CHINA
Since October 2020
Pillar Domestic data policies |
Indicator Requirement to perform a Data Protection Impact Assessment (DPIA) or have a data protection officer (DPO)
Amendment to the Information Security Technology – Personal Information Security Specification (GB/T 35273-2020) (信息安全技术-个人信息安全规范) (GB/T 35273-2020) 修正案)
The 2020 Personal Information Security Specification provides that personal information controllers shall appoint a person and a department responsible for personal information (PI) protection. The person responsible for PI protection must have relevant management experience and personal information protection expertise, participate in important decisions on personal information processing activities, and report directly to the principal of the organization.
Coverage Horizontal
Sources
- https://web.archive.org/web/20230221153710/https://www.tc260.org.cn/upload/2020-09-18/1600432872689070371.pdf
- https://web.archive.org/web/20211124183425/https://www.manafoundation.org/uploads/soft/200601/%E4%BF%A1%E6%81%AF%E5%AE%89%E5%85%A8%E6%8A%80%E6%9C%AF%E4%B8%AA%E4%BA%BA%E4%BF%A1%E6%81%AF%E5%AE%89%E5%85%...
CHINA
Since November 2016, entry into force in June 2017
Pillar Domestic data policies |
Indicator Requirement to perform a Data Protection Impact Assessment (DPIA) or have a data protection officer (DPO)
Cybersecurity Law (网络安全法)
Art. 21 of the Cybersecurity Law requires network operators to appoint persons in charge of cybersecurity. Critical information infrastructure operators (CIIO) are also required to set up specialised security management bodies and persons responsible for security management. Further, CIIO's must conduct security background checks on those responsible persons and personnel in critical positions.
Coverage Horizontal
CHINA
Since June 2021, entry into force in September 2021
Pillar Domestic data policies |
Indicator Requirement to allow the government to access personal data collected
Data Security Law of the People’s Republic of China (中华人民共和国数据安全法)
Art. 35 of the Data Security Law stipulates that where public security or national security authorities need to consult any data in order to safeguard national security or investigate a crime, the relevant organizations and individuals must provide such data. The same article stipulates that before getting access to the data held by private organizations, public security or national security authorities must go through strict approval formalities in advance.
Coverage Horizontal
Sources
- https://web.archive.org/web/20231114111252/http://www.cac.gov.cn/2016-11/07/c_1119867116.htm
- https://web.archive.org/web/20231211020322/https://www.dataguidance.com/notes/china-third-country-assessment
- https://web.archive.org/web/20230325150629/http://www.npc.gov.cn/npc/c30834/202106/7c9af12f51334a73b56d7938f99a788a.shtml
- Show more...
CHINA
Since April 2023, entry into force in July 2023
Pillar Domestic data policies |
Indicator Requirement to allow the government to access personal data collected
Counter-espionage Law of the People's Republic of China (中华人民共和国反间谍法)
The Counter-espionage Law of the People's Republic of China permits security authorities to inspect the baggage, electronic devices and facilities of individuals suspected of espionage and obliges logistics and telecommunications companies in China to provide “technical support” to fight espionage (Art. 41). It is reported that the Law’s broad definition of agents may offer an avenue to justify gathering data from foreign firms and their employees while they conduct business in China. This could reportedly give the Chinese authorities access to sensitive company data or trade secrets under the guise of preventing foreign cyber espionage.
Coverage Horizontal
Sources
- https://web.archive.org/web/20231105210414/https://www.chinalawtranslate.com/en/counter-espionage-law-2023/
- https://web.archive.org/web/20230803195143/https://www.lexology.com/library/detail.aspx?g=629864e4-351e-4831-a98f-fa08cb2924fa
- https://web.archive.org/web/20230912230828/https://www.gov.cn/yaowen/2023-04/27/content_5753385.htm
- Show more...
CHINA
Since December 2015, entry into force in January 2016, last amended in April 2018
Pillar Domestic data policies |
Indicator Requirement to allow the government to access personal data collected
Counterterrorism Law of the People's Republic of China (中华人民共和国反恐怖主义法)
Art. 18 of the Counterterrorism Law requires Internet service providers and the telecommunication sector to “provide technical support and assistance, such as technical interface and decryption, to support the activities of the public security and state security authorities in preventing and investigating terrorist activities.”
Coverage Internet service providers and telecommunication sector
Sources
- https://web.archive.org/web/20230324194915/http://www.hoover.org/sites/default/files/research/docs/segal_webreadypdf_updatedfinal.pdf
- https://web.archive.org/web/20231129113030/http://www.xinhuanet.com//politics/2015-12/27/c_128571798.htm
- https://web.archive.org/web/20221210010510/http://www.npc.gov.cn/zgrdw/npc/xinwen/2018-06/12/content_2055871.htm
- Show more...
CHINA
Since September 2018
Pillar Domestic data policies |
Indicator Requirement to allow the government to access personal data collected
Provisions for the Supervision and Inspection of Network Security by Public Security Agencies (公安机关互联网安全监督检查规定)
The Provisions for the Supervision and Inspection of Network Security by Public Security Agencies authorise local law enforcement agencies to conduct remote or onsite inspections of the businesses under their supervision. Inspections must ensure compliance with general regulatory obligations on all businesses under the Cybersecurity Law or specific obligations applicable to internet service providers, including, but not limited to, the implementation of technical measures for network security and data protection that comply with national standards. During such an inspection, law enforcement agencies can physically enter business sites and machine rooms, review and copy relevant information and assess the operational conditions and effectiveness of the technical measures taken by the company to safeguard the security of networks and information.
Coverage Internet service providers
Sources
- https://web.archive.org/web/20211016220414/https://www.morganlewis.com/pubs/2018/10/china-issues-new-rules-strengthening-local-authorities-power-to-enforce-cybersecurity-and-data-privacy-laws
- https://web.archive.org/web/20220517132914/http://www.gov.cn/zhengce/zhengceku/2018-12/31/content_5428637.htm
CHINA
Since September 2000
Pillar Domestic data policies |
Indicator Requirement to allow the government to access personal data collected
People’s Republic of China State Council Decree No. 292 - Internet Information Service Management Measures (中华人民共和国国务院令第 292 号 - 互联网信息服务管理办法)
According to Art. 14 of Decree No. 292, ISPs must provide user information to the authorities upon request, without judicial oversight.
Coverage Internet service providers
Sources
- https://web.archive.org/web/20231018001852/https://digichina.stanford.edu/work/internet-information-service-management-rules/
- https://web.archive.org/web/20231222235649/https://freedomhouse.org/country/china/freedom-net/2022
- https://web.archive.org/web/20230314063141/https://www.gov.cn/gongbao/content/2000/content_60531.htm
- Show more...
CHINA
N/A
Pillar Intermediary liability |
Indicator Safe harbour for intermediaries for copyright infringement
Lack of intermediary liability framework in place for copyright infringements
A basic legal framework on intermediary liability for copyright infringement is absent in China's law and jurisprudence. A safe harbour defence for internet intermediaries providing hosting services is spelt out in the Guiding Framework on Protection of Copyright for Network Dissemination (Art. 14-17, 22). The hosting defence established in Art. 22, only applies to service providers who host third-party materials. However, Art. 36 of the Tort Law of the People's Republic of China states that a "network service provider" shall assume the tort liability if it infringes "upon the civil right or interest of another person."
Furthermore, the Tort Law allows victims of the tort to notify the network service provider to demand the deletion, blocking or disconnection of the cause of infringement. Failing to do so can lead to further liability for the network provider in the event of further harm to the user. Finally, liability can be further increased in the event that the network service provider knew of the infringement but did not take action.
Furthermore, the Tort Law allows victims of the tort to notify the network service provider to demand the deletion, blocking or disconnection of the cause of infringement. Failing to do so can lead to further liability for the network provider in the event of further harm to the user. Finally, liability can be further increased in the event that the network service provider knew of the infringement but did not take action.
Coverage Internet intermediaries
Sources
- https://web.archive.org/web/20240129171425/http://www.article19.org/data/files/Intermediaries_ENGLISH.pdf
- https://web.archive.org/web/20200222120116/http://www.jetlaw.org/2016/01/18/executives-of-a-chinese-online-video-sharing-service-provider-stood-trial-for-internet-pornography/
- https://web.archive.org/web/20220120082414/http://www.wipo.int/export/sites/www/copyright/en/doc/liability_of_internet_intermediaries.pdf
- https://web.archive.org/web/20180425225959/http://www.wipo.int/wipolex/en/text.jsp?file_id=182630
- https://web.archive.org/web/20170402022917/http://www.wipo.int/wipolex/en/details.jsp?id=13403
- https://web.archive.org/web/20231210140045/http://www.hrw.org/news/2013/01/04/china-renewed-restrictions-send-online-chill
- https://web.archive.org/web/20240226143908/http://www.gov.cn/zwgk/2006-05/29/content_294000.htm
- https://web.archive.org/web/20220112052017/http://www.gov.cn/flfg/2009-12/26/content_1497435.htm
- https://web.archive.org/web/20200714182556/http://www.npc.gov.cn/wxzl/wxzl/2000-12/17/content_4680.htm
- Show more...
CHINA
Since October 2020
Pillar Cross-border data policies |
Indicator Conditional flow regime
Amendment to the Information Security Technology – Personal Information Security Specification (GB/T 35273-2020) (信息安全技术-个人信息安全规范》(GB/T 35273-2020)修正案)
Section 9.2.i of the 2020 Specification provides that where personal biometric information must not be shared or transferred unless actually essential for business needs, in which case the personal information subject must be separately informed of the purpose, types of biometrics involved, identification of the recipient and its data security capacity and the personal information subject consent must be explicitly obtained.
Coverage Horizontal
Sources
- https://web.archive.org/web/20240617005345/https://www.wilmerhale.com/en/insights/client-alerts/20200324-china-issues-new-personal-information-security-specification
- https://web.archive.org/web/20220524101741/https://www.pipchina.cn/uploads/20210926/1632643529092037513.pdf
- https://web.archive.org/web/20230910032835/https://www.tc260.org.cn/upload/2020-09-18/1600432872689070371.pdf
- Show more...
CHINA
N/A
Pillar Intermediary liability |
Indicator Safe harbour for intermediaries for any activity other than copyright infringement
Lack of intermediary liability framework in place for copyright infringements
A basic legal framework on intermediary liability beyond copyright infringement is absent in China's law and jurisprudence. A safe harbour defence for internet intermediaries providing hosting services is spelt out in the Guiding Framework on Protection of Copyright for Network Dissemination (Art. 14-17, 22). The hosting defence established in Art. 22, only applies to service providers who host third-party materials. However, Art. 36 of the Tort Law of the People's Republic of China states that a "network service provider" shall assume the tort liability if it infringes "upon the civil right or interest of another person."
Furthermore, the Tort Law allows victims of the tort to notify the network service provider to demand the deletion, blocking or disconnection of the cause of infringement. Failing to do so can lead to further liability for the network provider in the event of further harm to the user. Finally, liability can be further increased in the event that the network service provider knew of the infringement but did not take action.
Furthermore, the Tort Law allows victims of the tort to notify the network service provider to demand the deletion, blocking or disconnection of the cause of infringement. Failing to do so can lead to further liability for the network provider in the event of further harm to the user. Finally, liability can be further increased in the event that the network service provider knew of the infringement but did not take action.
Coverage Internet intermediaries
Sources
- https://web.archive.org/web/20240129171425/http://www.article19.org/data/files/Intermediaries_ENGLISH.pdf
- https://web.archive.org/web/20200222120116/http://www.jetlaw.org/2016/01/18/executives-of-a-chinese-online-video-sharing-service-provider-stood-trial-for-internet-pornography/
- https://web.archive.org/web/20220120082414/http://www.wipo.int/export/sites/www/copyright/en/doc/liability_of_internet_intermediaries.pdf
- https://web.archive.org/web/20180425225959/http://www.wipo.int/wipolex/en/text.jsp?file_id=182630
- https://web.archive.org/web/20170402022917/http://www.wipo.int/wipolex/en/details.jsp?id=13403
- https://web.archive.org/web/20231210140045/http://www.hrw.org/news/2013/01/04/china-renewed-restrictions-send-online-chill
- https://web.archive.org/web/20240226143908/http://www.gov.cn/zwgk/2006-05/29/content_294000.htm
- https://web.archive.org/web/20220112052017/http://www.gov.cn/flfg/2009-12/26/content_1497435.htm
- https://web.archive.org/web/20200714182556/http://www.npc.gov.cn/wxzl/wxzl/2000-12/17/content_4680.htm
- Show more...
CHINA
N/A
Pillar Cross-border data policies |
Indicator Participation in trade agreements committing to open cross-border data flows
Lack of participation in agreements with binding commitments on data flows
China has not joined any agreement with binding commitments on data flows.
Coverage Horizontal
CHINA
Since June 2016, entry into force in August 2016
Pillar Intermediary liability |
Indicator User identity requirement
Administrative Provisions on Information Services of Mobile Internet Application Programs (移动互联网应用程序的信息服务管理规定)
According to the Administrative Provisions on Information Services of Mobile Internet Application Program, app providers must ensure that new app users register with their real names by verifying users’ mobile phone numbers and/or other identity information.
Coverage Internet app providers and mobile Internet app stores
Sources
- https://web.archive.org/web/20200227150425/http://www.loc.gov/law/foreign-news/article/china-cyberspace-administration-releases-new-rules-on-mobile-apps/
- https://web.archive.org/web/20200215210816/https://www.cac.gov.cn/2016-06/28/c_1119122192.htm
- https://web.archive.org/web/20200312125139/http://www.cac.gov.cn/2016-06/28/c_1119122192.htm
- Show more...
CHINA
Since August 2021, entry into force in November 2021
Pillar Domestic data policies |
Indicator Framework for data protection
Personal Information Protection Law《个人信息保护法》
The Personal Information Protection Law (PIPL) is China's comprehensive data protection law and governs personal information processing activities carried out by entities or individuals within China. The PIPL introduces several important concepts, such as personal information, sensitive personal information, and processing.
Coverage Horizontal
Sources
- https://web.archive.org/web/20230318162638/http://en.npc.gov.cn.cdurl.cn/2021-12/29/c_694559.htm
- https://web.archive.org/web/20230327145925/https://www.dataguidance.com/notes/china-data-protection-overview
- https://web.archive.org/web/20201129095844/https://www.mondaq.com/china/data-protection/1010164/china-releases-draft-personal-information-protection-law-
- https://web.archive.org/web/20230926053640/https://www.china-briefing.com/news/data-privacy-china-personal-information-protection-law-it-compliance-considerations/
- Show more...
CHINA
Since September 2000, last amended in February 2016
Pillar Cross-border data policies |
Indicator Ban to transfer and local processing requirement
Telecommunications Regulations of the People’s Republic of China (中华人民共和国电信条例)
It is reported that China's Telecommunications Regulations require all data collected within the country to be stored on Chinese servers. However, the relevant article has not been found in the regulations. Moreover, it is reported that, as a result of this regulation, Hewlett-Packard, Qualcomm, and Uber had to divest more than 50% of their businesses in China to Chinese companies to avoid fines.
Coverage Telecommunication services and cloud services
Sources
- https://web.archive.org/web/20231215121402/https://www.usitc.gov/publications/332/pub4716.pdf
- https://web.archive.org/web/20231229235811/http://www.china.org.cn/business/laws_regulations/2010-01/20/content_19273945.htm
- https://web.archive.org/web/20211021114802/https://www.kneppelhout.com/news/e-commerce-platform-applying-for-edi-license-in-china
- https://web.archive.org/web/20230309072123/http://www.gov.cn/zhengce/2020-12/26/content_5574368.htm
- Show more...
CHINA
Since November 2016, entry into force in June 2017
Since July 2022, entry into force in September 2022
Since July 2022, entry into force in September 2022
Pillar Cross-border data policies |
Indicator Ban to transfer and local processing requirement
Cybersecurity Law (网络安全法)
Outbound Data Transfer Security Assessment Measures (数据出境安全评估办法)
Outbound Data Transfer Security Assessment Measures (数据出境安全评估办法)
Art. 37 of the Cybersecurity Law requires "key information infrastructure" operators to store personal information and critical data within China. Personal information and critical data can be stored outside of China where there is a genuine need for business; in such cases a "security assessment" needs to be conducted in accordance with procedures formulated by the Cyberspace Administration of China (CAC) in collabouration with other authorities.
Art. 4 of the Outbound Data Transfer Security Assessment Measures, promulgated by the CAC, outlines four situations where a security assessment is necessary before an outbound transfer can take place, which include:
1) Cases where the transfer concerns “important data”, which is broadly defined as data that could endanger national security, economic operation, social stability, public health and safety;
2) Cases the transfer concerns personal data by a critical information infrastructure operator or processor of personal information that processed data for 1 million or more individuals;
3) Cases of transfers concerning personal data by a personal information processor that has made outbound transfers of personal information of 100,000 individuals or sensitive personal information of 10,000 persons in the preceding year;
4) Any other situation where the CAC deems a security assessment necessary.
Art. 8 of the Measures covers the factors the CAC considers when undertaking a security assessment, including:
- The risks that the transfer may entail for national security or public interests, among other policy objectives;
- Legitimacy, necessity and method of transfer;
- Whether the level of data protection in the recipient country meets the requirements of laws in China;
- Sensitivity of the data and risks of being tampered with abroad;
- Agreed safeguard measures between the data processor and data recipient;
- Any other matter that the CAC deems necessary.
In case of unfavourable outcomes, the data handler can ask the CAC for a re-assessment and a final decision. In case of a positive decision, the permission to transfer data abroad is valid for two years, but if substantial changes in the risk factors arise, a new assessment might be needed.
Art. 4 of the Outbound Data Transfer Security Assessment Measures, promulgated by the CAC, outlines four situations where a security assessment is necessary before an outbound transfer can take place, which include:
1) Cases where the transfer concerns “important data”, which is broadly defined as data that could endanger national security, economic operation, social stability, public health and safety;
2) Cases the transfer concerns personal data by a critical information infrastructure operator or processor of personal information that processed data for 1 million or more individuals;
3) Cases of transfers concerning personal data by a personal information processor that has made outbound transfers of personal information of 100,000 individuals or sensitive personal information of 10,000 persons in the preceding year;
4) Any other situation where the CAC deems a security assessment necessary.
Art. 8 of the Measures covers the factors the CAC considers when undertaking a security assessment, including:
- The risks that the transfer may entail for national security or public interests, among other policy objectives;
- Legitimacy, necessity and method of transfer;
- Whether the level of data protection in the recipient country meets the requirements of laws in China;
- Sensitivity of the data and risks of being tampered with abroad;
- Agreed safeguard measures between the data processor and data recipient;
- Any other matter that the CAC deems necessary.
In case of unfavourable outcomes, the data handler can ask the CAC for a re-assessment and a final decision. In case of a positive decision, the permission to transfer data abroad is valid for two years, but if substantial changes in the risk factors arise, a new assessment might be needed.
Coverage Key information infrastructure operators
Sources
- https://web.archive.org/web/20220407134758/https://www.dataguidance.com/sites/default/files/en_cybersecurity_law_of_the_peoples_republic_of_china_1.pdf
- https://web.archive.org/web/20231129131106/https://www.gov.cn/xinwen/2016-11/07/content_5129723.htm
- https://web.archive.org/web/20231031122625/http://www.cac.gov.cn/2022-07/07/c_1658811536396503.htm
- https://www.dataguidance.com/comparisons/data-transfers
- https://web.archive.org/web/20231117020458/https://www.oecd-ilibrary.org/docserver/179f718a-en.pdf?expires=1700187598&id=id&accname=guest&checksum=B514C9D17A410748E01DC1E832F0C83B
- Show more...
