中国数据安全相关法规的白皮书-Strategies for Data Compliance in China 2024_第1页
中国数据安全相关法规的白皮书-Strategies for Data Compliance in China 2024_第2页
中国数据安全相关法规的白皮书-Strategies for Data Compliance in China 2024_第3页
中国数据安全相关法规的白皮书-Strategies for Data Compliance in China 2024_第4页
中国数据安全相关法规的白皮书-Strategies for Data Compliance in China 2024_第5页
已阅读5页,还剩38页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

MAKINGANIMPACTTHATMATTERS

StrategiesforDataComplianceinChina

September2024

5

Contents

ExecutiveSummary01

OverviewofChina’sDataRegulations02

PlanningRecommendations04

ManagingOpportunityandRisk05

IdentifyingDataAffectedbyPrivacyandDataSecurityRegulations06

FormulatingaLocalizationStrategy08

KeyTakeaways14

AppendixI15

AppendixII16

AppendixIII19

StrategiesforDataComplianceinChina|ExecutiveSummary

ExecutiveSummary

TargetAudienceforthisWhitePaper

ThispaperisappropriateformediumtolargecorporationswithsignificantbusinessintheChinesemainland,

orplanstoexpandbusinessintheChinesemainland.

CorporationsandtheChineseMarket

TheChinesemainlandoffers

substantialbusinessopportunities

formultinationalcorporations.Itis

thesecondlargesteconomyinthe

worldbynominalGDPandfirstby

purchasingpowerparity.China’sGDPislargerthanitsnextfourcompetitorscombined.

China’sGDPgrewat5.2%

in2023

—farfasterthanmostother

economiesofitsscale.Businesscasesareoftenmadeontotaladdressablemarketoronmarketgrowth,and

Chinaisaleaderinboth.

However,therearealsobusinessrisksassociatedwiththeChinesemarket—amongthem,recentdatalawsand

regulations.

TheCybersecurityLaw

waspassedin2017,followedbythe

DataSecurityLaw

,andthe

Personal

InformationProtectionLawin2021

.

TheselawssignificantlychangedthenatureofdoingbusinessinChina.

Regulatorytrendscontinuetobecomemorestringentandcomplexatan

increasingspeed,includingsemi-annualreviewsbytheCyberspaceAdministrationofChina.

Multinationalcompaniesare

challengedtocomplywiththeseregulationsinatimelymanner.EnterpriseITprojectscanbe

significantlylongerthanthesemi-

annualperiodsofregulatoryupdates.Inthattime,companiesareexpectedto:

•Classifyalldata,eventhatwhichdoesnotgotoChina,includingthelevelofsensitivityofthatdata

•UndergoasecurityassessmentbytheCybersecurityAuthorityofChina(thisdependsonthescaleoftheoperation)

•Buildandobtainapprovalonmany

technicalandresourceitems,including:

–Findingalegalapproachtocomply

withChineseregulations

–Communicatingwithlocalregulators

–Procuringsoftware

–Staffingalocalteamtoensurelocalcomplianceregulationsaremet

–Settingupnewservicesandconfiguretherelevantapps

–Planning,testing,andexecutingadataandcodemigration

–Onboardingusers

Corporationsneedtochoose

strategiesthatareresilientto

regulatorychange,enablegrowthintheChinamarket,andallowbusinessalignmentbetweentheirChinese

Mainlandoperationsandtherestoftheworld.TherearestepsandstrategiescorporationscantakenowtoconductbusinessinChina

whileprotectingcustomerdataandaddressingregulatoryandlegal

concerns.

01

02

StrategiesforDataComplianceinChina|OverviewofChina’sDataRegulations

OverviewofChina’sDataRegulations

TherearemultipleoverlappinglawsandregulationsrelatedtothecareandprocessingofcustomerdataintheChinesemainland,includingthe

guIationondataandcy

CybersecurityLaw(CSL)in2017,the

DataSecurityLaw(DSL)in2021,the

PersonalInformationProtectionLaw

(PIPL)in2021,andtheCryptography

Lawin2020.

Similarlawsand

regulationsarealsopresentinHongKongandMacau.

Selective

~13MONTHS~7MONTHS

PersonalInformationProtectionLaw(PIPL)

19thNov,2020

.TheseconddraftofPIPLwasreleasedforpubliccomment

13thOct,2020

.ThefirstdraftofPIPLwassubmittedtotheNationalPeople’sCongressofthePeople’sRepublicofChinaforreview

20thAug,2021

.Issuedbythe

StandingCommitteeoftheNational

People’sCongressofthePRC

21stOct,2020

.TheNationalPeople’s

CongresspublishedPIPL(Draft)andinvitedpubliccomment

.Closedpublic

commentforPIPLdraft

1stNov.,2021

.Cameintoeffect

30thApr,2021

TheMeasureofCBDTSecurityAssessment

7thJul.,2022

.‘ThemeasureofCBDTsecurity

assessment,and‘standard’issuedbytheCAC

1stSep.2022

.‘Themeasureofcross-borderDataTransfer

securityassessment,cameintoeffect

28thFeb.2023

Completethecross-borderdatatransfermaterial

submissionworkbytheendofFeb.2023

2024

2023

2022

2021

2020

10111245678910111479393

Mar,2024

.Cameintoeffect

Regulations

on

Promoting

and

Regulating

theCross-

borderData

Flow

Sep,2023

.ToclarifythosebusinessscenarioswhichdonotneedCBDTsecurityassessmentandgovernmentauthorization

.Theregulationwaspublishedforpubliccomments

RegulationonCBDT*

Standardizationand

Facilitation

Midof2015

.CSL(draft)publishedandopenedforpubliccomments

.CLSwasfurther

modifiedbasedonthecommentsfrompublic

Nov,2016

.CSLpassedbytheNationalPeople’s

Congress

Jun,2017

.CSLenactedbytheStanding

CommitteeoftheNationalPeople'sCongressandwentintoeffect

ChinaCybersecurityLaw(CSL)

Jul2nd,2020

.TheStanding

Committeeofthe

NationalPeople’s

CongressofChina

(“NPC”)releasedthe

draftDataSecurityLaw(“DraftLaw”)forpubliccomment

Apr29th,2021

.Releasedthe

updateddraftforpubliccomment

Jun10th,2021

.Issuedbythe

Standing

CommitteeoftheNationalPeople’sCongressofthePRC

Sep1st,2021

.Cameintoeffect

DataSecurityLaw(DSL)

~24months

6months

6months

~14months

StrategiesforDataComplianceinChina|OverviewofChina’sDataRegulations

03

ThelawsnotonlyapplytocorporationswithintheChinesemainland,but

alsotoentitiesoutsidetheChinesemainlandthatareofferinggoods

orservicestoindividualsinsidetheChinesemainlandormonitoringtheirbehavior(suchasmarketingand

marketinganalytics).

These

regulations

arecomplex,butthereareafewkeypoints:

•Personalinformationprocessedin

thecourseofdoingbusinessintheChinesemainlandneedstobestoredinChina,abovecertainthresholds

•Consentisneededtoprocesspersonaldata

•TransfersofpersonaldataoutsideofChinarequirelegalbasis

Thereareavarietyofmeasuresinplaceto

regulatecross-borderdata

transfers(CBDT)

ofpersonaldata,theprotectionofminorsonline,

managementofinfrastructuresecurity,processingofpersonalorsensitive

data,collectionofpersonaldata,

collectionofdatausingmobiledevices,andmore.Dependingonthescale

andclassificationofdatatransfer,thedatatransferwouldneedtobepre-approvedbyregulators.

Theinterpretationandimplementation

ofalloftheseregulationsare

frequentlyexaminedandrefined.

DecipheringtheRegulationHierarchy

Chinahasanoverlappingmatrixof

dataregulationsandmanycompaniesfinditconfusingtoknowwhichlawsapplytothem.

Currently,thetheChinesemainlanddataandcyberregulationscanbebrokendownintofourcategories:

•Nationallaws

•Nationalregulations

•Industryregulations

•Regionalregulations

TheNationalPeople’sCongress

passeslawsapplicablenationally,andhaveprecedenceoverotherlawsandregulations.Next,regulationsdraftedbystatecouncilsanddepartments

willaddmoredetailtothenational

laws,followedbyindustryregulationsdraftedbyindustrialregulators,followedbyregulationsfromregionalregulators.

Forexample,asanauto

manufacturerinShenzhen,notonly

isyourcorporationaffectedbythe

Cybersecuritylaw,butalsobythe

nationalregulationsthatfurtherdefinenationallaws,andalsotheregulationsspecifictoyourindustry,andfinallybytheregulationsintheregionswhere

yourcorporationdoesbusiness.All

needtobeconsideredinplanningyourdatastrategy.

Enacted&draftedtheChinesemainlanddataandcyberregulation

Nati0nalLaws

.pubIishedbytheNationaIpeopIe,scongressstandingcommittee

DatasecurityLaw

(2021.09.01)

Measuresonthestandardcontractforcross-borderTransferofpersonaI

Information(2024.03.22)

.AppIicabIetoaIIentitiesinchina

cybersecurityLaw

(2017.06.01)

personaIInformationprotectionLaw

(2021.11.01)

Nati0nalRegulati0n

.pubIishedbythestatecounciIofchinaanditssubordinatedepartments

.AppIicabIetoaIIentitiesinchina

ReguIationsonpromotingandReguIatingthecross-borderDataFIow(2024.03.22)

MeasuresforthesecurityAssessmentofcross-borderDataTransfer(2024.03.22)

RuIesforDatacIassificationandGrading(pubIished,wiIIenactfrom2024.10.01)

IndustryRegulati0n

.pubIishedbytheindustriaIreguIatorssuchasMinistryofIndustryand

InformationTechnoIogy

china(Tianjin)piIotFreeTradezoneDataExportManagementList(NegativeList)

(2024.05.09)

.AppIicabIetoentitiesdefinedinspecificreguIation

certainprovisionsontheManagementof

AutomobiIeDatasecurity(TriaI)1

(2021.10.01)

GuideIinesforDatacIassificationand

GradingintheHeaIthcareIndustry(TriaI)

MeasuresfortheManagementofData

securityofBankingandlnsurance

Institutions(Draftforcomments

2024.3.23)

Regi0nalRegulati0n

.pubIishedbytheregionaIreguIatorssuchasprovinciaIgovernment

.AppIicabIetoentitiesdefinedbyspecificreguIation

specificationofEnterpriseData

cIassificationstandardsforchina(Tianjin)

piIotFreeTradezone(2024.02.07)

MeasuresforcIassificationandGradingManagementofcross-borderData

TransferinSHALin-gangSpeciaIArea

(TriaI)(2024.02.08)*

GeneraIdataIistofscenarioizationcross-BorderDataTransferinSHALin-gang

SpeciaIArea(connectedcar;pubIicFund;LsHc-TriaI)(2024.05.17)*

CoIorCode:

foIIow

reference

Legend:

Enacted

StrategiesforDataComplianceinChina|PlanningRecommendations

PlanningRecommendations

Teamswillneedtocarefullyconsidertheirtime,dedication,resources,andbudgetiftheyplantomoveforward.Theconsequencesformishandlingdatacanbesevereandcostly.Lawsandregulationssurroundingdata

complianceinChinaoverlapand

aresubjecttorevisionandmultipleinterpretations.Keeptrackof

restrictionsastheymaychangewhile

you’replanningorexecutingyourstrategy.

Dependingoninternalcircumstancesandgoals,companiesshouldconsidertheserecommendedsteps:

•Scopetheopportunityandtherisk:Understandstrategiesfor

riskanddeterminewhichoneyourbusinesswilluse.

•Identifythedataandsystems

thatneedprotection:Classify

dataandsystemsfortheirlevelofsensitivity.Planfordataremediationanddatatransfersaswell.

•Formulatealocalizationstrategy:

Fitthestrategytoneedsandscale,andalignitwithcompliancetrends

04

StrategiesforDataComplianceinChina|ManagingOpportunityandRisk

05

ManagingOpportunityandRisk

Corporationstypicallyentermarkets

afterqualifyingtheaddressablemarketsize,creatingbusinessplans,anddoingduediligence.Thetargetaudienceofthisdocumenthasalreadyscopedandqualifiedtheopportunities,andmanyofthecostsandrisks.

Inthissection,wewillassumethat

themarketopportunityissignificant,andsharemethodstoreducerisk.Asmentionedpreviously,therisksincludecivilpenaltiessuchasfines,market

exclusion,andcriminalpenalties.

StrategiesforRisk

Therearemultiplestrategiesfor

corporationstoaddressbusinessriskwhenconsideringconductingbusinessinChina.Threeofthekeystrategies

organizationsemploywhenmanagingrestrictionstotheChinesemarketareavoidance,acceptanceandmitigation.

Avoidanceiswhenanenterprise

leavestheChinamarketplacefortheir

competitors.Forthevastmajorityof

multinationalcorporations,themarketsizeandmarketopportunityofworkinginChinaistoolargeforthisstrategytobepractical.

Acceptanceofresidualriskafter

mitigationisacommonstrategy,

butthefullpenaltiescanbeharsh.

Individualsheldresponsiblecanbe

personallyfinedsignificantamountsofmoney,inadditiontofeesbilledtotheorganization.

Anyincomeassociatedwiththe

violationscanbeconfiscated.

Individualsheldresponsiblecanbe

sentencedtojailtimeofuptosevenyearsandcanbebannedfromdoingbusinessinChinaforaperiodoftime.Tortliabilitiesalsoexist.

InJuly2022,theCybersecurity

AuthorityofChina(“CAC”)finedone

company$1.2billion,whichwasnearly5%ofthecompany’stotalrevenue.The

globalCEOwasalsopersonallyfined,andthecompanywasbannedfrom

addingnewuserswhiletheirmobile

appswereremovedfromChinamobileappstoresforaperiodoftime.

Mitigationmeansprimarilyin

implementingalong-termstrategy

thatenablescompliancetothelawsandregulationsandisrobustenoughtohandletheongoingevolution

ofthoseregulations.Technology

andoperationalprocessesplayanimportantroleinmitigatingrisk—

includingmaintainingdataresidency,controllingaccesstoregulateddata,andobtainingconsent.Mitigationisoftenthebeststrategy.

Ifyourcompanychoosestomitigatetherisk,thenextstepwouldbetoidentifyandassesswhatdataisimpacted.

StrategiesforDataComplianceinChina|IdentifyingDataAffectedbyPrivacyandDataSecurityRegulations

06

IdentifyingDataAffectedbyPrivacyandDataSecurityRegulations

Understandingregulateddatain

Chinacanbeconfusingbecauseof

thevaryingdefinitions.InlawslikethePIPL,theCybersecurityLaw,theDataSecurityLaw,previouslegislation,

andaffiliatedregulations,protected

dataisdefinedinseveraldifferent

ways.ThePIPLcovers“personal”dataand“sensitivepersonal”data.The

CybersecurityLawandtheDataSecurityLawbothcover“important”data.

Furthermore,thereisaMulti-Level

ProtectionScheme(MLPS2.0)whichdefinesfivelevelsofimpact—rangingfromimpacttoorganizationsand

individuals,attheleastregulatedlevel,uptonationalsecurityimpactsasthemostregulatedlevel.

Soalternately,insomesituations

datamaybecategorizedaspersonal,sensitive,orimportant;inothers,it

maybedefinedbyMLPSlevelsand

impactlevels.Whenplanning,both

categorizationschemescanbeuseful.

Businessdatacanfallintomanyof

thesecategories.Names,phone

numbers,andotherpersonally

identifiablefieldsinonescheme

wouldbeconsidered“personaldata”,andmayalsofitintoMLPSlevel1.

PersonalHealthInformation(PHI)

wouldbeconsidered“sensitive”

underthePIPL,andwouldrequirea

higherlevelofprotection.Thishigherlevelofprotectioncanbeseenin

accesscontrol,theneedforastronger

justificationandconsentforprocessingthe

data,andmorerestrictionsontransferringthedataacrossnationalboundaries.

Otherexamplesofsensitive

informationincludereligiousbeliefsoraffiliation,financialdata,andlocationtracking.Thisdataisoftenstored

inbusinesssystems—forexample,providermanagement,HR,accountmanagement,scheduling,andretailexecutioncanallincludevarious

formsofsensitiveinformation.Someexamplesmightinclude:

Theguidanceonthedataclassificationcanbeconcludedbydifferentobjectswithimpactlevels,

asdefinedby

MLPS2.0.andaswellthelatestGB/T43697-2024,Thelevelsareasfollows:

StrategiesforDataComplianceinChina|IdentifyingDataAffectedbyPrivacyandDataSecurityRegulations

07

•CoreData:Directlyimpactsnationalsecurity,politicalsecurity,people’s

livelihoods,andmajorpublicinterests.

•ImportantData:Mayaffectnationalsecurity,economicoperation,socialstability,healthorsafety.Datathat

affectsasingleorganizationor

individualtypicallydoesnotqualifyforthiscategory.

•GeneralData:Doesnotfallintothe

CoreDataorImportantDatacategories.

•PersonalData:Personallyidentifiableinformation.

•SensitivePersonalData:Personalinformation,whichifleakedor

destroyed,couldimpactanindividual’shealth,safety,orproperty.

Coredataismoresensitive(hasa

higherrisk)thanImportantdata,

whichisinturnmoresensitivethangeneraldata.Datashouldbegradedandevaluatedbythepotential

impactbasedonthescaleofthe

effectandthescaleandprecisionofthedata.

ImpactLevel

Categories

Especiallysevere

Severe

Normal

NationalSecurity

Coredata

Coredata

Importantdata

Economy

Coredata

Importantdata

Generaldata

SocialOrder

Coredata

Importantdata

Generaldata

PublicInterest

Coredata

Importantdata

Generaldata

Org/Indrights

Generaldata

Generaldata

Generaldata

Furthermore,dependingonthe

industryortheregion,additional

restrictionscancomeintoplay.For

example,IoTdataisrestrictedfrom

cross-borderdatatransfer.Inhealth

care,treatmentinformationisrestricted.Additionalexamplesinclude:

•AutomotiveManufacturing:A

luxurycarmanufacturerdevelops

apersonalizeddriverassistance

systemthatlearnsfromindividual

drivinghabits.Thesystemcollects

andprocessesdataonaccelerationpatterns,brakingbehavior,androutepreferences.Thisinformation,whilecrucialforoptimizingthedriving

experience,ishighlysensitiveasitcouldrevealpersonalroutinesandlocationsifcompromised.

•LifeSciences:Apharmaceuticalcompanyconductsclinicaltrialsforanewcancertreatment.

Theycollectextensivepatient

data,includinggeneticmarkers,treatmentresponses,andqualityoflifeindicators.Thisinformationisnotonlymedicallysensitivebutalsopotentiallyrevealingaboutindividuals'long-termhealth

prospectsandcouldaffecttheir

insurabilityoremploymentifdisclosed.

•LuxuryRetail:Ahigh-endjewelrybrandoffersabespokeservice

whereclientscandesigncustom

pieces.Thecompanymaintains

adatabaseofclientpreferences,

purchasehistory,andpersonal

events(e.g.,anniversaries,birthdays).

Thisinformation,whilevaluableforpersonalizedmarketing,issensitiveasitcouldrevealaclient'sfinancialstatus,personalrelationships,andlifestylechoicesifbreached.

Corporationsmaychoosetoclassifydatausingmultipleparameters:

•Classifydatabylevelofsensitivity.Thiscantypicallybedonebasedonthedataschema.

•Classifycross-borderdatatransfersbylevelofsensitivity.Cross-borderdatatransfersaretreatedmore

strictlythandataprocessing;data

maybeacceptabletoprocessinChinabutnottotransferoutsideofChina.

StrategiesforDataComplianceinChina|FormulatingaLocalizationStrategy

08

FormulatingaLocalizationStrategy

Onceacompanyhasassessedrisk

andclassifieddata,itistimetobuildadigitalstrategytoensurethehandlingofthatdataiscompliant.

Corporationsshouldcarefullyconsiderglobalandregionalgovernance,localmarketbusinesssupport,regulation

constraints,andcostefficiency.

Companieswillneedtoconsidermultiplefactorstofindsuccess,including:

•Cybersecurityissuessuchaswhethersensitivedataisinvolved

•Systemperformancequalityandmaintainingaconsistentuser

experiencewhiletransactionvolumeincreases

•ThelevelofintegrationdependencyonChina’sdigitalecosystemstofulfilllocalizedusecases

•Howtobestmanageandleverageglobalassetsacrossborders

cyber,DataandprivacyReguIatorycompIiance

considerationsofwhetherPIIorothersensitivedataisinvoIved

throughoutdatacoIIection,storage,processingandusageIifecycIeundercsL,PIPLandotherreguIationrequirements

cyber&Datasecurity

cross-BorderDataTransfer

AIignment

Empower

PrivacyProtection

c.chinaMarketBusinessGrowth

BusinesscontinuityundercompIexGeopoIitics

AssetsynergyandcapitaIEfficiency

considerationofhowto

IeveragegIobaIassetsto

achievecrossregionsynergy

andmorescaIabIearchitecture

chinaspecificExperienceDeIiveryDependency

considerationsoftheIeveIof

integrationdependencyonchinadigitaIecosystemstofuIfiII

IocaIizedbusinessusecases

A.ReguIations&constraints

D.GIobaI&

RegionaIsynergyandGovernance

TcOandTOM

governance,incIudingsupportcapabiIities;whiIecrossborderdataaccesswouIdbeoneof

thekeyfactorstoimpactTcO

甲甲

B.systemperformanceRequirement

systemPerformance

systemAvaiIabiIity

systemperformance&AvaiIabiIityNecessity

TheimportanceofstabIeperformanceandIeveIofRTO&RPOunderincreasingtransactionvoIumeandbusinesscompIexitytomaintainconsistentuserexperience

StrategiesforDataComplianceinChina|FormulatingaLocalizationStrategy

09

Giventhepotentialbreadthofa

corporation'scustomerrelationshipmanagement(CRM)system,thedatawithinitshouldbestoredlocallytomeetlocalizationrequirements,havepropersecuritymeasuresinplacetocontrolaccessandcompliancewithlocallawsandregulations,allwhilebeinguseabletomeetthebusiness

needs.Theaffecteddataandtechnicaldomainscanbewide-ranging,

includingemployeedata,customerdata,businesspartnerdataand

identity,andmore.

Acorporation’sCRMisoften

connectedtotheirmarketingsystems,socialmedia,enterpriseresource

planning(ERP)software,analytics

platform,dataplatform,andmore

systems,furtheraffectingwhichdataneedstobeprotectedandcompliant.Sincesensitivedataisstoredand

sharedfromthesesystems,allofthemareaffectedtosomedegree,andtheirintegrationsalsoneedtobesecure

andcompliant.

ERP

•ChinaERPwithowninstance

•LocallysourcedERP

Workspace&Collaboration

•O365(includingE-mail)

•CollaborationTools

•ITILtools

Sales&Marketing

•WeChattouchpoints

•E-Commerce/orderingportal

•SalesEnablement

•CRM(i.e.Salesforce)

DataPlatform

•ConsumerDataPlatform

•OtherDataPlatformincludingimportantdata

KeyAreas

ofLocalized

Solutions

Security

•IAM/ADSeparation/MFA

•ZeroTrust

•VulnerabilityscanandPentest

•CyberSecurity

HR

•Global/localsplitoftheHRsystemsin

viewoftheregulatoryrequirementsandlocalecosystem

Sales&Marketing

•StandardGlobalsolutionhostedinChina

•Chinalocalizedsolutionwithcustomization

•Tailor-madesolutionwithcloudprovidersinChina

DataPlatform

•DedicatedDomainforCNservices(Certificate/ICP)

•LocalauthorizedDNS

•IndependentVPCs/subnetsforChinas

•Localaccessforuserprofilee.g.,VPN,Identity

CybersecurityConsiderations

AchievingcompliancewhileenhancingthecybersecuritylevelinChinaandtherestoftheworldisachallenge.

Forexample,specificdataisnot

allowedtoleavetheChinesemainland,likeSensitivePersonalInformation.

Non-compliancecanresultinfines,butimprovingcybersecurityiskeytoprotectingintellectualproperty.

Companieswillneedtofindabalancebetweenthetwotosatisfyallpartiesandkeepinformationsecure.

10

StrategiesforDataComplianceinChina|FormulatingaLocalizationStrategy

Compliance

•Localcybersecurityofficerisrequired

•Possiblyalocaldataprotectionofficer

CybersecurityOrganization

Cybersecuritymaturity

•LocalizedCybersecurityOrganizationshouldbeconsidereddueto

•Limitationsofdatatransfer

•Potentiallyothertools/solutionsthaninrestoftheworld

•SpecificdataisnotallowedtoleavetheChinesemainland

•SenstiviePersonalinformation(SPI)

•Importantdata

DataTransfer&Network

•LimitationsofnetworkaccessfromandtoChinapreventingattacks

•Preventionofdataleakageandinsiderthreats

•e.g.,segmentationsofnetworks,networkenforcementpoints

•SystemswhicharedeployedoroperatedinChinahavetocomplytospecifichardening

•e.g.,operatingsystems,networktechnology,cybersecuritytools

Technology

•Globallytrustedtechnologystandardsandsolutionstoensuresecureworkingandcollaboration

•Somefunctionsmightnotbeavailableinothersolutions

•KeyNetworkProduct&ServiceChallenges

•Salespermit&certificationsisrequired

•Listofproducts(firstbatch,scope,standards)

NetworkProduct&Service

•Taking‘TradePolicies’intoconsideration,attentionsneededonproductssupplydisruptionandthe

inabilityofproductupdate

•Limitationofallowedcryptographicsolutions

•Commercialcryptographyimportsmustbepermitted

Non-compliancecanresultinfines,

suspensionofbusiness,revocation

oflicenses,andindustryrestrictions

forinvolvedstaff

Cryptography

•Globalstandardstoensurehighlysecuredataencryptionandexchange

Appropriatemeasuresneededimproving

cybersecuritylevelinordertoprotect

intellectualproperty

DataResidency,DataAccess,andCross-borderDataTransfers

Hostingbusinessapplications

andtheirdatainChinasupports

compliancewiththeCybersecurityLaw(CSL),DataSecurityLaw(DSL),and

PersonalInformationProtectionLaw(PIPL)regulations,aswellasmeetingChinamarketdynamicsandspeed,andensuringbothglobalandlocalcybersecurity.

China’scurrentcyberspace

governancestrategyistofocuson

cybersecurityandprotectpersonal

dataandimportantdatacross-bordertransmission.Formultinational

corporations(MNCs)inChina,properisolationandcross-borderdata

transfercontrolisbecominganurgentrequirement.

Balancingtimelinesswithneedcan

causecomplicationsacrossindustries.Threecomplianceaspectscommonlyariseatthispoint:

•DataResidency:Tocomplywiththelawsandregulationsdiscussedin

thisdocument,datathatisgatheredinChinaneedstobeprocessedandstoredinChinaunlessthereisan

exceptiongranted.

•DataAccess:Processorsneeda

legalreasontoprocessdata,and

actorsneedalegalreasontoaccessthedata.Accesscontrolisnecessarytoensurethattheindividuals

accessingthedataareentitledtothatprivilege.

•Cr

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论