




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
StrategiesforDataComplianceinChina|ExecutiveSummary
ExecutiveSummary
TargetAudienceforthisWhitePaper
ThispaperisappropriateformediumtolargecorporationswithsignificantbusinessintheChinesemainland,
orplanstoexpandbusinessintheChinesemainland.
CorporationsandtheChineseMarket
TheChinesemainlandoffers
substantialbusinessopportunities
formultinationalcorporations.Itis
thesecondlargesteconomyinthe
worldbynominalGDPandfirstby
purchasingpowerparity.China’sGDPislargerthanitsnextfourcompetitorscombined.
China’sGDPgrewat5.2%
in2023
—farfasterthanmostother
economiesofitsscale.Businesscasesareoftenmadeontotaladdressablemarketoronmarketgrowth,and
Chinaisaleaderinboth.
However,therearealsobusinessrisksassociatedwiththeChinesemarket—amongthem,recentdatalawsand
regulations.
TheCybersecurityLaw
waspassedin2017,followedbythe
DataSecurityLaw
,andthe
Personal
InformationProtectionLawin2021
.
TheselawssignificantlychangedthenatureofdoingbusinessinChina.
Regulatorytrendscontinuetobecomemorestringentandcomplexatan
increasingspeed,includingsemi-annualreviewsbytheCyberspaceAdministrationofChina.
Multinationalcompaniesare
challengedtocomplywiththeseregulationsinatimelymanner.EnterpriseITprojectscanbe
significantlylongerthanthesemi-
annualperiodsofregulatoryupdates.Inthattime,companiesareexpectedto:
?Classifyalldata,eventhatwhichdoesnotgotoChina,includingthelevelofsensitivityofthatdata
?UndergoasecurityassessmentbytheCybersecurityAuthorityofChina(thisdependsonthescaleoftheoperation)
?Buildandobtainapprovalonmany
technicalandresourceitems,including:
–Findingalegalapproachtocomply
withChineseregulations
–Communicatingwithlocalregulators
–Procuringsoftware
–Staffingalocalteamtoensurelocalcomplianceregulationsaremet
–Settingupnewservicesandconfiguretherelevantapps
–Planning,testing,andexecutingadataandcodemigration
–Onboardingusers
Corporationsneedtochoose
strategiesthatareresilientto
regulatorychange,enablegrowthintheChinamarket,andallowbusinessalignmentbetweentheirChinese
Mainlandoperationsandtherestoftheworld.TherearestepsandstrategiescorporationscantakenowtoconductbusinessinChina
whileprotectingcustomerdataandaddressingregulatoryandlegal
concerns.
01
02
StrategiesforDataComplianceinChina|OverviewofChina’sDataRegulations
OverviewofChina’sDataRegulations
TherearemultipleoverlappinglawsandregulationsrelatedtothecareandprocessingofcustomerdataintheChinesemainland,includingthe
guIationondataandcy
CybersecurityLaw(CSL)in2017,the
DataSecurityLaw(DSL)in2021,the
PersonalInformationProtectionLaw
(PIPL)in2021,andtheCryptography
Lawin2020.
Similarlawsand
regulationsarealsopresentinHongKongandMacau.
Selective
~13MONTHS~7MONTHS
PersonalInformationProtectionLaw(PIPL)
13thOct,2020
.ThefirstdraftofPIPLwassubmittedtotheNationalPeople’sCongressofthePeople’sRepublicofChinaforreview
19thNov,2020
.Closedpublic
commentforPIPLdraft
30thApr,2021
.TheseconddraftofPIPLwasreleasedforpubliccomment
20thAug,2021
.Issuedbythe
StandingCommitteeoftheNational
People’sCongressofthePRC
1stNov.,2021
.Cameintoeffect
21stOct,2020
.TheNationalPeople’s
CongresspublishedPIPL(Draft)andinvitedpubliccomment
TheMeasureofCBDTSecurityAssessment
7thJul.,2022
.‘ThemeasureofCBDTsecurity
assessment,and‘standard’issuedbytheCAC
1stSep.2022
.‘Themeasureofcross-borderDataTransfer
securityassessment,cameintoeffect
28thFeb.2023
Completethecross-borderdatatransfermaterial
submissionworkbytheendofFeb.2023
2024
2023
2022
2021
2020
Mar,2024
.Cameintoeffect
Regulations
on
Promoting
and
Regulating
theCross-
borderData
Flow
Midof2015
.CSL(draft)publishedandopenedforpubliccomments
.CLSwasfurther
modifiedbasedonthecommentsfrompublic
Nov,2016
.CSLpassedbytheNationalPeople’s
Congress
Jun,2017
.CSLenactedbytheStanding
CommitteeoftheNationalPeople'sCongressandwentintoeffect
ChinaCybersecurityLaw(CSL)
Sep,2023
.ToclarifythosebusinessscenarioswhichdonotneedCBDTsecurityassessmentandgovernmentauthorization
.Theregulationwaspublishedforpubliccomments
RegulationonCBDT*
Standardizationand
Facilitation
10111245678910111479393
Jul2nd,2020
.TheStanding
Committeeofthe
NationalPeople’s
CongressofChina
(“NPC”)releasedthe
draftDataSecurityLaw(“DraftLaw”)forpubliccomment
Apr29th,2021
.Releasedthe
updateddraftforpubliccomment
Jun10th,2021
.Issuedbythe
Standing
CommitteeoftheNationalPeople’sCongressofthePRC
Sep1st,2021
.Cameintoeffect
DataSecurityLaw(DSL)
~24months
6months
6months
~14months
StrategiesforDataComplianceinChina|OverviewofChina’sDataRegulations
03
ThelawsnotonlyapplytocorporationswithintheChinesemainland,but
alsotoentitiesoutsidetheChinesemainlandthatareofferinggoods
orservicestoindividualsinsidetheChinesemainlandormonitoringtheirbehavior(suchasmarketingand
marketinganalytics).
These
regulations
arecomplex,butthereareafewkeypoints:
?Personalinformationprocessedin
thecourseofdoingbusinessintheChinesemainlandneedstobestoredinChina,abovecertainthresholds
?Consentisneededtoprocesspersonaldata
?TransfersofpersonaldataoutsideofChinarequirelegalbasis
Thereareavarietyofmeasuresinplaceto
regulatecross-borderdata
transfers(CBDT)
ofpersonaldata,theprotectionofminorsonline,
managementofinfrastructuresecurity,processingofpersonalorsensitive
data,collectionofpersonaldata,
collectionofdatausingmobiledevices,andmore.Dependingonthescale
andclassificationofdatatransfer,thedatatransferwouldneedtobepre-approvedbyregulators.
Theinterpretationandimplementation
ofalloftheseregulationsare
frequentlyexaminedandrefined.
DecipheringtheRegulationHierarchy
Chinahasanoverlappingmatrixof
dataregulationsandmanycompaniesfinditconfusingtoknowwhichlawsapplytothem.
Currently,thetheChinesemainlanddataandcyberregulationscanbebrokendownintofourcategories:
?Nationallaws
?Nationalregulations
?Industryregulations
?Regionalregulations
TheNationalPeople’sCongress
passeslawsapplicablenationally,andhaveprecedenceoverotherlawsandregulations.Next,regulationsdraftedbystatecouncilsanddepartments
willaddmoredetailtothenational
laws,followedbyindustryregulationsdraftedbyindustrialregulators,followedbyregulationsfromregionalregulators.
Forexample,asanauto
manufacturerinShenzhen,notonly
isyourcorporationaffectedbythe
Cybersecuritylaw,butalsobythe
nationalregulationsthatfurtherdefinenationallaws,andalsotheregulationsspecifictoyourindustry,andfinallybytheregulationsintheregionswhere
yourcorporationdoesbusiness.All
needtobeconsideredinplanningyourdatastrategy.
Enacted&draftedtheChinesemainlanddataandcyberregulation
Nati0nalLaws
.pubIishedbytheNationaIpeopIe,scongressstandingcommittee
DatasecurityLaw
(2021.09.01)
Measuresonthestandardcontractforcross-borderTransferofpersonaI
Information(2024.03.22)
.AppIicabIetoaIIentitiesinchina
cybersecurityLaw
(2017.06.01)
personaIInformationprotectionLaw
(2021.11.01)
Nati0nalRegulati0n
.pubIishedbythestatecounciIofchinaanditssubordinatedepartments
.AppIicabIetoaIIentitiesinchina
ReguIationsonpromotingandReguIatingthecross-borderDataFIow(2024.03.22)
MeasuresforthesecurityAssessmentofcross-borderDataTransfer(2024.03.22)
RuIesforDatacIassificationandGrading(pubIished,wiIIenactfrom2024.10.01)
IndustryRegulati0n
.pubIishedbytheindustriaIreguIatorssuchasMinistryofIndustryand
InformationTechnoIogy
china(Tianjin)piIotFreeTradezoneDataExportManagementList(NegativeList)
(2024.05.09)
.AppIicabIetoentitiesdefinedinspecificreguIation
certainprovisionsontheManagementof
AutomobiIeDatasecurity(TriaI)1
(2021.10.01)
GuideIinesforDatacIassificationand
GradingintheHeaIthcareIndustry(TriaI)
MeasuresfortheManagementofData
securityofBankingandlnsurance
Institutions(Draftforcomments
2024.3.23)
Regi0nalRegulati0n
.pubIishedbytheregionaIreguIatorssuchasprovinciaIgovernment
.AppIicabIetoentitiesdefinedbyspecificreguIation
specificationofEnterpriseData
cIassificationstandardsforchina(Tianjin)
piIotFreeTradezone(2024.02.07)
MeasuresforcIassificationandGradingManagementofcross-borderData
TransferinSHALin-gangSpeciaIArea
(TriaI)(2024.02.08)*
GeneraIdataIistofscenarioizationcross-BorderDataTransferinSHALin-gang
SpeciaIArea(connectedcar;pubIicFund;LsHc-TriaI)(2024.05.17)*
CoIorCode:
foIIow
reference
Legend:
Enacted
StrategiesforDataComplianceinChina|PlanningRecommendations
PlanningRecommendations
Teamswillneedtocarefullyconsidertheirtime,dedication,resources,andbudgetiftheyplantomoveforward.Theconsequencesformishandlingdatacanbesevereandcostly.Lawsandregulationssurroundingdata
complianceinChinaoverlapand
aresubjecttorevisionandmultipleinterpretations.Keeptrackof
restrictionsastheymaychangewhile
you’replanningorexecutingyourstrategy.
Dependingoninternalcircumstancesandgoals,companiesshouldconsidertheserecommendedsteps:
?Scopetheopportunityandtherisk:Understandstrategiesfor
riskanddeterminewhichoneyourbusinesswilluse.
?Identifythedataandsystems
thatneedprotection:Classify
dataandsystemsfortheirlevelofsensitivity.Planfordataremediationanddatatransfersaswell.
?Formulatealocalizationstrategy:
Fitthestrategytoneedsandscale,andalignitwithcompliancetrends
04
StrategiesforDataComplianceinChina|ManagingOpportunityandRisk
05
ManagingOpportunityandRisk
Corporationstypicallyentermarkets
afterqualifyingtheaddressablemarketsize,creatingbusinessplans,anddoingduediligence.Thetargetaudienceofthisdocumenthasalreadyscopedandqualifiedtheopportunities,andmanyofthecostsandrisks.
Inthissection,wewillassumethat
themarketopportunityissignificant,andsharemethodstoreducerisk.Asmentionedpreviously,therisksincludecivilpenaltiessuchasfines,market
exclusion,andcriminalpenalties.
StrategiesforRisk
Therearemultiplestrategiesfor
corporationstoaddressbusinessriskwhenconsideringconductingbusinessinChina.Threeofthekeystrategies
organizationsemploywhenmanagingrestrictionstotheChinesemarketareavoidance,acceptanceandmitigation.
Avoidanceiswhenanenterprise
leavestheChinamarketplacefortheir
competitors.Forthevastmajorityof
multinationalcorporations,themarketsizeandmarketopportunityofworkinginChinaistoolargeforthisstrategytobepractical.
Acceptanceofresidualriskafter
mitigationisacommonstrategy,
butthefullpenaltiescanbeharsh.
Individualsheldresponsiblecanbe
personallyfinedsignificantamountsofmoney,inadditiontofeesbilledtotheorganization.
Anyincomeassociatedwiththe
violationscanbeconfiscated.
Individualsheldresponsiblecanbe
sentencedtojailtimeofuptosevenyearsandcanbebannedfromdoingbusinessinChinaforaperiodoftime.Tortliabilitiesalsoexist.
InJuly2022,theCybersecurity
AuthorityofChina(“CAC”)finedone
company$1.2billion,whichwasnearly5%ofthecompany’stotalrevenue.The
globalCEOwasalsopersonallyfined,andthecompanywasbannedfrom
addingnewuserswhiletheirmobile
appswereremovedfromChinamobileappstoresforaperiodoftime.
Mitigationmeansprimarilyin
implementingalong-termstrategy
thatenablescompliancetothelawsandregulationsandisrobustenoughtohandletheongoingevolution
ofthoseregulations.Technology
andoperationalprocessesplayanimportantroleinmitigatingrisk—
includingmaintainingdataresidency,controllingaccesstoregulateddata,andobtainingconsent.Mitigationisoftenthebeststrategy.
Ifyourcompanychoosestomitigatetherisk,thenextstepwouldbetoidentifyandassesswhatdataisimpacted.
StrategiesforDataComplianceinChina|IdentifyingDataAffectedbyPrivacyandDataSecurityRegulations
06
IdentifyingDataAffectedbyPrivacyandDataSecurityRegulations
Understandingregulateddatain
Chinacanbeconfusingbecauseof
thevaryingdefinitions.InlawslikethePIPL,theCybersecurityLaw,theDataSecurityLaw,previouslegislation,
andaffiliatedregulations,protected
dataisdefinedinseveraldifferent
ways.ThePIPLcovers“personal”dataand“sensitivepersonal”data.The
CybersecurityLawandtheDataSecurityLawbothcover“important”data.
Furthermore,thereisaMulti-Level
ProtectionScheme(MLPS2.0)whichdefinesfivelevelsofimpact—rangingfromimpacttoorganizationsand
individuals,attheleastregulatedlevel,uptonationalsecurityimpactsasthemostregulatedlevel.
Soalternately,insomesituations
datamaybecategorizedaspersonal,sensitive,orimportant;inothers,it
maybedefinedbyMLPSlevelsand
impactlevels.Whenplanning,both
categorizationschemescanbeuseful.
Businessdatacanfallintomanyof
thesecategories.Names,phone
numbers,andotherpersonally
identifiablefieldsinonescheme
wouldbeconsidered“personaldata”,andmayalsofitintoMLPSlevel1.
PersonalHealthInformation(PHI)
wouldbeconsidered“sensitive”
underthePIPL,andwouldrequirea
higherlevelofprotection.Thishigherlevelofprotectioncanbeseenin
accesscontrol,theneedforastronger
justificationandconsentforprocessingthe
data,andmorerestrictionsontransferringthedataacrossnationalboundaries.
Otherexamplesofsensitive
informationincludereligiousbeliefsoraffiliation,financialdata,andlocationtracking.Thisdataisoftenstored
inbusinesssystems—forexample,providermanagement,HR,accountmanagement,scheduling,andretailexecutioncanallincludevarious
formsofsensitiveinformation.Someexamplesmightinclude:
Theguidanceonthedataclassificationcanbeconcludedbydifferentobjectswithimpactlevels,
asdefinedby
MLPS2.0.andaswellthelatestGB/T43697-2024,Thelevelsareasfollows:
StrategiesforDataComplianceinChina|IdentifyingDataAffectedbyPrivacyandDataSecurityRegulations
07
?CoreData:Directlyimpactsnationalsecurity,politicalsecurity,people’s
livelihoods,andmajorpublicinterests.
?ImportantData:Mayaffectnationalsecurity,economicoperation,socialstability,healthorsafety.Datathat
affectsasingleorganizationor
individualtypicallydoesnotqualifyforthiscategory.
?GeneralData:Doesnotfallintothe
CoreDataorImportantDatacategories.
?PersonalData:Personallyidentifiableinformation.
?SensitivePersonalData:Personalinformation,whichifleakedor
destroyed,couldimpactanindividual’shealth,safety,orproperty.
Coredataismoresensitive(hasa
higherrisk)thanImportantdata,
whichisinturnmoresensitivethangeneraldata.Datashouldbegradedandevaluatedbythepotential
impactbasedonthescaleofthe
effectandthescaleandprecisionofthedata.
ImpactLevel
Categories
Especiallysevere
Severe
Normal
NationalSecurity
Coredata
Coredata
Importantdata
Economy
Coredata
Importantdata
Generaldata
SocialOrder
Coredata
Importantdata
Generaldata
PublicInterest
Coredata
Importantdata
Generaldata
Org/Indrights
Generaldata
Generaldata
Generaldata
Furthermore,dependingonthe
industryortheregion,additional
restrictionscancomeintoplay.For
example,IoTdataisrestrictedfrom
cross-borderdatatransfer.Inhealth
care,treatmentinformationisrestricted.Additionalexamplesinclude:
?AutomotiveManufacturing:A
luxurycarmanufacturerdevelops
apersonalizeddriverassistance
systemthatlearnsfromindividual
drivinghabits.Thesystemcollects
andprocessesdataonaccelerationpatterns,brakingbehavior,androutepreferences.Thisinformation,whilecrucialforoptimizingthedriving
experience,ishighlysensitiveasitcouldrevealpersonalroutinesandlocationsifcompromised.
?LifeSciences:Apharmaceuticalcompanyconductsclinicaltrialsforanewcancertreatment.
Theycollectextensivepatient
data,includinggeneticmarkers,treatmentresponses,andqualityoflifeindicators.Thisinformationisnotonlymedicallysensitivebutalsopotentiallyrevealingaboutindividuals'long-termhealth
prospectsandcouldaffecttheir
insurabilityoremploymentifdisclosed.
?LuxuryRetail:Ahigh-endjewelrybrandoffersabespokeservice
whereclientscandesigncustom
pieces.Thecompanymaintains
adatabaseofclientpreferences,
purchasehistory,andpersonal
events(e.g.,anniversaries,birthdays).
Thisinformation,whilevaluableforpersonalizedmarketing,issensitiveasitcouldrevealaclient'sfinancialstatus,personalrelationships,andlifestylechoicesifbreached.
Corporationsmaychoosetoclassifydatausingmultipleparameters:
?Classifydatabylevelofsensitivity.Thiscantypicallybedonebasedonthedataschema.
?Classifycross-borderdatatransfersbylevelofsensitivity.Cross-borderdatatransfersaretreatedmore
strictlythandataprocessing;data
maybeacceptabletoprocessinChinabutnottotransferoutsideofChina.
StrategiesforDataComplianceinChina|FormulatingaLocalizationStrategy
08
FormulatingaLocalizationStrategy
Onceacompanyhasassessedrisk
andclassifieddata,itistimetobuildadigitalstrategytoensurethehandlingofthatdataiscompliant.
Corporationsshouldcarefullyconsiderglobalandregionalgovernance,localmarketbusinesssupport,regulation
constraints,andcostefficiency.
Companieswillneedtoconsidermultiplefactorstofindsuccess,including:
?Cybersecurityissuessuchaswhethersensitivedataisinvolved
?Systemperformancequalityandmaintainingaconsistentuser
experiencewhiletransactionvolumeincreases
?ThelevelofintegrationdependencyonChina’sdigitalecosystemstofulfilllocalizedusecases
?Howtobestmanageandleverageglobalassetsacrossborders
cyber,DataandprivacyReguIatorycompIiance
considerationsofwhetherPIIorothersensitivedataisinvoIved
throughoutdatacoIIection,storage,processingandusageIifecycIeundercsL,PIPLandotherreguIationrequirements
cyber&Datasecurity
cross-BorderDataTransfer
AIignment
Empower
PrivacyProtection
c.chinaMarketBusinessGrowth
BusinesscontinuityundercompIexGeopoIitics
AssetsynergyandcapitaIEfficiency
considerationofhowto
IeveragegIobaIassetsto
achievecrossregionsynergy
andmorescaIabIearchitecture
chinaspecificExperienceDeIiveryDependency
considerationsoftheIeveIof
integrationdependencyonchinadigitaIecosystemstofuIfiII
IocaIizedbusinessusecases
A.ReguIations&constraints
D.GIobaI&
RegionaIsynergyandGovernance
TcOandTOM
governance,incIudingsupportcapabiIities;whiIecrossborderdataaccesswouIdbeoneof
thekeyfactorstoimpactTcO
B.systemperformanceRequirement
systemPerformance
systemAvaiIabiIity
甲甲
systemperformance&AvaiIabiIityNecessity
TheimportanceofstabIeperformanceandIeveIofRTO&RPOunderincreasingtransactionvoIumeandbusinesscompIexitytomaintainconsistentuserexperience
StrategiesforDataComplianceinChina|FormulatingaLocalizationStrategy
09
Giventhepotentialbreadthofa
corporation'scustomerrelationshipmanagement(CRM)system,thedatawithinitshouldbestoredlocallytomeetlocalizationrequirements,havepropersecuritymeasuresinplacetocontrolaccessandcompliancewithlocallawsandregulations,allwhilebeinguseabletomeetthebusiness
needs.Theaffecteddataandtechnicaldomainscanbewide-ranging,
includingemployeedata,customerdata,businesspartnerdataand
identity,andmore.
Acorporation’sCRMisoften
connectedtotheirmarketingsystems,socialmedia,enterpriseresource
planning(ERP)software,analytics
platform,dataplatform,andmore
systems,furtheraffectingwhichdataneedstobeprotectedandcompliant.Sincesensitivedataisstoredand
sharedfromthesesystems,allofthemareaffectedtosomedegree,andtheirintegrationsalsoneedtobesecure
andcompliant.
ERP
?ChinaERPwithowninstance
?LocallysourcedERP
Workspace&Collaboration
?O365(includingE-mail)
?CollaborationTools
?ITILtools
Sales&Marketing
?WeChattouchpoints
?E-Commerce/orderingportal
?SalesEnablement
?CRM(i.e.Salesforce)
DataPlatform
?ConsumerDataPlatform
?OtherDataPlatformincludingimportantdata
KeyAreas
ofLocalized
Solutions
Security
?IAM/ADSeparation/MFA
?ZeroTrust
?VulnerabilityscanandPentest
?CyberSecurity
HR
?Global/localsplitoftheHRsystemsin
viewoftheregulatoryrequirementsandlocalecosystem
Sales&Marketing
?StandardGlobalsolutionhostedinChina
?Chinalocalizedsolutionwithcustomization
?Tailor-madesolutionwithcloudprovidersinChina
DataPlatform
?DedicatedDomainforCNservices(Certificate/ICP)
?LocalauthorizedDNS
?IndependentVPCs/subnetsforChinas
?Localaccessforuserprofilee.g.,VPN,Identity
CybersecurityConsiderations
AchievingcompliancewhileenhancingthecybersecuritylevelinChinaandtherestoftheworldisachallenge.
Forexample,specificdataisnot
allowedtoleavetheChinesemainland,likeSensitivePersonalInformation.
Non-compliancecanresultinfines,butimprovingcybersecurityiskeytoprotectingintellectualproperty.
Companieswillneedtofindabalancebetweenthetwotosatisfyallpartiesandkeepinformationsecure.
10
StrategiesforDataComplianceinChina|FormulatingaLocalizationStrategy
Compliance
?Localcybersecurityofficerisrequired
?Possiblyalocaldataprotectionofficer
CybersecurityOrganization
Cybersecuritymaturity
?LocalizedCybersecurityOrganizationshouldbeconsidereddueto
?Limitationsofdatatransfer
?Potentiallyothertools/solutionsthaninrestoftheworld
?SpecificdataisnotallowedtoleavetheChinesemainland
?SenstiviePersonalinformation(SPI)
?Importantdata
DataTransfer&Network
?LimitationsofnetworkaccessfromandtoChinapreventingattacks
?Preventionofdataleakageandinsiderthreats
?e.g.,segmentationsofnetworks,networkenforcementpoints
?SystemswhicharedeployedoroperatedinChinahavetocomplytospecifichardening
?e.g.,operatingsystems,networktechnology,cybersecuritytools
Technology
?Globallytrustedtechnologystandardsandsolutionstoensuresecureworkingandcollaboration
?Somefunctionsmightnotbeavailableinothersolutions
?KeyNetworkProduct&ServiceChallenges
?Salespermit&certificationsisrequired
?Listofproducts(firstbatch,scope,standards)
NetworkProduct&Service
?Taking‘TradePolicies’intoconsideration,attentionsneededonproductssupplydisruptionandthe
inabilityofproductupdate
?Limitationofallowedcryptographicsolutions
?Commercialcryptographyimportsmustbepermitted
Non-compliancecanresultinfines,
suspensionofbusiness,revocation
oflicenses,andindustryrestrictions
forinvolvedstaff
Cryptography
?Globalstandardstoensurehighlysecuredataencryptionandexchange
Appropriatemeasuresneededimproving
cybersecuritylevelinordertoprotect
intellectualproperty
DataResidency,DataAccess,andCross-borderDataTransfers
Hostingbusinessapplications
andtheirdatainChinasupports
compliancewiththeCybersecurityLaw(CSL),DataSecurityLaw(DSL),and
PersonalInformationProtectionLaw(PIPL)regulations,aswellasmeetingChinamarketdynamicsandspeed,andensuringbothglobalandlocalcybersecurity.
China’scurrentcyberspace
governancestrategyistofocuson
cybersecurityandprotectpersonal
dataandimportantdatacross-bordertransmission.Formultinational
corporations(MNCs)inChina,properisolationandcross-borderdata
transfercontrolisbecominganurgentrequirement.
Balancingtimelinesswithneedcan
causecomplicationsacrossindustries.Threecomplianceaspectscommonlyariseatthispoint:
?DataResidency:Tocomplywiththelawsandregulationsdiscussedin
thisdocument,datathatisgatheredinChinaneedstobeprocessedandstoredinChinaunlessthereisan
exceptiongranted.
?DataAccess:Processorsneeda
legalreasontoprocessdata,and
actorsneedalegalreasontoaccessthedata.Accesscontrolisnecessarytoensurethattheindividuals
accessingthedataareentitledtothatprivilege.
?Cross-borderDataTransfers:Thedefaultforregulateddataisthatitneedsjustificationandapprovalto
transmitacrossborders.APIsareonemechanism,butremoteaccessofanykindisadatatransfer.
Akeystartingpointforcorporationstherefore,istoconsiderproperisolationthroughdataresidencyinChina.
CommonScenariosforDataResidency
Applicationscontainmassiveamountsofnon-HR(non-
employee)personalInfo,coredata,andimportantdata
Over1millionrecordswithclient
informationaresubjecttolocalizationrequirementsandanycross-borderdatatransferactivitiesmustbe
approvedinadvance.Coredataandimportantdatamayimpactnationalsecurity,socialstabilityandpublicinterest,facingmorerestricted
StrategiesforDataComplianceinChina|FormulatingaLocalizationStrategy
11
regulationthansensitivepersonalinfo.CertaindataisnotallowedtoleavetheChinesemainlandatall.
Localadministrationforbusinessapplications,ITinfrastructure
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 擔(dān)保公司股權(quán)托管協(xié)議書
- 婚慶店合伙人合同范本
- 二人合伙開廠合同范本
- 按揭貸款售房合同范本
- 工地材料遺失賠償協(xié)議書
- 大宗交易委托保密協(xié)議書
- 農(nóng)民大棚買賣合同范本
- 土地確權(quán)合同解除協(xié)議書
- 山地承包合同終止協(xié)議書
- 古建修復(fù)包工合同范本
- 2022聯(lián)合國電子政務(wù)調(diào)查報(bào)告(中文版)
- 小學(xué)心理健康教育家長會(huì)
- 2025屆山西省呂梁市高三第三次模擬考試英語試題(原卷版+解析版)
- 8.3 法治社會(huì) 課件高中政治統(tǒng)編版必修三政治與法治
- 《醫(yī)藥企業(yè)防范商業(yè)賄賂合規(guī)指引》配套典型案例
- 新一代大型機(jī)場行李處理系統(tǒng)關(guān)鍵技術(shù)與應(yīng)用
- 鐵路電務(wù)設(shè)備培訓(xùn)課件
- 礦產(chǎn)資源勘查技術(shù)在頁巖氣勘探的應(yīng)用考核試卷
- 工業(yè)設(shè)計(jì)接單合同協(xié)議
- 營房維修考試題及答案
- 足浴店面轉(zhuǎn)讓協(xié)議書
評(píng)論
0/150
提交評(píng)論