版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
CHAMBERSGLOBALPRACTICEGUIDES
Cloud
Computing2024
Definitivegloballawguidesofferingcomparativeanalysisfromtop-rankedlawyers
China:Law&Practice
VincentWang,XinyaoZhaoandLewisChenGlobalLawOffice
CHINA
LawandPractice
Contributedby:
VincentWang,XinyaoZhaoandLewisChen
GlobalLawOffice
Contents
1.DataPrivacyRegulationsp.5
1.1DataPrivacyandCloudComputingp.5
1.2DataPrivacyandCross-BorderTransfersp.8
1.3PenaltiesforNon-complianceWithDataPrivacyRegulationsp.9
2.DataSecurityMeasuresp.10
2.1DataSecurityandtheCloudp.10
3.DataOwnershipandControlp.12
3.1DataOwnershipinCloudAgreementsp.12
3.2DataPortabilityp.13
3.3DataRetentionandDeletionp.13
4.VendorManagementp.14
4.1DueDiligencep.14
4.2DataProtectioninCloudServiceAgreementsp.14
4.3DataProcessingAgreementsandtheCloudp.15
4.4ExitStrategiesandDataMigrationp.15
5.DataBreachNotificationp.16
5.1RequirementstoReportDataBreachesp.16
5.2InvestigatingandRemedyingDataBreachesp.17
5.3NotifyingDataBreachesp.17
6.InternationalDataTransfersp.18
6.1Cross-BorderTransferRegulationp.18
6.2DataLocalisationp.18
6.3ConflictsofLawp.19
7.ComplianceandAuditsp.19
7.1CloudComputingandCompliance/Auditsp.19
2CHAMBERS.COM
CHINALawandPractice
Contributedby:VincentWang,XinyaoZhaoandLewisChen,GlobalLawOffice
GlobalLawOffice(GLO)datesbacktothees-tablishmentoftheLegalConsultantOfficeofChinaCouncilforthePromotionofInternationalTrade(CCPIT)in1979.WiththeapprovaloftheMinistryofJusticeofthePeople’sRepublicofChina,itwasrenamed“ChinaGlobalLawOf-fice”in1984,signallingitscommitmenttoaninternationalperspectiveandfullengagementwiththeglobalcommunity.Throughoverfourdecadesofdedicatedeffortandgrowth,GLO
hasemergedasaleading,full-servicelawfirmwithinChina’slegallandscape.Fromitsincep-tion,GLOhasembracedthemissionof“servingdomesticandforeignclientswithaglobalisedvision,globalisedteam,andglobalisedquality”.Thiscommitmenthasallowedittoconsistentlymaintainapositionattheforefrontoftheindus-try,evenamidstthedynamicandever-evolvingglobaleconomicenvironment.
Authors
VincentWangisapartnerat
GlobalLawOffice,workingin
theShanghaioffice.Hispracticeencompassesawiderangeof
industries,withparticular
expertiseinnavigatingnoveland
complexlegalchallengesintheTMTsector.
ExamplesoftheindustriesVincentcovers
includetelecommunication,ecommerce,
cybersecurityanddataprotection,electronicpayments,internet-relatedbusinesses,high
technologymanufactureandengineering,newandemergingtechnologies(suchasAI,
blockchain,crypto-currency,IoTS,e-mobility,cloudcomputing,etc),e-automotive,new
mediaandstreamingentertainment,foodandbeverage,agricultureandfarming,andcross-bordertradeandinvestment.
XinyaoZhaoisofcounselatGlobalLawOffice.XinyaoisbasedintheShanghaioffice,whichshejoinedin2018.Hermainpracticeareasinclude
cyberanddatasecurity,
personalinformationprotection,andcorporateregulatorycompliance.Shespecialisesin
advisingbothmultinationalanddomesticcompaniesinareasincludingtelecoms,
internet-relatedindustries,IoT,automotive,
ecommerce,fintechandhealthcare.Shehas
advisedwell-knowninternationalcompaniesincompletingtheirdatacomplianceprojects,
providingsupportthroughoutthe
implementationprocess.Additionally,Xinyaohasassisteddomesticcompanieswiththeir
overseasbusinessdevelopmentintheUSA,Europe,andSoutheastAsia,focusingondataprivacycompliance.
3CHAMBERS.COM
CHINALawandPractice
Contributedby:VincentWang,XinyaoZhaoandLewisChen,GlobalLawOffice
LewisChenisamid-level
associateatGlobalLawOffice,basedintheShanghaioffice.
Hismainpracticeareascoverprivacyanddataprotection,fintechandTMT.Hehas
participatedinlegalprojectsforwell-known
internationalcompaniesincludingByteDance,GE,PwC,etc,coveringfintech,automobile,
eCommerce,IoT,consultingandother
industries.Hehasalsoassistedclientswith
legalmattersrelatingtocompliance
investigationsandmitigation,riskassessment,andthepreparationoflegaldocuments.PriortojoiningGlobalLawOffice,LewisworkedforaleadinginternationallawfirminShanghai,
focusingondataprotectionandfintech.
GlobalLawOffice
36thFloor
ShanghaiOneICC
No.999MiddleHuaihaiRoad
XuhuiDistrict
Shanghai200031China
Tel:(8621)23108288Fax:(8621)23108299
Email:vincentwang@Web:
4CHAMBERS.COM
CHINALawandPractice
Contributedby:VincentWang,XinyaoZhaoandLewisChen,GlobalLawOffice
1.DataPrivacyRegulations
1.1DataPrivacyandCloudComputing
DataPrivacyRegulationsThatAreApplicabletoCloudComputinginChina
Intheareaofdataandprivacyregulation,PRClawcurrentlyhasthefollowingmajorsources:(i)nationallaws,(ii)administrativeregulationsandrules,and(iii)nationalstandards.
Atthelevelofnationallaws,theCyberSecurityLawofthePRC(CSL),theDataSecurityLawofthePRC(DSL),andthePersonalInforma-tionProtectionLawofthePRC(PIPL),arethreefundamentallawsregulatingdataandprivacyissues,whichareapplicabletocloudcomput-ingandrelevantdataprocessingactivitiesinthePRC.
Thosethreenationallawsareimplementedmainlybyadministrativeregulations,rulesandregulatorydocumentsissuedbythecompetentregulatorygovernmentalagencies.Forexam-ple,theMeasuresonAssessingtheSecurityofCloudComputingServicesspecifiesthesecu-rityrequirementsoftheCyberSecurityLawandtheDataSecurityLawinthescenariowherethecloudcomputingservicesareprovidedtotheadministrationagencies,theoperatorsofCriti-calInformationInfrastructure(CII)andthepartyoffices.
Inaddition,thenationalstandards,compulsoryandrecommended,alsoplayanimportantroleinimplementingthosethreelawsfromtheper-spectiveoftechnical,organisationalandlaw-fulfillingmeasures.Thecompulsorystandardsestablishtheminimumrequirementsforlegalcompliance,whiletherecommendedstandardsshowcasebestpractices.Forexample,theInfor-mationsecuritytechnology–Securityguidanceforcloudcomputingservice(GB/T31167-2023)
providesrecommendationsandguidanceonsecuritymanagementandtechnicalmeasurestoprotectdataonthecloudthroughitslifecycle.
AnotheruniquesecurityrequirementapplicabletothecloudserviceshostedinChinaistheMul-ti-LayerProtectionScheme(MLPS).MLPSisarequirementimposedinaccordancewithArticle21oftheCSLandfocusesontheinfrastructuresecurityofthecloudservicethatfacilitatestheprotectionofthedataandpersonalinformationprocessedinthecloudservice.
DefinitionofPersonalDataandSensitiveData
Notethatinthisguide,personaldataandper-sonalinformation,sensitivedataandsensitivepersonalinformationareusedinterchangeablywiththesamemeaning.
AccordingtoArticle4ofthePIPL,personaldatareferstoalltypesofinformationofidentifiedoridentifiableindividualsrecordedinelectronicorothermeans,excludinganonymousinformation.
AccordingtoArticle28ofthePIPL,sensitivepersonaldatareferstopersonaldata,theleak-ageorillegaluseofwhichcouldeasilyresultindamagetothedignityofanindividual,orharmtopersonalbodyandproperty,includingbiometricinformation,religion,specificidentities,medicalandhealthinformation,financialaccounts,loca-tiontrackingdata,aswellasthepersonaldataofminorsundertheageof14.
RequirementsforProcessingPersonalDataintheCloud
ThedataprocessorunderthePIPListhecoun-terpartofthedatacontrollerundertheGDPR,andtheprocessingcontractorofadatapro-cessoristhecounterpartofthedataprocessorundertheGDPR.Asitisinevitabletodistinguish
5CHAMBERS.COM
CHINALawandPractice
Contributedby:VincentWang,XinyaoZhaoandLewisChen,GlobalLawOffice
thedatacontrollerandthedataprocessorinthecloudenvironment,forconvenienceofnon-PRCreaders,weareusingtheterms“datacontrol-ler”and“dataprocessor”oftheGDPRinthisguideinourresponsestothequestionsaboutthePRClaw.
Therefore,inthisarticle,weareusing“datacontroller”torefertothe“personalinformationprocessor”thatcanautonomouslydecidethepurposeandmethodofprocessingdataunderthePRClaw;and“dataprocessor”torefertothe“processingcontractor”thatisprocessingdataupontherequestofthecontroller.
Chineselawsandregulationsdonotprovidespecialrequirementsforprocessingpersonaldatainthecloud.ProcessingpersonaldatainthecloudissubjecttothesamerequirementsprovidedinthePIPLforprocessingpersonaldataingeneral.
UnderthePIPL,theprimaryrequirementforprocessingpersonaldataisconsentorseparateconsent.Therearealsolegallydefinedexcep-tionalprocessingscenarioswherenoconsentorseparateconsentisrequired.
Consentandtherequirement
UnderArticle13ofthePIPL,processingperson-aldatashouldhaveaproperlegalbasis,includ-ingconsent,orotherlegalbasesthatmayallowforconsenttobewaivedasillustratedbelow.Toensureinformedconsentisobtained,beforeprocessingtheirpersonaldata,acontrollermustinformindividualstruthfully,accurately,andfullyofthefollowinginformationinaprominentwayandinclearandplainlanguage:
•thecontroller’snameandcontactdetails;
•processingpurposes,methods,informationtypesprocessedandstorageperiod(which
mustbetheshortesttimerequiredtofulfiltheprocessingpurpose);
•theoptionandprocedureforindividualstoexercisethestatutoryrightsregardingtheirpersonaldata;and
•othermattersrequiredbylawsandadminis-trativeregulations.
Separateconsentandtherequirement
UnderthePIPL,thereareseveralprocessingactivitiesthatrequireseparateconsents,includ-ingprocessingsensitivepersonaldata,cross-bordertransfersofpersonaldata,providingper-sonaldatatoathirdparty,publiclydisclosingpersonaldata,etc.WhilethePIPLitselflacksaprecisedefinitionof“separateconsent”,practi-calguidancecanbefoundintherecommendednationalstandardGB/T42574-2023(Informationsecuritytechnology–Implementationguidelinesfornoticesandconsentinpersonalinformationprocessing).Thisstandardclarifiesthatseparateconsentsignifiesaspecific,explicitagreementgivenbytheindividualsolelyforaparticularprocessingactivityconcerningtheirpersonaldata.Crucially,itdoesnotencompassblanketconsentgivenformultipleprocessingpurposessimultaneously.
Exceptionalconsent-waivingprocessing
Inadditiontoconsent,thePIPLallowsdatacontrollerstoprocesspersonaldatabasedonseveralalternativelegalgrounds:
•whereprocessingisnecessaryfor:
(a)enteringintoorperformingthecontracts
towhichtheindividualisaparty;
(b)managinghumanresourcesinaccord-
ancewithlabourrulesorpoliciesor
collectiveemploymentcontractsthatareformulatedorconcludedlawfully;
(c)fulfillingstatutorydutiesorresponsibili-ties;and/or
6CHAMBERS.COM
CHINALawandPractice
Contributedby:VincentWang,XinyaoZhaoandLewisChen,GlobalLawOffice
(d)respondingtopublichealthincidents,orprotectingthelife,healthandproperty
securityofindividualsinurgentsituations;
•processingpersonaldataforthepurposeofnewsreportingorpublicopinion-basedoversightforthepublicinterest,provideditremainswithinareasonablescope;and
•processingthepersonaldatadisclosedbyaninformationsubjectorotherwiselawfullydis-closed,provideditremainswithinareason-ablescopeinaccordancewiththePIPL.
Undertheseprocessingconditions,consentcanbewaived.
ObligationsforDataControllersandProcessorsintheCloudEnvironment
UnderPRClaw,datacontrollersshouldunder-takeprimarylegalresponsibilitiesregardingprocessingpersonaldata,anddataprocessorsshallprovidenecessaryassistanceforcompli-ance.Thatisbecause,incloudservices,datacontrollersarethecustomers(cloudtenantsorplatformusers),andtheirtechnicalcapabilitytocomplywiththelawwillbesubjecttothetechni-callimitprovidedbythecloudserviceproviders(asdataprocessor).
Datacontroller’sobligations
AccordingtothePIPL,datacontrollersusingthecloudservicesaresubjecttothefollowingkeyobligations:
•Lawfulnessandtransparency:AccordingtoArticle13andArticle17ofthePIPL,data
controllersmustensurethatpersonaldata
isprocessedonalawfulbasisanddisclosedataprocessingactivitiestransparentlyto
datasubjects.Thisincludesprovidingclearinformationaboutthepurpose,method,andscopeofdataprocessing.
•Datasecurity:AsstipulatedinArticle51of
thePIPL,andArticles6and7oftheInfor-
mationSecurityTechnology–Personal
InformationSecuritySpecification(GB/T
35273-2020),datacontrollersmustimple-
mentadequatetechnicalandorganisationalmeasurestoensurethesecurity,integrity,
andconfidentialityofdata.Thisincludes
usingsecuritymeasuressuchasencryption,anonymisation,accesscontrols,andaudit
logging.
•Respondingtodatasubjectrequests:UnderArticles45,46,and47ofthePIPL,data
controllersarerequiredtoestablisheffectivemechanismstoensurethatdatasubjectscaneasilyexercisetheirlegalrights,includingforexample,therightofaccess,correction,dele-tion,andtherighttoobjecttoprocessing.
•Databreachnotification:Intheeventofa
databreach,Article57ofthePIPLmandatesthatdatacontrollersmusttakeimmediate
remedialactionsandnotifyboththedatapro-tectionauthoritiesandaffecteddatasubjects.
Inthecloudenvironment,datacontrollersmayexpectdataprocessorstoprovidedatacom-pliancemeasuresorofferthetechnicalmecha-nismsorflexibilitytoallowthemtoimplementsuchmeasuresindependently.Therefore,cloudserviceproviders,asdataprocessors,mayneedtounderstandandanticipatesuchpotentialrequirementsinadvance.
Dataprocessor’sobligations
Dataprocessors,usuallythecloudservicepro-viders,areresponsibleforprocessingpersonaldataonbehalfofdatacontrollers.Theirobliga-tionsshouldbegearedtowardsupportingthecontroller’scomplianceeffortsandensuringdataprotectionstandardsareupheld,including:
7CHAMBERS.COM
CHINALawandPractice
Contributedby:VincentWang,XinyaoZhaoandLewisChen,GlobalLawOffice
•Processinginaccordancewithinstructions:PerArticles21and59ofthePIPL,datapro-cessorsmuststrictlyfollowthedatacontrol-ler’sinstructionsandmustnotprocessdatabeyondthescopeauthorisedbythecontrol-ler.
•Co-operationobligations:UnderArticle59
ofthePIPL,dataprocessorsareobligatedtoassistdatacontrollersinfulfillingtheirlegal
responsibilities,suchasprovidingnecessarydatafordatasubjectrequests.
•Sub-processormanagement:UnderArticles
21and59ofthePIPL,ifdataprocessing
tasksaresubcontractedtootherservice
providers,dataprocessorsmustobtainpriorwrittenconsentfromthedatacontrollerandensuresub-processorscomplywithapplica-bledataprotectionrequirements.
•Datadeletionorreturn:UnderArticles21
and47ofthePIPL,uponterminationofthe
processingcontractorconclusionofservices,dataprocessorsmustdeleteorreturnallper-sonaldataasinstructedbythedatacontrollerandensurenocopiesareretained.
1.2DataPrivacyandCross-BorderTransfers
CSL,DSL,andPIPLprovideageneralframe-workforcross-borderdatatransfers.Inadditiontothosethreefundamentallaws,arecentregula-tion,theProvisionsonPromotingandRegulat-ingCross-borderDataFlows,hasbeenineffectsinceMarch2024,furtherfacilitatingthecross-bordertransferofpersonaldataandothertypesofdataoutsideofChina.Theselawsapplytocross-borderdatatransfersinthecloudenviron-mentaswell.
Accordingtotheabovelaws,datacontrollersshouldundertakethelegalobligationconcern-ingcross-borderdatatransfersinthecloud,anddataprocessorsshouldcomplywithdatacon-
trollers’instructionsconcerningcross-bordertransfers(forexample,theinstructionofnottransferringpersonaldataoutsideofChina).
BelowisasummaryofthekeyPRClawswithrespecttocross-borderdatatransfers:
•Regulatorymechanismregardingcross-
bordertransfersofpersonaldata:Data
controllerstransferringpersonaldataoutsideofChinashouldchooseapropercompli-
ancemechanism.UnderArticle38ofthe
PIPL,suchmechanismsincludeapplyingforasecurityassessment,signingtheChinesestandardcontractualclauseswiththeforeigndatarecipients,obtainingpersonalinforma-tionprotectioncertification,ormeetingotherconditionsprescribedbytherelevantlaws
andregulationsortheCyberspaceAdminis-trationofChina(CAC).Undertheregulatoryframework,theProvisionsonPromotingandRegulatingCross-borderDataFlowsprovideexemptions,inthehopeofmakingcross-
borderdatatransferseasierforinternationalbusinessesrelatingtoChina.
•Notificationandseparateconsents:Before
carryingoutanycross-bordertransferofper-sonaldata,thedatacontrollermustnotifythedatasubjectsaboutthedetailsofthecross-borderdatatransfer,andobtainseparate
consentsfromthedatasubjects,unlessthedatacontrollercanrelyonalegalbasisotherthanconsentofadatasubject,asoutlinedinArticle13ofthePIPL.
Cloudprovidersasdataprocessorsmustcol-laboratewithdatacontrollerstoensurethatthedatatransferarrangementsmeetChineseregu-latoryrequirements.ThisinvolvesaligningcloudsecurityprotocolswithChinesestandardsandprovidingsupportforassessmentsthatshouldbecompletedbythedatacontrollerunderthe
8CHAMBERS.COM
CHINALawandPractice
Contributedby:VincentWang,XinyaoZhaoandLewisChen,GlobalLawOffice
regulatorymechanism.Datacontrollersareadvisedtoincludespecificclausesintheircon-tractswithcloudserviceproviderstoaddresscross-borderdatatransferobligations.Pleaseseedetailsin3.DataOwnershipandControl.
1.3PenaltiesforNon-complianceWithDataPrivacyRegulations
Chinesedataprivacylawsdonotimposepen-altiesspecificallyfordatacontrollersanddataprocessorsinthecloudenvironment.Inpractice,thepenaltiesvarydependingontheroleofthelegalentities.BelowarepenaltiesapplicabletoeachroleunderChineselawsandregulations.
PenaltiesforDataControllers
Datacontrollersbearprimaryresponsibilityforensuringthelegality,security,andtransparencyofpersonaldataprocessingactivities.Thepen-altiesfornon-complianceincludeadministrativepenalties,civilliabilities,andcriminalliabilitiesinseverecases.
•Administrativepenalties:AccordingtoArti-
cle66ofthePIPL,datacontrollerscanface
warningsorsubstantialfines,uptoRMB50
millionor5%ofthepreviousyear’sannual
turnoverforsevereinfractions.Regulatory
authoritiesmayissuecorrectiveordersrequir-ingdatacontrollerstoimmediatelyrectifyanyidentifiedviolations.Inseriouscases,authori-tiesmayordersuspensionorterminationof
specificdataprocessingactivities,potentiallyleadingtosignificantbusinessdisruption.
Profitsderivedfromnon-compliantdataprac-ticesmayalsobeconfiscated.
•Civilliabilityandcriminalliability:Datasub-
jectswhoserightshavebeenharmedcansuedatacontrollersforcompensation.Incase
ofsevereviolations,datacontrollersmay
facecriminalcharges.Penaltiesmayinclude
imprisonmentofresponsibleindividuals,
criminalfines,andotherlegalconsequences.
PenaltiesforDataProcessors
Dataprocessors,usuallycloudserviceprovid-ers,areresponsibleforprocessingpersonaldataaccordingtotheinstructionsofthedatacontrol-lers.Processorscanalsofacesignificantpenal-tiesfornon-compliance.
•Administrativepenalties:Asisthecasewithdatacontrollers,authoritiescanrequiredataprocessorstorectifynon-compliantbehav-
iours.Althoughdataprocessorsgenerally
facelowerfinescomparedtothoseofdata
controllers,repeated,multipleorserious
non-compliancecanstillleadtosubstantial
penalties,includingfines,warnings,orevensuspensionofservicesunderthePIPLand
otherapplicablelaws.Forsevereviolations,regulatorsmayorderdataprocessorstosus-pendorceaseprocessingactivitiesorconfis-cateanyillegalprofits.
•Civilliabilityandcriminalliability:Insome
cases,dataprocessorsmaybeheldliable
withdatacontrollersorindependentlyfor
damagessufferedbydatasubjectsorother
legalentitiesandindividualsconcerned.Thismayhappenwhenprocessorsfailtofollow
controllers’instructionsorneglecttheirown
securityresponsibilities.Forexample,ifapro-cessor’snegligenceleadstodatabreaches,
affectedindividualsmayfileclaimsforcom-pensationagainstboththedatacontroller
andtheprocessor.Dataprocessorsinvolvedinillegalactivities,suchasunauthorisedsaleormisuseofpersonaldatabythedatapro-cessordeliberately,mayfacecriminalpros-ecution.Thisincludesfines,imprisonment,
andothercriminalsanctions.
9CHAMBERS.COM
CHINALawandPractice
Contributedby:VincentWang,XinyaoZhaoandLewisChen,GlobalLawOffice
2.DataSecurityMeasures
2.1DataSecurityandtheCloud
SecurityMeasuresRequiredbythePRCLawforDataStoredintheCloud
Thesecurityofthecloudcomputingenvironmentisjointlysafeguardedbycloudserviceprovidersandtheircustomers.TheCSLrequiresoperatorstotakesecuritymeasurestoprotectthesecurityofthecloudandservicesderivedfromithostedinChinaandthedatastoredinthecloud:
•AccordingtoArticle10ofCSL,operators
shouldcomplywithlawsandregulations
andcompulsorynationalstandardstoadopttechnicalmeasuresandothernecessary
measures,inordertoensurethesecurity
andavailabilityofcloudservicesandother
servicesderivedfromit,andtoensurethe
integrity,confidentialityandavailabilityofthedataprocessedinthecloudandtheservicesderivedfromit.
•Article21oftheCSLimposesageneral
requirementregardingdatasecuritymeas-
urestoprotectthesecurityofnetworksand
theintegrity,confidentialityandavailabilityofdataprocessedinthecloudandtheser-
vicesderivedfromit,including:(i)measurestopreventcomputerviruses,cyber-attacks,
networkintrusionsandotheractivitiesthat
endangercybersecurity;(ii)measuresto
monitorandrecordnetworkoperationand
cybersecurityevents,andmaintainthecyber-relatedlogsfornolessthansixmonths;and(iii)measuressuchasdataclassification,andback-upandencryptionofimportantdata,
etc.
ThePIPLrequirespersonaldatacontrollerstotaketechnicalmeasurestoensurethesecuri-tyofpersonaldata.LegalrequirementsinthePIPLapplytoprocessingactivitiesofpersonal
datastoredinthecloud,whicharesummarisedbelow:
•Article51ofthePIPLrequiresthatpersonal
datacontrollersshall,subjecttothepurposeandthemethodofprocessingpersonaldata,typesofpersonaldata,impactsonpersonalrightsandinterestsandpossiblesecurity
risks,takethefollowingmeasurestoensure
thecomplianceofpersonaldataprocessing
activitieswithprovisionsoflawsandadminis-trativeregulations,andpreventunauthorisedaccessto,anddisclosure,falsificationand
lossof,personaldata:
(a)formulatinginternalmanagementsystemsandoperatingprocedures;
(b)implementingcategory-basedmanage-mentofpersonaldata;
(c)takingcorrespondingtechnicalsecuritymeasuressuchasencryptionandde-identification;
(d)reasonablydeterminingthepermissionstoprocesspersonaldataandconductingsecurityeducationandtrainingforrel-
evantemployeesonaregularbasis;
(e)formulatingandorganisingtheimplemen-tationofemergencyresponseplansfor
personaldatasecurityincidents;and
(f)othermeasuresstipulatedbylawsandadministrativeregulations.
TheMeasuresonAssessingtheSecurityofCloudComputingServicesstipulatesmeasuresthatcloudserviceprovidersshouldcomplywithwhentheyareprovidingservicestothegovern-mentandpartyoffices,andtheoperatorsofCII.Article3oftheMeasuresprovidesthatthesecu-rityassessmentofsuchcloudservicesshouldconcentrateon,interalia:(i)thesecurityofthecloudplatformtechnology,productsandsupplychain;(ii)theabilitytomanagesecurityeffec-tivelyandthestrengthofthecloudplatform’s
10CHAMBERS.COM
CHINALawandPractice
Contributedby:VincentWang,XinyaoZhaoandLewisChen,GlobalLawOffice
securityprotectionmeasures;(iii)thefeasibil-ityandeasewithwhichcustomerscantransfertheirdata;and(iv)thebusinesscontinuityofthecloudserviceprovider.
Inaddition,thereareafewrecommendednationalstandardsconcerningcloudcomput-ingservicesthatspecifysecuritymeasuresforcloudservices.Forexample,thestandardInformationSecurityTechnology–SecurityCapabilityRequirementsforCloudComput-ingServices(GB/T31168-2023)highlightsthesecuritytechnicalmeasuresthatcloudserviceprovidersneedtodeploy.Thereareeleventypesofsecuritymeasuresintotal,includingsystemdevelopmentandsupplychain,systemandcommunicationprotection,accesscontrol,dataprotection,managementofconfiguration,operationalmaintenance,emergencyresponse,audit,riskassessmentandcontinuousmonitor-ing,securitymanagementandpersonnel,andphysicalandenvironmentalsecurity.Thegoalofthosemeasuresistoensuretheconfidential-ity,integrity,andavailabilityofdatastoredinthecloud.
EncryptionStandardsforDatainTransitandatRestintheCloud
•AccordingtotheabovestandardGB/T
31168-2023,cloudserviceprovidersshouldimplementencryptionmeasurestoensure
thesecurityofdataintransitandatrestin
thecloud.Thestandardrec
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2024年度版权维权合同2篇
- 2024年度花店绿植租赁合同3篇
- 居间工程设计2024年度合作协议5篇
- 《小儿支气管肺炎》课件
- 《手卫生规范管理》课件
- 2024电子商务平台知识产权保护合同2篇
- 2024版库房货物保管服务承包协议3篇
- 2024年度建筑工程质量保修检测合同3篇
- 工厂代加工的合同
- 《天狼指标功能介绍》课件
- 2023八年级语文上册 第三单元 名著导读《红星照耀中国》纪实作品的阅读配套教案 新人教版
- 2024-2030年中国应急柴油发电机行业市场发展趋势与前景展望战略分析报告
- 工业产品质量安全日管控、周排查、月调度工作制度
- 上海2024年上海工程技术大学招聘笔试历年典型考题及考点附答案解析
- 偏差行为、卓越一生3.0版
- 山东省青岛市(2024年)小学语文部编版竞赛(复习)完整试卷(含答案)
- 小班建构指南领域目标
- 大学会计生涯发展展示
- DB11/T 1132-2014-建设工程施工现场生活区设置和管理规范
- (正式版)YBT 6163-2024 预应力混凝土用耐蚀螺纹钢筋
- 孔孟老庄的人格修养智慧树知到期末考试答案2024年
评论
0/150
提交评论