版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
MAKINGANIMPACTTHATMATTERS
StrategiesforDataComplianceinChina
September2024
5
Contents
ExecutiveSummary01
OverviewofChina’sDataRegulations02
PlanningRecommendations04
ManagingOpportunityandRisk05
IdentifyingDataAffectedbyPrivacyandDataSecurityRegulations06
FormulatingaLocalizationStrategy08
KeyTakeaways14
AppendixI15
AppendixII16
AppendixIII19
StrategiesforDataComplianceinChina|ExecutiveSummary
ExecutiveSummary
TargetAudienceforthisWhitePaper
ThispaperisappropriateformediumtolargecorporationswithsignificantbusinessintheChinesemainland,
orplanstoexpandbusinessintheChinesemainland.
CorporationsandtheChineseMarket
TheChinesemainlandoffers
substantialbusinessopportunities
formultinationalcorporations.Itis
thesecondlargesteconomyinthe
worldbynominalGDPandfirstby
purchasingpowerparity.China’sGDPislargerthanitsnextfourcompetitorscombined.
China’sGDPgrewat5.2%
in2023
—farfasterthanmostother
economiesofitsscale.Businesscasesareoftenmadeontotaladdressablemarketoronmarketgrowth,and
Chinaisaleaderinboth.
However,therearealsobusinessrisksassociatedwiththeChinesemarket—amongthem,recentdatalawsand
regulations.
TheCybersecurityLaw
waspassedin2017,followedbythe
DataSecurityLaw
,andthe
Personal
InformationProtectionLawin2021
.
TheselawssignificantlychangedthenatureofdoingbusinessinChina.
Regulatorytrendscontinuetobecomemorestringentandcomplexatan
increasingspeed,includingsemi-annualreviewsbytheCyberspaceAdministrationofChina.
Multinationalcompaniesare
challengedtocomplywiththeseregulationsinatimelymanner.EnterpriseITprojectscanbe
significantlylongerthanthesemi-
annualperiodsofregulatoryupdates.Inthattime,companiesareexpectedto:
•Classifyalldata,eventhatwhichdoesnotgotoChina,includingthelevelofsensitivityofthatdata
•UndergoasecurityassessmentbytheCybersecurityAuthorityofChina(thisdependsonthescaleoftheoperation)
•Buildandobtainapprovalonmany
technicalandresourceitems,including:
–Findingalegalapproachtocomply
withChineseregulations
–Communicatingwithlocalregulators
–Procuringsoftware
–Staffingalocalteamtoensurelocalcomplianceregulationsaremet
–Settingupnewservicesandconfiguretherelevantapps
–Planning,testing,andexecutingadataandcodemigration
–Onboardingusers
Corporationsneedtochoose
strategiesthatareresilientto
regulatorychange,enablegrowthintheChinamarket,andallowbusinessalignmentbetweentheirChinese
Mainlandoperationsandtherestoftheworld.TherearestepsandstrategiescorporationscantakenowtoconductbusinessinChina
whileprotectingcustomerdataandaddressingregulatoryandlegal
concerns.
01
02
StrategiesforDataComplianceinChina|OverviewofChina’sDataRegulations
OverviewofChina’sDataRegulations
TherearemultipleoverlappinglawsandregulationsrelatedtothecareandprocessingofcustomerdataintheChinesemainland,includingthe
guIationondataandcy
CybersecurityLaw(CSL)in2017,the
DataSecurityLaw(DSL)in2021,the
PersonalInformationProtectionLaw
(PIPL)in2021,andtheCryptography
Lawin2020.
Similarlawsand
regulationsarealsopresentinHongKongandMacau.
Selective
~13MONTHS~7MONTHS
PersonalInformationProtectionLaw(PIPL)
19thNov,2020
.TheseconddraftofPIPLwasreleasedforpubliccomment
13thOct,2020
.ThefirstdraftofPIPLwassubmittedtotheNationalPeople’sCongressofthePeople’sRepublicofChinaforreview
20thAug,2021
.Issuedbythe
StandingCommitteeoftheNational
People’sCongressofthePRC
21stOct,2020
.TheNationalPeople’s
CongresspublishedPIPL(Draft)andinvitedpubliccomment
.Closedpublic
commentforPIPLdraft
1stNov.,2021
.Cameintoeffect
30thApr,2021
TheMeasureofCBDTSecurityAssessment
7thJul.,2022
.‘ThemeasureofCBDTsecurity
assessment,and‘standard’issuedbytheCAC
1stSep.2022
.‘Themeasureofcross-borderDataTransfer
securityassessment,cameintoeffect
28thFeb.2023
Completethecross-borderdatatransfermaterial
submissionworkbytheendofFeb.2023
2024
2023
2022
2021
2020
10111245678910111479393
Mar,2024
.Cameintoeffect
Regulations
on
Promoting
and
Regulating
theCross-
borderData
Flow
Sep,2023
.ToclarifythosebusinessscenarioswhichdonotneedCBDTsecurityassessmentandgovernmentauthorization
.Theregulationwaspublishedforpubliccomments
RegulationonCBDT*
Standardizationand
Facilitation
Midof2015
.CSL(draft)publishedandopenedforpubliccomments
.CLSwasfurther
modifiedbasedonthecommentsfrompublic
Nov,2016
.CSLpassedbytheNationalPeople’s
Congress
Jun,2017
.CSLenactedbytheStanding
CommitteeoftheNationalPeople'sCongressandwentintoeffect
ChinaCybersecurityLaw(CSL)
Jul2nd,2020
.TheStanding
Committeeofthe
NationalPeople’s
CongressofChina
(“NPC”)releasedthe
draftDataSecurityLaw(“DraftLaw”)forpubliccomment
Apr29th,2021
.Releasedthe
updateddraftforpubliccomment
Jun10th,2021
.Issuedbythe
Standing
CommitteeoftheNationalPeople’sCongressofthePRC
Sep1st,2021
.Cameintoeffect
DataSecurityLaw(DSL)
~24months
6months
6months
~14months
StrategiesforDataComplianceinChina|OverviewofChina’sDataRegulations
03
ThelawsnotonlyapplytocorporationswithintheChinesemainland,but
alsotoentitiesoutsidetheChinesemainlandthatareofferinggoods
orservicestoindividualsinsidetheChinesemainlandormonitoringtheirbehavior(suchasmarketingand
marketinganalytics).
These
regulations
arecomplex,butthereareafewkeypoints:
•Personalinformationprocessedin
thecourseofdoingbusinessintheChinesemainlandneedstobestoredinChina,abovecertainthresholds
•Consentisneededtoprocesspersonaldata
•TransfersofpersonaldataoutsideofChinarequirelegalbasis
Thereareavarietyofmeasuresinplaceto
regulatecross-borderdata
transfers(CBDT)
ofpersonaldata,theprotectionofminorsonline,
managementofinfrastructuresecurity,processingofpersonalorsensitive
data,collectionofpersonaldata,
collectionofdatausingmobiledevices,andmore.Dependingonthescale
andclassificationofdatatransfer,thedatatransferwouldneedtobepre-approvedbyregulators.
Theinterpretationandimplementation
ofalloftheseregulationsare
frequentlyexaminedandrefined.
DecipheringtheRegulationHierarchy
Chinahasanoverlappingmatrixof
dataregulationsandmanycompaniesfinditconfusingtoknowwhichlawsapplytothem.
Currently,thetheChinesemainlanddataandcyberregulationscanbebrokendownintofourcategories:
•Nationallaws
•Nationalregulations
•Industryregulations
•Regionalregulations
TheNationalPeople’sCongress
passeslawsapplicablenationally,andhaveprecedenceoverotherlawsandregulations.Next,regulationsdraftedbystatecouncilsanddepartments
willaddmoredetailtothenational
laws,followedbyindustryregulationsdraftedbyindustrialregulators,followedbyregulationsfromregionalregulators.
Forexample,asanauto
manufacturerinShenzhen,notonly
isyourcorporationaffectedbythe
Cybersecuritylaw,butalsobythe
nationalregulationsthatfurtherdefinenationallaws,andalsotheregulationsspecifictoyourindustry,andfinallybytheregulationsintheregionswhere
yourcorporationdoesbusiness.All
needtobeconsideredinplanningyourdatastrategy.
Enacted&draftedtheChinesemainlanddataandcyberregulation
Nati0nalLaws
.pubIishedbytheNationaIpeopIe,scongressstandingcommittee
DatasecurityLaw
(2021.09.01)
Measuresonthestandardcontractforcross-borderTransferofpersonaI
Information(2024.03.22)
.AppIicabIetoaIIentitiesinchina
cybersecurityLaw
(2017.06.01)
personaIInformationprotectionLaw
(2021.11.01)
Nati0nalRegulati0n
.pubIishedbythestatecounciIofchinaanditssubordinatedepartments
.AppIicabIetoaIIentitiesinchina
ReguIationsonpromotingandReguIatingthecross-borderDataFIow(2024.03.22)
MeasuresforthesecurityAssessmentofcross-borderDataTransfer(2024.03.22)
RuIesforDatacIassificationandGrading(pubIished,wiIIenactfrom2024.10.01)
IndustryRegulati0n
.pubIishedbytheindustriaIreguIatorssuchasMinistryofIndustryand
InformationTechnoIogy
china(Tianjin)piIotFreeTradezoneDataExportManagementList(NegativeList)
(2024.05.09)
.AppIicabIetoentitiesdefinedinspecificreguIation
certainprovisionsontheManagementof
AutomobiIeDatasecurity(TriaI)1
(2021.10.01)
GuideIinesforDatacIassificationand
GradingintheHeaIthcareIndustry(TriaI)
MeasuresfortheManagementofData
securityofBankingandlnsurance
Institutions(Draftforcomments
2024.3.23)
Regi0nalRegulati0n
.pubIishedbytheregionaIreguIatorssuchasprovinciaIgovernment
.AppIicabIetoentitiesdefinedbyspecificreguIation
specificationofEnterpriseData
cIassificationstandardsforchina(Tianjin)
piIotFreeTradezone(2024.02.07)
MeasuresforcIassificationandGradingManagementofcross-borderData
TransferinSHALin-gangSpeciaIArea
(TriaI)(2024.02.08)*
GeneraIdataIistofscenarioizationcross-BorderDataTransferinSHALin-gang
SpeciaIArea(connectedcar;pubIicFund;LsHc-TriaI)(2024.05.17)*
CoIorCode:
foIIow
reference
Legend:
Enacted
StrategiesforDataComplianceinChina|PlanningRecommendations
PlanningRecommendations
Teamswillneedtocarefullyconsidertheirtime,dedication,resources,andbudgetiftheyplantomoveforward.Theconsequencesformishandlingdatacanbesevereandcostly.Lawsandregulationssurroundingdata
complianceinChinaoverlapand
aresubjecttorevisionandmultipleinterpretations.Keeptrackof
restrictionsastheymaychangewhile
you’replanningorexecutingyourstrategy.
Dependingoninternalcircumstancesandgoals,companiesshouldconsidertheserecommendedsteps:
•Scopetheopportunityandtherisk:Understandstrategiesfor
riskanddeterminewhichoneyourbusinesswilluse.
•Identifythedataandsystems
thatneedprotection:Classify
dataandsystemsfortheirlevelofsensitivity.Planfordataremediationanddatatransfersaswell.
•Formulatealocalizationstrategy:
Fitthestrategytoneedsandscale,andalignitwithcompliancetrends
04
StrategiesforDataComplianceinChina|ManagingOpportunityandRisk
05
ManagingOpportunityandRisk
Corporationstypicallyentermarkets
afterqualifyingtheaddressablemarketsize,creatingbusinessplans,anddoingduediligence.Thetargetaudienceofthisdocumenthasalreadyscopedandqualifiedtheopportunities,andmanyofthecostsandrisks.
Inthissection,wewillassumethat
themarketopportunityissignificant,andsharemethodstoreducerisk.Asmentionedpreviously,therisksincludecivilpenaltiessuchasfines,market
exclusion,andcriminalpenalties.
StrategiesforRisk
Therearemultiplestrategiesfor
corporationstoaddressbusinessriskwhenconsideringconductingbusinessinChina.Threeofthekeystrategies
organizationsemploywhenmanagingrestrictionstotheChinesemarketareavoidance,acceptanceandmitigation.
Avoidanceiswhenanenterprise
leavestheChinamarketplacefortheir
competitors.Forthevastmajorityof
multinationalcorporations,themarketsizeandmarketopportunityofworkinginChinaistoolargeforthisstrategytobepractical.
Acceptanceofresidualriskafter
mitigationisacommonstrategy,
butthefullpenaltiescanbeharsh.
Individualsheldresponsiblecanbe
personallyfinedsignificantamountsofmoney,inadditiontofeesbilledtotheorganization.
Anyincomeassociatedwiththe
violationscanbeconfiscated.
Individualsheldresponsiblecanbe
sentencedtojailtimeofuptosevenyearsandcanbebannedfromdoingbusinessinChinaforaperiodoftime.Tortliabilitiesalsoexist.
InJuly2022,theCybersecurity
AuthorityofChina(“CAC”)finedone
company$1.2billion,whichwasnearly5%ofthecompany’stotalrevenue.The
globalCEOwasalsopersonallyfined,andthecompanywasbannedfrom
addingnewuserswhiletheirmobile
appswereremovedfromChinamobileappstoresforaperiodoftime.
Mitigationmeansprimarilyin
implementingalong-termstrategy
thatenablescompliancetothelawsandregulationsandisrobustenoughtohandletheongoingevolution
ofthoseregulations.Technology
andoperationalprocessesplayanimportantroleinmitigatingrisk—
includingmaintainingdataresidency,controllingaccesstoregulateddata,andobtainingconsent.Mitigationisoftenthebeststrategy.
Ifyourcompanychoosestomitigatetherisk,thenextstepwouldbetoidentifyandassesswhatdataisimpacted.
StrategiesforDataComplianceinChina|IdentifyingDataAffectedbyPrivacyandDataSecurityRegulations
06
IdentifyingDataAffectedbyPrivacyandDataSecurityRegulations
Understandingregulateddatain
Chinacanbeconfusingbecauseof
thevaryingdefinitions.InlawslikethePIPL,theCybersecurityLaw,theDataSecurityLaw,previouslegislation,
andaffiliatedregulations,protected
dataisdefinedinseveraldifferent
ways.ThePIPLcovers“personal”dataand“sensitivepersonal”data.The
CybersecurityLawandtheDataSecurityLawbothcover“important”data.
Furthermore,thereisaMulti-Level
ProtectionScheme(MLPS2.0)whichdefinesfivelevelsofimpact—rangingfromimpacttoorganizationsand
individuals,attheleastregulatedlevel,uptonationalsecurityimpactsasthemostregulatedlevel.
Soalternately,insomesituations
datamaybecategorizedaspersonal,sensitive,orimportant;inothers,it
maybedefinedbyMLPSlevelsand
impactlevels.Whenplanning,both
categorizationschemescanbeuseful.
Businessdatacanfallintomanyof
thesecategories.Names,phone
numbers,andotherpersonally
identifiablefieldsinonescheme
wouldbeconsidered“personaldata”,andmayalsofitintoMLPSlevel1.
PersonalHealthInformation(PHI)
wouldbeconsidered“sensitive”
underthePIPL,andwouldrequirea
higherlevelofprotection.Thishigherlevelofprotectioncanbeseenin
accesscontrol,theneedforastronger
justificationandconsentforprocessingthe
data,andmorerestrictionsontransferringthedataacrossnationalboundaries.
Otherexamplesofsensitive
informationincludereligiousbeliefsoraffiliation,financialdata,andlocationtracking.Thisdataisoftenstored
inbusinesssystems—forexample,providermanagement,HR,accountmanagement,scheduling,andretailexecutioncanallincludevarious
formsofsensitiveinformation.Someexamplesmightinclude:
Theguidanceonthedataclassificationcanbeconcludedbydifferentobjectswithimpactlevels,
asdefinedby
MLPS2.0.andaswellthelatestGB/T43697-2024,Thelevelsareasfollows:
StrategiesforDataComplianceinChina|IdentifyingDataAffectedbyPrivacyandDataSecurityRegulations
07
•CoreData:Directlyimpactsnationalsecurity,politicalsecurity,people’s
livelihoods,andmajorpublicinterests.
•ImportantData:Mayaffectnationalsecurity,economicoperation,socialstability,healthorsafety.Datathat
affectsasingleorganizationor
individualtypicallydoesnotqualifyforthiscategory.
•GeneralData:Doesnotfallintothe
CoreDataorImportantDatacategories.
•PersonalData:Personallyidentifiableinformation.
•SensitivePersonalData:Personalinformation,whichifleakedor
destroyed,couldimpactanindividual’shealth,safety,orproperty.
Coredataismoresensitive(hasa
higherrisk)thanImportantdata,
whichisinturnmoresensitivethangeneraldata.Datashouldbegradedandevaluatedbythepotential
impactbasedonthescaleofthe
effectandthescaleandprecisionofthedata.
ImpactLevel
Categories
Especiallysevere
Severe
Normal
NationalSecurity
Coredata
Coredata
Importantdata
Economy
Coredata
Importantdata
Generaldata
SocialOrder
Coredata
Importantdata
Generaldata
PublicInterest
Coredata
Importantdata
Generaldata
Org/Indrights
Generaldata
Generaldata
Generaldata
Furthermore,dependingonthe
industryortheregion,additional
restrictionscancomeintoplay.For
example,IoTdataisrestrictedfrom
cross-borderdatatransfer.Inhealth
care,treatmentinformationisrestricted.Additionalexamplesinclude:
•AutomotiveManufacturing:A
luxurycarmanufacturerdevelops
apersonalizeddriverassistance
systemthatlearnsfromindividual
drivinghabits.Thesystemcollects
andprocessesdataonaccelerationpatterns,brakingbehavior,androutepreferences.Thisinformation,whilecrucialforoptimizingthedriving
experience,ishighlysensitiveasitcouldrevealpersonalroutinesandlocationsifcompromised.
•LifeSciences:Apharmaceuticalcompanyconductsclinicaltrialsforanewcancertreatment.
Theycollectextensivepatient
data,includinggeneticmarkers,treatmentresponses,andqualityoflifeindicators.Thisinformationisnotonlymedicallysensitivebutalsopotentiallyrevealingaboutindividuals'long-termhealth
prospectsandcouldaffecttheir
insurabilityoremploymentifdisclosed.
•LuxuryRetail:Ahigh-endjewelrybrandoffersabespokeservice
whereclientscandesigncustom
pieces.Thecompanymaintains
adatabaseofclientpreferences,
purchasehistory,andpersonal
events(e.g.,anniversaries,birthdays).
Thisinformation,whilevaluableforpersonalizedmarketing,issensitiveasitcouldrevealaclient'sfinancialstatus,personalrelationships,andlifestylechoicesifbreached.
Corporationsmaychoosetoclassifydatausingmultipleparameters:
•Classifydatabylevelofsensitivity.Thiscantypicallybedonebasedonthedataschema.
•Classifycross-borderdatatransfersbylevelofsensitivity.Cross-borderdatatransfersaretreatedmore
strictlythandataprocessing;data
maybeacceptabletoprocessinChinabutnottotransferoutsideofChina.
StrategiesforDataComplianceinChina|FormulatingaLocalizationStrategy
08
FormulatingaLocalizationStrategy
Onceacompanyhasassessedrisk
andclassifieddata,itistimetobuildadigitalstrategytoensurethehandlingofthatdataiscompliant.
Corporationsshouldcarefullyconsiderglobalandregionalgovernance,localmarketbusinesssupport,regulation
constraints,andcostefficiency.
Companieswillneedtoconsidermultiplefactorstofindsuccess,including:
•Cybersecurityissuessuchaswhethersensitivedataisinvolved
•Systemperformancequalityandmaintainingaconsistentuser
experiencewhiletransactionvolumeincreases
•ThelevelofintegrationdependencyonChina’sdigitalecosystemstofulfilllocalizedusecases
•Howtobestmanageandleverageglobalassetsacrossborders
cyber,DataandprivacyReguIatorycompIiance
considerationsofwhetherPIIorothersensitivedataisinvoIved
throughoutdatacoIIection,storage,processingandusageIifecycIeundercsL,PIPLandotherreguIationrequirements
cyber&Datasecurity
cross-BorderDataTransfer
AIignment
Empower
PrivacyProtection
c.chinaMarketBusinessGrowth
BusinesscontinuityundercompIexGeopoIitics
AssetsynergyandcapitaIEfficiency
considerationofhowto
IeveragegIobaIassetsto
achievecrossregionsynergy
andmorescaIabIearchitecture
chinaspecificExperienceDeIiveryDependency
considerationsoftheIeveIof
integrationdependencyonchinadigitaIecosystemstofuIfiII
IocaIizedbusinessusecases
A.ReguIations&constraints
D.GIobaI&
RegionaIsynergyandGovernance
TcOandTOM
governance,incIudingsupportcapabiIities;whiIecrossborderdataaccesswouIdbeoneof
thekeyfactorstoimpactTcO
甲甲
B.systemperformanceRequirement
systemPerformance
systemAvaiIabiIity
systemperformance&AvaiIabiIityNecessity
TheimportanceofstabIeperformanceandIeveIofRTO&RPOunderincreasingtransactionvoIumeandbusinesscompIexitytomaintainconsistentuserexperience
StrategiesforDataComplianceinChina|FormulatingaLocalizationStrategy
09
Giventhepotentialbreadthofa
corporation'scustomerrelationshipmanagement(CRM)system,thedatawithinitshouldbestoredlocallytomeetlocalizationrequirements,havepropersecuritymeasuresinplacetocontrolaccessandcompliancewithlocallawsandregulations,allwhilebeinguseabletomeetthebusiness
needs.Theaffecteddataandtechnicaldomainscanbewide-ranging,
includingemployeedata,customerdata,businesspartnerdataand
identity,andmore.
Acorporation’sCRMisoften
connectedtotheirmarketingsystems,socialmedia,enterpriseresource
planning(ERP)software,analytics
platform,dataplatform,andmore
systems,furtheraffectingwhichdataneedstobeprotectedandcompliant.Sincesensitivedataisstoredand
sharedfromthesesystems,allofthemareaffectedtosomedegree,andtheirintegrationsalsoneedtobesecure
andcompliant.
ERP
•ChinaERPwithowninstance
•LocallysourcedERP
Workspace&Collaboration
•O365(includingE-mail)
•CollaborationTools
•ITILtools
Sales&Marketing
•WeChattouchpoints
•E-Commerce/orderingportal
•SalesEnablement
•CRM(i.e.Salesforce)
DataPlatform
•ConsumerDataPlatform
•OtherDataPlatformincludingimportantdata
KeyAreas
ofLocalized
Solutions
Security
•IAM/ADSeparation/MFA
•ZeroTrust
•VulnerabilityscanandPentest
•CyberSecurity
HR
•Global/localsplitoftheHRsystemsin
viewoftheregulatoryrequirementsandlocalecosystem
Sales&Marketing
•StandardGlobalsolutionhostedinChina
•Chinalocalizedsolutionwithcustomization
•Tailor-madesolutionwithcloudprovidersinChina
DataPlatform
•DedicatedDomainforCNservices(Certificate/ICP)
•LocalauthorizedDNS
•IndependentVPCs/subnetsforChinas
•Localaccessforuserprofilee.g.,VPN,Identity
CybersecurityConsiderations
AchievingcompliancewhileenhancingthecybersecuritylevelinChinaandtherestoftheworldisachallenge.
Forexample,specificdataisnot
allowedtoleavetheChinesemainland,likeSensitivePersonalInformation.
Non-compliancecanresultinfines,butimprovingcybersecurityiskeytoprotectingintellectualproperty.
Companieswillneedtofindabalancebetweenthetwotosatisfyallpartiesandkeepinformationsecure.
10
StrategiesforDataComplianceinChina|FormulatingaLocalizationStrategy
Compliance
•Localcybersecurityofficerisrequired
•Possiblyalocaldataprotectionofficer
CybersecurityOrganization
Cybersecuritymaturity
•LocalizedCybersecurityOrganizationshouldbeconsidereddueto
•Limitationsofdatatransfer
•Potentiallyothertools/solutionsthaninrestoftheworld
•SpecificdataisnotallowedtoleavetheChinesemainland
•SenstiviePersonalinformation(SPI)
•Importantdata
DataTransfer&Network
•LimitationsofnetworkaccessfromandtoChinapreventingattacks
•Preventionofdataleakageandinsiderthreats
•e.g.,segmentationsofnetworks,networkenforcementpoints
•SystemswhicharedeployedoroperatedinChinahavetocomplytospecifichardening
•e.g.,operatingsystems,networktechnology,cybersecuritytools
Technology
•Globallytrustedtechnologystandardsandsolutionstoensuresecureworkingandcollaboration
•Somefunctionsmightnotbeavailableinothersolutions
•KeyNetworkProduct&ServiceChallenges
•Salespermit&certificationsisrequired
•Listofproducts(firstbatch,scope,standards)
NetworkProduct&Service
•Taking‘TradePolicies’intoconsideration,attentionsneededonproductssupplydisruptionandthe
inabilityofproductupdate
•Limitationofallowedcryptographicsolutions
•Commercialcryptographyimportsmustbepermitted
Non-compliancecanresultinfines,
suspensionofbusiness,revocation
oflicenses,andindustryrestrictions
forinvolvedstaff
Cryptography
•Globalstandardstoensurehighlysecuredataencryptionandexchange
Appropriatemeasuresneededimproving
cybersecuritylevelinordertoprotect
intellectualproperty
DataResidency,DataAccess,andCross-borderDataTransfers
Hostingbusinessapplications
andtheirdatainChinasupports
compliancewiththeCybersecurityLaw(CSL),DataSecurityLaw(DSL),and
PersonalInformationProtectionLaw(PIPL)regulations,aswellasmeetingChinamarketdynamicsandspeed,andensuringbothglobalandlocalcybersecurity.
China’scurrentcyberspace
governancestrategyistofocuson
cybersecurityandprotectpersonal
dataandimportantdatacross-bordertransmission.Formultinational
corporations(MNCs)inChina,properisolationandcross-borderdata
transfercontrolisbecominganurgentrequirement.
Balancingtimelinesswithneedcan
causecomplicationsacrossindustries.Threecomplianceaspectscommonlyariseatthispoint:
•DataResidency:Tocomplywiththelawsandregulationsdiscussedin
thisdocument,datathatisgatheredinChinaneedstobeprocessedandstoredinChinaunlessthereisan
exceptiongranted.
•DataAccess:Processorsneeda
legalreasontoprocessdata,and
actorsneedalegalreasontoaccessthedata.Accesscontrolisnecessarytoensurethattheindividuals
accessingthedataareentitledtothatprivilege.
•Cr
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2024年度旅游担保协议书定制版3篇
- 2025版绿色环保家居装修服务合同范本
- 半导体材料及器件研发生产投资协议
- 2024版细化租户物业管理服务协议范本一
- 二零二五年度工地现场环境治理合同3篇
- 2024年版建设工程合同
- 2024年简化版黄沙石子购销协议格式版B版
- 宠物服务行业的饲养责任协议
- 2025年度碎石运输合同违约责任与赔偿标准规范3篇
- 网贷借款合同
- 专题3-6 双曲线的离心率与常用二级结论【12类题型】(原卷版)-A4
- 2024年人力资源年度工作总结参考(2篇)
- DB52T 1776.1-2023 耕地质量等别评价 第1部分:评价规范
- BIM工程师年终总结
- 2024秋季新教材人教版体育与健康一年级上册课件:1我们爱运动
- 领导年终总结汇报工作
- CQI-23模塑系统评估审核表-中英文
- 2024年大型游乐设施操作(Y2)特种作业取证(广东)考试复习题库(含答案)
- 【教案】Unit+4+My+Favourite+Subject大单元整体教学设计人教版英语七年级上册
- 2024年省国资委选聘兼职外部董事人选高频难、易错点500题模拟试题附带答案详解
- 2024-2030年中国工控机行业需求状况及发展趋势分析研究报告
评论
0/150
提交评论