版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
MAKINGANIMPACTTHATMATTERS
StrategiesforDataComplianceinChina
September2024
5
Contents
ExecutiveSummary01
OverviewofChina’sDataRegulations02
PlanningRecommendations04
ManagingOpportunityandRisk05
IdentifyingDataAffectedbyPrivacyandDataSecurityRegulations06
FormulatingaLocalizationStrategy08
KeyTakeaways14
AppendixI15
AppendixII16
AppendixIII19
StrategiesforDataComplianceinChina|ExecutiveSummary
ExecutiveSummary
TargetAudienceforthisWhitePaper
ThispaperisappropriateformediumtolargecorporationswithsignificantbusinessintheChinesemainland,
orplanstoexpandbusinessintheChinesemainland.
CorporationsandtheChineseMarket
TheChinesemainlandoffers
substantialbusinessopportunities
formultinationalcorporations.Itis
thesecondlargesteconomyinthe
worldbynominalGDPandfirstby
purchasingpowerparity.China’sGDPislargerthanitsnextfourcompetitorscombined.
China’sGDPgrewat5.2%
in2023
—farfasterthanmostother
economiesofitsscale.Businesscasesareoftenmadeontotaladdressablemarketoronmarketgrowth,and
Chinaisaleaderinboth.
However,therearealsobusinessrisksassociatedwiththeChinesemarket—amongthem,recentdatalawsand
regulations.
TheCybersecurityLaw
waspassedin2017,followedbythe
DataSecurityLaw
,andthe
Personal
InformationProtectionLawin2021
.
TheselawssignificantlychangedthenatureofdoingbusinessinChina.
Regulatorytrendscontinuetobecomemorestringentandcomplexatan
increasingspeed,includingsemi-annualreviewsbytheCyberspaceAdministrationofChina.
Multinationalcompaniesare
challengedtocomplywiththeseregulationsinatimelymanner.EnterpriseITprojectscanbe
significantlylongerthanthesemi-
annualperiodsofregulatoryupdates.Inthattime,companiesareexpectedto:
•Classifyalldata,eventhatwhichdoesnotgotoChina,includingthelevelofsensitivityofthatdata
•UndergoasecurityassessmentbytheCybersecurityAuthorityofChina(thisdependsonthescaleoftheoperation)
•Buildandobtainapprovalonmany
technicalandresourceitems,including:
–Findingalegalapproachtocomply
withChineseregulations
–Communicatingwithlocalregulators
–Procuringsoftware
–Staffingalocalteamtoensurelocalcomplianceregulationsaremet
–Settingupnewservicesandconfiguretherelevantapps
–Planning,testing,andexecutingadataandcodemigration
–Onboardingusers
Corporationsneedtochoose
strategiesthatareresilientto
regulatorychange,enablegrowthintheChinamarket,andallowbusinessalignmentbetweentheirChinese
Mainlandoperationsandtherestoftheworld.TherearestepsandstrategiescorporationscantakenowtoconductbusinessinChina
whileprotectingcustomerdataandaddressingregulatoryandlegal
concerns.
01
02
StrategiesforDataComplianceinChina|OverviewofChina’sDataRegulations
OverviewofChina’sDataRegulations
TherearemultipleoverlappinglawsandregulationsrelatedtothecareandprocessingofcustomerdataintheChinesemainland,includingthe
guIationondataandcy
CybersecurityLaw(CSL)in2017,the
DataSecurityLaw(DSL)in2021,the
PersonalInformationProtectionLaw
(PIPL)in2021,andtheCryptography
Lawin2020.
Similarlawsand
regulationsarealsopresentinHongKongandMacau.
Selective
~13MONTHS~7MONTHS
PersonalInformationProtectionLaw(PIPL)
19thNov,2020
.TheseconddraftofPIPLwasreleasedforpubliccomment
13thOct,2020
.ThefirstdraftofPIPLwassubmittedtotheNationalPeople’sCongressofthePeople’sRepublicofChinaforreview
20thAug,2021
.Issuedbythe
StandingCommitteeoftheNational
People’sCongressofthePRC
21stOct,2020
.TheNationalPeople’s
CongresspublishedPIPL(Draft)andinvitedpubliccomment
.Closedpublic
commentforPIPLdraft
1stNov.,2021
.Cameintoeffect
30thApr,2021
TheMeasureofCBDTSecurityAssessment
7thJul.,2022
.‘ThemeasureofCBDTsecurity
assessment,and‘standard’issuedbytheCAC
1stSep.2022
.‘Themeasureofcross-borderDataTransfer
securityassessment,cameintoeffect
28thFeb.2023
Completethecross-borderdatatransfermaterial
submissionworkbytheendofFeb.2023
2024
2023
2022
2021
2020
10111245678910111479393
Mar,2024
.Cameintoeffect
Regulations
on
Promoting
and
Regulating
theCross-
borderData
Flow
Sep,2023
.ToclarifythosebusinessscenarioswhichdonotneedCBDTsecurityassessmentandgovernmentauthorization
.Theregulationwaspublishedforpubliccomments
RegulationonCBDT*
Standardizationand
Facilitation
Midof2015
.CSL(draft)publishedandopenedforpubliccomments
.CLSwasfurther
modifiedbasedonthecommentsfrompublic
Nov,2016
.CSLpassedbytheNationalPeople’s
Congress
Jun,2017
.CSLenactedbytheStanding
CommitteeoftheNationalPeople'sCongressandwentintoeffect
ChinaCybersecurityLaw(CSL)
Jul2nd,2020
.TheStanding
Committeeofthe
NationalPeople’s
CongressofChina
(“NPC”)releasedthe
draftDataSecurityLaw(“DraftLaw”)forpubliccomment
Apr29th,2021
.Releasedthe
updateddraftforpubliccomment
Jun10th,2021
.Issuedbythe
Standing
CommitteeoftheNationalPeople’sCongressofthePRC
Sep1st,2021
.Cameintoeffect
DataSecurityLaw(DSL)
~24months
6months
6months
~14months
StrategiesforDataComplianceinChina|OverviewofChina’sDataRegulations
03
ThelawsnotonlyapplytocorporationswithintheChinesemainland,but
alsotoentitiesoutsidetheChinesemainlandthatareofferinggoods
orservicestoindividualsinsidetheChinesemainlandormonitoringtheirbehavior(suchasmarketingand
marketinganalytics).
These
regulations
arecomplex,butthereareafewkeypoints:
•Personalinformationprocessedin
thecourseofdoingbusinessintheChinesemainlandneedstobestoredinChina,abovecertainthresholds
•Consentisneededtoprocesspersonaldata
•TransfersofpersonaldataoutsideofChinarequirelegalbasis
Thereareavarietyofmeasuresinplaceto
regulatecross-borderdata
transfers(CBDT)
ofpersonaldata,theprotectionofminorsonline,
managementofinfrastructuresecurity,processingofpersonalorsensitive
data,collectionofpersonaldata,
collectionofdatausingmobiledevices,andmore.Dependingonthescale
andclassificationofdatatransfer,thedatatransferwouldneedtobepre-approvedbyregulators.
Theinterpretationandimplementation
ofalloftheseregulationsare
frequentlyexaminedandrefined.
DecipheringtheRegulationHierarchy
Chinahasanoverlappingmatrixof
dataregulationsandmanycompaniesfinditconfusingtoknowwhichlawsapplytothem.
Currently,thetheChinesemainlanddataandcyberregulationscanbebrokendownintofourcategories:
•Nationallaws
•Nationalregulations
•Industryregulations
•Regionalregulations
TheNationalPeople’sCongress
passeslawsapplicablenationally,andhaveprecedenceoverotherlawsandregulations.Next,regulationsdraftedbystatecouncilsanddepartments
willaddmoredetailtothenational
laws,followedbyindustryregulationsdraftedbyindustrialregulators,followedbyregulationsfromregionalregulators.
Forexample,asanauto
manufacturerinShenzhen,notonly
isyourcorporationaffectedbythe
Cybersecuritylaw,butalsobythe
nationalregulationsthatfurtherdefinenationallaws,andalsotheregulationsspecifictoyourindustry,andfinallybytheregulationsintheregionswhere
yourcorporationdoesbusiness.All
needtobeconsideredinplanningyourdatastrategy.
Enacted&draftedtheChinesemainlanddataandcyberregulation
Nati0nalLaws
.pubIishedbytheNationaIpeopIe,scongressstandingcommittee
DatasecurityLaw
(2021.09.01)
Measuresonthestandardcontractforcross-borderTransferofpersonaI
Information(2024.03.22)
.AppIicabIetoaIIentitiesinchina
cybersecurityLaw
(2017.06.01)
personaIInformationprotectionLaw
(2021.11.01)
Nati0nalRegulati0n
.pubIishedbythestatecounciIofchinaanditssubordinatedepartments
.AppIicabIetoaIIentitiesinchina
ReguIationsonpromotingandReguIatingthecross-borderDataFIow(2024.03.22)
MeasuresforthesecurityAssessmentofcross-borderDataTransfer(2024.03.22)
RuIesforDatacIassificationandGrading(pubIished,wiIIenactfrom2024.10.01)
IndustryRegulati0n
.pubIishedbytheindustriaIreguIatorssuchasMinistryofIndustryand
InformationTechnoIogy
china(Tianjin)piIotFreeTradezoneDataExportManagementList(NegativeList)
(2024.05.09)
.AppIicabIetoentitiesdefinedinspecificreguIation
certainprovisionsontheManagementof
AutomobiIeDatasecurity(TriaI)1
(2021.10.01)
GuideIinesforDatacIassificationand
GradingintheHeaIthcareIndustry(TriaI)
MeasuresfortheManagementofData
securityofBankingandlnsurance
Institutions(Draftforcomments
2024.3.23)
Regi0nalRegulati0n
.pubIishedbytheregionaIreguIatorssuchasprovinciaIgovernment
.AppIicabIetoentitiesdefinedbyspecificreguIation
specificationofEnterpriseData
cIassificationstandardsforchina(Tianjin)
piIotFreeTradezone(2024.02.07)
MeasuresforcIassificationandGradingManagementofcross-borderData
TransferinSHALin-gangSpeciaIArea
(TriaI)(2024.02.08)*
GeneraIdataIistofscenarioizationcross-BorderDataTransferinSHALin-gang
SpeciaIArea(connectedcar;pubIicFund;LsHc-TriaI)(2024.05.17)*
CoIorCode:
foIIow
reference
Legend:
Enacted
StrategiesforDataComplianceinChina|PlanningRecommendations
PlanningRecommendations
Teamswillneedtocarefullyconsidertheirtime,dedication,resources,andbudgetiftheyplantomoveforward.Theconsequencesformishandlingdatacanbesevereandcostly.Lawsandregulationssurroundingdata
complianceinChinaoverlapand
aresubjecttorevisionandmultipleinterpretations.Keeptrackof
restrictionsastheymaychangewhile
you’replanningorexecutingyourstrategy.
Dependingoninternalcircumstancesandgoals,companiesshouldconsidertheserecommendedsteps:
•Scopetheopportunityandtherisk:Understandstrategiesfor
riskanddeterminewhichoneyourbusinesswilluse.
•Identifythedataandsystems
thatneedprotection:Classify
dataandsystemsfortheirlevelofsensitivity.Planfordataremediationanddatatransfersaswell.
•Formulatealocalizationstrategy:
Fitthestrategytoneedsandscale,andalignitwithcompliancetrends
04
StrategiesforDataComplianceinChina|ManagingOpportunityandRisk
05
ManagingOpportunityandRisk
Corporationstypicallyentermarkets
afterqualifyingtheaddressablemarketsize,creatingbusinessplans,anddoingduediligence.Thetargetaudienceofthisdocumenthasalreadyscopedandqualifiedtheopportunities,andmanyofthecostsandrisks.
Inthissection,wewillassumethat
themarketopportunityissignificant,andsharemethodstoreducerisk.Asmentionedpreviously,therisksincludecivilpenaltiessuchasfines,market
exclusion,andcriminalpenalties.
StrategiesforRisk
Therearemultiplestrategiesfor
corporationstoaddressbusinessriskwhenconsideringconductingbusinessinChina.Threeofthekeystrategies
organizationsemploywhenmanagingrestrictionstotheChinesemarketareavoidance,acceptanceandmitigation.
Avoidanceiswhenanenterprise
leavestheChinamarketplacefortheir
competitors.Forthevastmajorityof
multinationalcorporations,themarketsizeandmarketopportunityofworkinginChinaistoolargeforthisstrategytobepractical.
Acceptanceofresidualriskafter
mitigationisacommonstrategy,
butthefullpenaltiescanbeharsh.
Individualsheldresponsiblecanbe
personallyfinedsignificantamountsofmoney,inadditiontofeesbilledtotheorganization.
Anyincomeassociatedwiththe
violationscanbeconfiscated.
Individualsheldresponsiblecanbe
sentencedtojailtimeofuptosevenyearsandcanbebannedfromdoingbusinessinChinaforaperiodoftime.Tortliabilitiesalsoexist.
InJuly2022,theCybersecurity
AuthorityofChina(“CAC”)finedone
company$1.2billion,whichwasnearly5%ofthecompany’stotalrevenue.The
globalCEOwasalsopersonallyfined,andthecompanywasbannedfrom
addingnewuserswhiletheirmobile
appswereremovedfromChinamobileappstoresforaperiodoftime.
Mitigationmeansprimarilyin
implementingalong-termstrategy
thatenablescompliancetothelawsandregulationsandisrobustenoughtohandletheongoingevolution
ofthoseregulations.Technology
andoperationalprocessesplayanimportantroleinmitigatingrisk—
includingmaintainingdataresidency,controllingaccesstoregulateddata,andobtainingconsent.Mitigationisoftenthebeststrategy.
Ifyourcompanychoosestomitigatetherisk,thenextstepwouldbetoidentifyandassesswhatdataisimpacted.
StrategiesforDataComplianceinChina|IdentifyingDataAffectedbyPrivacyandDataSecurityRegulations
06
IdentifyingDataAffectedbyPrivacyandDataSecurityRegulations
Understandingregulateddatain
Chinacanbeconfusingbecauseof
thevaryingdefinitions.InlawslikethePIPL,theCybersecurityLaw,theDataSecurityLaw,previouslegislation,
andaffiliatedregulations,protected
dataisdefinedinseveraldifferent
ways.ThePIPLcovers“personal”dataand“sensitivepersonal”data.The
CybersecurityLawandtheDataSecurityLawbothcover“important”data.
Furthermore,thereisaMulti-Level
ProtectionScheme(MLPS2.0)whichdefinesfivelevelsofimpact—rangingfromimpacttoorganizationsand
individuals,attheleastregulatedlevel,uptonationalsecurityimpactsasthemostregulatedlevel.
Soalternately,insomesituations
datamaybecategorizedaspersonal,sensitive,orimportant;inothers,it
maybedefinedbyMLPSlevelsand
impactlevels.Whenplanning,both
categorizationschemescanbeuseful.
Businessdatacanfallintomanyof
thesecategories.Names,phone
numbers,andotherpersonally
identifiablefieldsinonescheme
wouldbeconsidered“personaldata”,andmayalsofitintoMLPSlevel1.
PersonalHealthInformation(PHI)
wouldbeconsidered“sensitive”
underthePIPL,andwouldrequirea
higherlevelofprotection.Thishigherlevelofprotectioncanbeseenin
accesscontrol,theneedforastronger
justificationandconsentforprocessingthe
data,andmorerestrictionsontransferringthedataacrossnationalboundaries.
Otherexamplesofsensitive
informationincludereligiousbeliefsoraffiliation,financialdata,andlocationtracking.Thisdataisoftenstored
inbusinesssystems—forexample,providermanagement,HR,accountmanagement,scheduling,andretailexecutioncanallincludevarious
formsofsensitiveinformation.Someexamplesmightinclude:
Theguidanceonthedataclassificationcanbeconcludedbydifferentobjectswithimpactlevels,
asdefinedby
MLPS2.0.andaswellthelatestGB/T43697-2024,Thelevelsareasfollows:
StrategiesforDataComplianceinChina|IdentifyingDataAffectedbyPrivacyandDataSecurityRegulations
07
•CoreData:Directlyimpactsnationalsecurity,politicalsecurity,people’s
livelihoods,andmajorpublicinterests.
•ImportantData:Mayaffectnationalsecurity,economicoperation,socialstability,healthorsafety.Datathat
affectsasingleorganizationor
individualtypicallydoesnotqualifyforthiscategory.
•GeneralData:Doesnotfallintothe
CoreDataorImportantDatacategories.
•PersonalData:Personallyidentifiableinformation.
•SensitivePersonalData:Personalinformation,whichifleakedor
destroyed,couldimpactanindividual’shealth,safety,orproperty.
Coredataismoresensitive(hasa
higherrisk)thanImportantdata,
whichisinturnmoresensitivethangeneraldata.Datashouldbegradedandevaluatedbythepotential
impactbasedonthescaleofthe
effectandthescaleandprecisionofthedata.
ImpactLevel
Categories
Especiallysevere
Severe
Normal
NationalSecurity
Coredata
Coredata
Importantdata
Economy
Coredata
Importantdata
Generaldata
SocialOrder
Coredata
Importantdata
Generaldata
PublicInterest
Coredata
Importantdata
Generaldata
Org/Indrights
Generaldata
Generaldata
Generaldata
Furthermore,dependingonthe
industryortheregion,additional
restrictionscancomeintoplay.For
example,IoTdataisrestrictedfrom
cross-borderdatatransfer.Inhealth
care,treatmentinformationisrestricted.Additionalexamplesinclude:
•AutomotiveManufacturing:A
luxurycarmanufacturerdevelops
apersonalizeddriverassistance
systemthatlearnsfromindividual
drivinghabits.Thesystemcollects
andprocessesdataonaccelerationpatterns,brakingbehavior,androutepreferences.Thisinformation,whilecrucialforoptimizingthedriving
experience,ishighlysensitiveasitcouldrevealpersonalroutinesandlocationsifcompromised.
•LifeSciences:Apharmaceuticalcompanyconductsclinicaltrialsforanewcancertreatment.
Theycollectextensivepatient
data,includinggeneticmarkers,treatmentresponses,andqualityoflifeindicators.Thisinformationisnotonlymedicallysensitivebutalsopotentiallyrevealingaboutindividuals'long-termhealth
prospectsandcouldaffecttheir
insurabilityoremploymentifdisclosed.
•LuxuryRetail:Ahigh-endjewelrybrandoffersabespokeservice
whereclientscandesigncustom
pieces.Thecompanymaintains
adatabaseofclientpreferences,
purchasehistory,andpersonal
events(e.g.,anniversaries,birthdays).
Thisinformation,whilevaluableforpersonalizedmarketing,issensitiveasitcouldrevealaclient'sfinancialstatus,personalrelationships,andlifestylechoicesifbreached.
Corporationsmaychoosetoclassifydatausingmultipleparameters:
•Classifydatabylevelofsensitivity.Thiscantypicallybedonebasedonthedataschema.
•Classifycross-borderdatatransfersbylevelofsensitivity.Cross-borderdatatransfersaretreatedmore
strictlythandataprocessing;data
maybeacceptabletoprocessinChinabutnottotransferoutsideofChina.
StrategiesforDataComplianceinChina|FormulatingaLocalizationStrategy
08
FormulatingaLocalizationStrategy
Onceacompanyhasassessedrisk
andclassifieddata,itistimetobuildadigitalstrategytoensurethehandlingofthatdataiscompliant.
Corporationsshouldcarefullyconsiderglobalandregionalgovernance,localmarketbusinesssupport,regulation
constraints,andcostefficiency.
Companieswillneedtoconsidermultiplefactorstofindsuccess,including:
•Cybersecurityissuessuchaswhethersensitivedataisinvolved
•Systemperformancequalityandmaintainingaconsistentuser
experiencewhiletransactionvolumeincreases
•ThelevelofintegrationdependencyonChina’sdigitalecosystemstofulfilllocalizedusecases
•Howtobestmanageandleverageglobalassetsacrossborders
cyber,DataandprivacyReguIatorycompIiance
considerationsofwhetherPIIorothersensitivedataisinvoIved
throughoutdatacoIIection,storage,processingandusageIifecycIeundercsL,PIPLandotherreguIationrequirements
cyber&Datasecurity
cross-BorderDataTransfer
AIignment
Empower
PrivacyProtection
c.chinaMarketBusinessGrowth
BusinesscontinuityundercompIexGeopoIitics
AssetsynergyandcapitaIEfficiency
considerationofhowto
IeveragegIobaIassetsto
achievecrossregionsynergy
andmorescaIabIearchitecture
chinaspecificExperienceDeIiveryDependency
considerationsoftheIeveIof
integrationdependencyonchinadigitaIecosystemstofuIfiII
IocaIizedbusinessusecases
A.ReguIations&constraints
D.GIobaI&
RegionaIsynergyandGovernance
TcOandTOM
governance,incIudingsupportcapabiIities;whiIecrossborderdataaccesswouIdbeoneof
thekeyfactorstoimpactTcO
甲甲
B.systemperformanceRequirement
systemPerformance
systemAvaiIabiIity
systemperformance&AvaiIabiIityNecessity
TheimportanceofstabIeperformanceandIeveIofRTO&RPOunderincreasingtransactionvoIumeandbusinesscompIexitytomaintainconsistentuserexperience
StrategiesforDataComplianceinChina|FormulatingaLocalizationStrategy
09
Giventhepotentialbreadthofa
corporation'scustomerrelationshipmanagement(CRM)system,thedatawithinitshouldbestoredlocallytomeetlocalizationrequirements,havepropersecuritymeasuresinplacetocontrolaccessandcompliancewithlocallawsandregulations,allwhilebeinguseabletomeetthebusiness
needs.Theaffecteddataandtechnicaldomainscanbewide-ranging,
includingemployeedata,customerdata,businesspartnerdataand
identity,andmore.
Acorporation’sCRMisoften
connectedtotheirmarketingsystems,socialmedia,enterpriseresource
planning(ERP)software,analytics
platform,dataplatform,andmore
systems,furtheraffectingwhichdataneedstobeprotectedandcompliant.Sincesensitivedataisstoredand
sharedfromthesesystems,allofthemareaffectedtosomedegree,andtheirintegrationsalsoneedtobesecure
andcompliant.
ERP
•ChinaERPwithowninstance
•LocallysourcedERP
Workspace&Collaboration
•O365(includingE-mail)
•CollaborationTools
•ITILtools
Sales&Marketing
•WeChattouchpoints
•E-Commerce/orderingportal
•SalesEnablement
•CRM(i.e.Salesforce)
DataPlatform
•ConsumerDataPlatform
•OtherDataPlatformincludingimportantdata
KeyAreas
ofLocalized
Solutions
Security
•IAM/ADSeparation/MFA
•ZeroTrust
•VulnerabilityscanandPentest
•CyberSecurity
HR
•Global/localsplitoftheHRsystemsin
viewoftheregulatoryrequirementsandlocalecosystem
Sales&Marketing
•StandardGlobalsolutionhostedinChina
•Chinalocalizedsolutionwithcustomization
•Tailor-madesolutionwithcloudprovidersinChina
DataPlatform
•DedicatedDomainforCNservices(Certificate/ICP)
•LocalauthorizedDNS
•IndependentVPCs/subnetsforChinas
•Localaccessforuserprofilee.g.,VPN,Identity
CybersecurityConsiderations
AchievingcompliancewhileenhancingthecybersecuritylevelinChinaandtherestoftheworldisachallenge.
Forexample,specificdataisnot
allowedtoleavetheChinesemainland,likeSensitivePersonalInformation.
Non-compliancecanresultinfines,butimprovingcybersecurityiskeytoprotectingintellectualproperty.
Companieswillneedtofindabalancebetweenthetwotosatisfyallpartiesandkeepinformationsecure.
10
StrategiesforDataComplianceinChina|FormulatingaLocalizationStrategy
Compliance
•Localcybersecurityofficerisrequired
•Possiblyalocaldataprotectionofficer
CybersecurityOrganization
Cybersecuritymaturity
•LocalizedCybersecurityOrganizationshouldbeconsidereddueto
•Limitationsofdatatransfer
•Potentiallyothertools/solutionsthaninrestoftheworld
•SpecificdataisnotallowedtoleavetheChinesemainland
•SenstiviePersonalinformation(SPI)
•Importantdata
DataTransfer&Network
•LimitationsofnetworkaccessfromandtoChinapreventingattacks
•Preventionofdataleakageandinsiderthreats
•e.g.,segmentationsofnetworks,networkenforcementpoints
•SystemswhicharedeployedoroperatedinChinahavetocomplytospecifichardening
•e.g.,operatingsystems,networktechnology,cybersecuritytools
Technology
•Globallytrustedtechnologystandardsandsolutionstoensuresecureworkingandcollaboration
•Somefunctionsmightnotbeavailableinothersolutions
•KeyNetworkProduct&ServiceChallenges
•Salespermit&certificationsisrequired
•Listofproducts(firstbatch,scope,standards)
NetworkProduct&Service
•Taking‘TradePolicies’intoconsideration,attentionsneededonproductssupplydisruptionandthe
inabilityofproductupdate
•Limitationofallowedcryptographicsolutions
•Commercialcryptographyimportsmustbepermitted
Non-compliancecanresultinfines,
suspensionofbusiness,revocation
oflicenses,andindustryrestrictions
forinvolvedstaff
Cryptography
•Globalstandardstoensurehighlysecuredataencryptionandexchange
Appropriatemeasuresneededimproving
cybersecuritylevelinordertoprotect
intellectualproperty
DataResidency,DataAccess,andCross-borderDataTransfers
Hostingbusinessapplications
andtheirdatainChinasupports
compliancewiththeCybersecurityLaw(CSL),DataSecurityLaw(DSL),and
PersonalInformationProtectionLaw(PIPL)regulations,aswellasmeetingChinamarketdynamicsandspeed,andensuringbothglobalandlocalcybersecurity.
China’scurrentcyberspace
governancestrategyistofocuson
cybersecurityandprotectpersonal
dataandimportantdatacross-bordertransmission.Formultinational
corporations(MNCs)inChina,properisolationandcross-borderdata
transfercontrolisbecominganurgentrequirement.
Balancingtimelinesswithneedcan
causecomplicationsacrossindustries.Threecomplianceaspectscommonlyariseatthispoint:
•DataResidency:Tocomplywiththelawsandregulationsdiscussedin
thisdocument,datathatisgatheredinChinaneedstobeprocessedandstoredinChinaunlessthereisan
exceptiongranted.
•DataAccess:Processorsneeda
legalreasontoprocessdata,and
actorsneedalegalreasontoaccessthedata.Accesscontrolisnecessarytoensurethattheindividuals
accessingthedataareentitledtothatprivilege.
•Cr
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 航空航天安全施工合同样本
- 幼儿艺术培训协议
- 劳动合同变更协议
- 热力施工班组合同
- 地下管廊混凝土施工合同
- 烟草公司合同处理流程
- 节庆用品租赁终止转租协议
- 屋顶酒吧屋顶防水工程协议
- 给排水系统承台施工协议
- 教育机构商标保护手册
- 《灵敏素质练习》教案
- 中国文化英语教程Unit-3
- 如何对待父母唠叨
- 型钢轧制操作学习培训导卫安装与调整操作课件
- 人教PEP版六年级英语上册《Unit 4 Part B 第5课时》教学课件PPT小学公开课
- 红色国潮风谢师宴活动策划PPT模板课件
- 统编版四年级上册语文课件 - 第五单元 习作例文 (PPT28页)
- T∕CSPSTC 69-2021 磷石膏预处理技术规范
- T∕CAWA 002-2021 中国疼痛科专业团体标准
- 铁精矿管道输送工艺在鞍钢矿山的应用
- 农产品电子商务平台建设项目可行性研究报告
评论
0/150
提交评论