data. In order to promote the formation of global data governance rules as soon as possible, the development is relatively sound. It has established a basic framework for properly handling the cross-border flow of data, data security and data sovereignty, which not only shows my country's basic attitude of adhering to opening up and international cooperation, but also shows its high concern for national security.


As a responsible major country, China should continue to actively promote the formation of international rules in the digital field through international exchanges, dialogues and negotiations, and use international platforms such as the "Belt and Road" initiative and the Boao Forum for Asia to strengthen international coordination and cooperation in data security. , build a national data unified sharing and open platform, expand the openness and transparency of basic public information data or establish a "data trust institution" with blockchain technology [28], and under the principle of adhering to the principle of network sovereignty, through the refinement of multilateral cooperation agreements for data security protection The extraterritorial effect of data security protection promotes the rational development and utilization of data resources, broadens the channels for sovereign countries to deeply participate in global data governance, continuously promotes the rational development and utilization of data resources, and leads the high-quality development of global data trade and digital economy.


(2) Optimizing the construction of data infrastructure and developing autonomous data technology


At present, Western platform giants rely on the "aggregation effect" of data, that is, the larger the number of users on a specific platform, the more data, and the greater its commercial value, gradually forming a "winner takes all" oligopolistic competition pattern. In order to break through the siege and prevent monopoly capital from continuing to occupy "useless and unowned" data, or illegally grabbing users' data resources, it is necessary to systematically deploy big data infrastructure construction, continuously develop and improve autonomous data technology, and cultivate domestic digital economy. New industries, new business forms and new models, and build a digital industry to effectively counteract new forces.


In recent years, Alibaba, Huawei, Tencent, Baidu, ByteDance and other large digital companies have taken data business as one of the core businesses of the company and have emerged worldwide. For example, Alibaba Cloud has successively deployed more than 200 data centers in 14 regions around the world, providing multiple services to billions of users around the world; and Tencent also began to deploy the global cloud service market in early 2016, and proposed a complete Tencent Cloud In just a few years, the overseas plan has opened 25 geographic regions and operated 53 availability zones around the world, with rapid development. It is foreseeable that with the investment of more technical resources and supporting service systems, China will gradually have the strength to "wrench the wrist" with the data hegemony. However, the data dominance that the United States has accumulated over the past decades cannot be underestimated. Many domestic companies still rely on American digital companies to conduct business, which greatly limits data security and corporate development. The localization of the underlying infrastructure of some departmental data centers has a low degree of autonomy and controllability. Once maliciously attacked, a large amount of data related to the national economy and people's livelihood may be stolen or leaked, causing huge potential harm to national security. [29]


In the face of risks, the security protection of data resources should be changed from "unawareness" to "prevention before it happens". On the one hand, from the perspective of infrastructure, continue to speed up the construction of new infrastructure such as my country's big data centers, 5G communication networks, and data development platforms, write data into production factors, unswervingly implement the national big data strategy, and actively develop Independent innovation of big data technology, develop big data statistical system and metadata application system, improve the utilization efficiency of data resources and radiation resources, improve data analysis and processing capabilities, and increase the possession of data resources in my country; at the same time, integrate the principles of data security development into In the design of my country's data technology, the data encryption technology, data firewall technology, data desensitization technology, digital watermarking technology, etc. in the process of "collection, storage, transmission and management" of big data are improved, and a technical support system with independent intellectual property rights is formed, which is effective. Prevent data leakage, abuse and other data risks, and further improve the availability, inclusiveness, and convenience of data resources for the Chinese government and social enterprises.


On the other hand, continue to strengthen the cooperation between the government and enterprises, promote the development of domestic platforms through policy support, capital investment and technical support, improve the construction of Chinese enterprises, and establish a group of world-class platform enterprises with international competitiveness; Data security supervision of platform institutions with power, large data resources and huge consumer traffic, strengthen the governance of capital-controlled public opinion such as monopoly social media platforms and public communication resource platforms, and try to control the huge public opinion resources mastered by some monopoly platforms. nationalize. [30] Relevant departments should also strengthen research on the business models of different platforms and exchanges with platform companies, in-depth study of the market concentration of different industries and business operations of companies, and conduct cross-border data flow, transaction methods and extraction and use standards. Standardize and strengthen security control for some sources that have not yet triggered a crisis. For example, when intermediaries engaged in data transactions provide services, they require the data provider to explain the source of the data, review the identities of both parties to the transaction, and keep audit and transaction records to minimize risks. drop to lowest. Strengthen risk monitoring for data transactions and data processing activities that may induce social and public security incidents, conduct interviews with organizations and individuals with relatively large data security risks, and require them to take immediate remedial measures for rectification. Data-driven mergers and acquisitions aimed at realizing platform monopoly and preventing the expansion of data hegemony.


(3) Establish a joint data supervision mechanism and attach importance to the protection of data life cycle


With the popularization of the application of Internet technology and artificial intelligence technology, data resources come from the whole cycle process of data life, which mainly includes 9 stages of data creation, collection, organization, processing, storage, release, discovery/acquisition, value-added and evaluation [ 31], and data security risks and privacy leakage risks also run through them. To achieve the goal of overall good governance, data governance should view the value of data from a global perspective, build a data joint supervision mechanism based on the life cycle of data, integrate relevant institutions and resources to establish government-led multi-subject collaborative governance, and improve data quality. , assets, risk security, etc. to coordinate, coordinate and manage, enhance the control of data generators and data regulators over data, and build a healthy network ecological environment.


First, optimize the governance structure. In this battle for data, the Internet platform that masters data resources has become one of the most important competitors. The advancement of global data governance is inseparable from the coordination of data rights among individuals, enterprises and sovereign countries. This requires us to clarify the rights, responsibilities, obligations and various behavior boundaries of different roles such as data owners, users, controllers, traders and regulators in the process of data domination, income and disposal, and respect, encourage and guide them. Non-government entities such as the network data industry, organizations, and platforms have leveraged their professional advantages to actively participate in data governance, forming a data security risk governance model in which multiple entities collaborate and co-governance. In particular, as the user of data, the reviewer of content, and the public administrator of maintaining industry order, the Internet platform should fully awaken and strengthen its awareness and willingness to participate in governance, and incorporate the enterprise’s data protection behavior into the enterprise’s comprehensive strength evaluation system. Internalize data security responsibility into its action logic, advocate responsible data utilization; clarify its data security protection obligations, authorize it to be responsible for the data and data security collected and generated during work, fill in the vague areas of data security risk prevention and control, and build Consolidate the main foundation of the platform data governance collaborative and co-governance pattern.


Second, establish a data full-cycle governance mechanism. The increasingly severe data problems require national government departments to establish a unified big data governance platform within the government-platform-users as soon as possible to solve the problem of data exchange between internal horizontal and vertical, and form information sharing, communication and negotiation, mutual supervision and management. through the overall consideration of data input, collection, use and expiration, establish a data classification and grading protection system, implement more targeted and strict management of important data and core data at different stages, and use artificial intelligence. Technology assists the establishment of a real-time system vulnerability detection mechanism, content review mechanism, etc., including data quality of individuals (users), assets and data automatically produced by machines, controlled applications, or data that is not directly linked to specific individuals. Governance.


Finally, improve the formulation and connection of relevant supporting laws and regulations, and improve social data literacy. Compared with Europe and the United States and other countries, the construction of the legal system in the field of data security in my country started late, the formulation of relevant supporting laws has not been perfected, and some mechanisms are not mature enough. [32] In order to give full play to the professional advantages of online platforms, some laws and regulations endow some platforms with a certain degree of autonomous power. This power is often expansive due to technological monopoly. It not only shares the transfer of government power, but also erodes the government. The operating boundaries of power. [33] However, in the face of the special role of enterprise platforms in data security governance, the current laws on corporate responsibilities and obligations are relatively general, and there is a lack of targeted and diversified corporate legal liability regulations. The pattern of responsibility relations faces the risk of imbalance and distortion. Therefore, in the future, it is necessary to further improve the institutional arrangement of network platforms in data transmission, use and protection and the legal requirements to be followed, and formulate data governance requirements in related fields according to different types of enterprises, so as to form more targeted and operational rights The content of obligations and the boundaries of rights are clearly defined. At the same time, the data literacy concept of each relevant subject is also an important factor affecting the security and privacy of data openness. Data literacy education should be embedded in daily life and various management systems, and attention should be paid to network platform leaders, staff and users in data governance. To cultivate awareness and literacy of the rule of law, set up relevant learning sections and channels, and provide users with a variety of ways to improve data learning, so that netizens have a strong awareness of their own rights, and can timely wake up to the illegal collection, analysis and use of data, and actively safeguard their own legality. rights and interests.


V. Conclusion


Under the wave of digital economic development, the importance of data resources has become increasingly prominent, and countries are accelerating the strategic layout of big data, with more competition for data, the "new type of oil" for collection, utilization and value mining. In the absence of unified international rules and standards, some countries have broken their promises, used capital to build digital barriers, plundered data resources, and violated the data sovereignty of other countries, which also resulted in risk problems such as data enclosure, data hegemony, and data tyranny. The country's data security and national security pose a huge threat. In response to the above situation, only from the national level, vigorously promote the free and safe flow and rational development and utilization of cross-border data resources, lead the construction of an international data rule system, systematically deploy the construction of big data infrastructure and the development of independent data technology, and establish a joint data supervision mechanism. , attach importance to the protection of the entire data life cycle, cultivate new formats and new models of the digital industry, so that leading national companies such as Tencent and Huawei can establish themselves in their own countries and go global, have a certain market share in the world, and reconstruct a new pattern of equal competition in the digital field. Only by making my country truly a leader in the sound development of global data trade and digital economy can we effectively deal with the risks of future 5G, artificial intelligence, and industrial Internet development needs.


Hubei Teyer Pharmaceutical Co Ltd | API & Intermediates Manufacturer

Hubei Teyer Pharmaceutical Co Ltd - API Manufacturing Experts

Established 2002 in Tianmen City, Hubei Province

26,000㎡ production base | 120km from Wuhan

About Hubei Teyer Pharmaceutical Co Ltd

  • ✅ 20+ years pharmaceutical manufacturing experience
  • ✅ Specialized in APIs and advanced intermediates
  • ✅ Patented synthesis technology for Valganciclovir Hydrochloride
  • ✅ First Chinese manufacturer of monoacetyl Ganciclovir

Core Pharmaceutical Products

Active pharmaceutical ingredients

  • Ganciclovir
  • Valaciclovir Hydrochloride
  • Valganciclovir Hydrochloride

Quality Certifications

China GMP Certified Facilities

Compliant with USP/EP/CP Standards

Partner with Hubei Teyer Pharmaceutical

Request Quote Download Product Catalog
Hubei Teyer Pharmaceutical Co Ltd
Tianmen Economic Development Zone
Hubei Province, China 431700
Tel: +86-138 371 78289 E-mail: info@hubeiteyer.com