• Huawei

Huawei (Photo : Reuters)

Even though United States officials are labeling China's new information security rules as being protectionist and discriminatory, some opined that the new rules are justified.

Chinese analysts believe that the new policies are only under attack because U.S. companies and officials want to take advantage of the massive Chinese market.

Like Us on Facebook

Over the weekend, the U.S. media reported that several executives leading Silicon Valley companies as well as trade association officials had called for Washington to be tough with Beijing and asked the city to withdraw new regulations on information security that can make their operations in China difficult.

U.S. officials, Secretary of State John Kerry, Treasury Secretary Jacob Lew, Commerce Secretary Penny Pritzker and Trade Representative Michael Froman responded by signing and sending letters to their Chinese counterparts to suspend these regulations. Chinese analysts believe that there is no reason to bend to U.S. pressure as the new policies are justified.

They claim that because the Chinese consumer market is such a lucrative market for U.S. technology firms, companies would seek the best way to tap into the market and, at the same time, debunk any policies of the country and label them as trade protectionism so that they could gain more.

Analysts also claimed that the U.S. also practices trade protectionism and had been criticized by other countries because of its policies as well.

They also believe that the U.S. officials make use of a non-market economy mindset to depict the country's decisions and policies. As a result, the Chinese government is accused of making policies that would end into the dumping of goods into the U.S. market, even though this violates World Trade Organization rules. Chinese analysts say this is not the case.

Chinese analysts also claimed that China did not react as violently when the U.S. government called for the rejection of Chinese tech companies' services because of national security concerns.

From all these standpoints, they believe that the current information security rules are justified and reality-based.