This newsletter summarises the latest developments in cybersecurity and data protection in China with a focus on the legislative, enforcement and industry developments in this area.
If you would like to subscribe for our newsletters and be notified of our events on China cybersecurity and data protection, please contact James Gong at [email protected].
On 14 September 2022, the Cyberspace Administration of China (“CAC”) released the draft amendment to the Cybersecurity Law (“CSL”) for the first time since its enactment in 2016.
The amendment has substantially increased the penalties for breaches of most obligations under the CSL to a level in line with those under Data Security Law and the Personal Information Protection Law. Apparently, such a move is intended to incentivise network operators to comply with the CSL and could herald renewed efforts of the CAC to enforce the CSL. Companies should ensure that they have identified and remediated gaps in compliance with the CSL, in particular the obligations relevant to the multi-level protection scheme, contingency plans, content security and appointment of security personnel.
China to Toughen Penalties for Cybersecurity Breaches
CAC issued Decision on Amending PRC Cybersecurity Law (Draft for Comments)
On 12 September, the Cyberspace Administration of China and other relevant departments drafted the Decision on Amending the Cybersecurity Law of the PRC (Draft for Comments) (the “Decision”). The revisions in the Decision seek to improve the legal liability systems respectively for violations of the general provisions on network operation security, the security protection of critical information infrastructure, the network information security, and the protection of personal information.
TC260 released Information Security Technology - Requirements for Classification and Grading of Network Data (Draft for Comments)
On 14 September, the National Information Security Standardization Technical Committee (TC260) released the Information Security Technology - Requirements for the Classification and Grading of Network Data (Draft for Comments) (the “Requirements”). The Requirements aim to support the establishment of the classified and graded data protection system proposed by Article 21 of the Data Security Law and to provide the principles and methods for data classification and grading, including the basic principles for data classification and grading, the framework and methods for data classification, and the framework and methods for data grading.
CAC issued Provisions on Administrative Law Enforcement Procedures of Cyberspace Administrations (Draft for Comments)
On 8 September, the CAC issued the Provisions on the Administrative Law Enforcement Procedures of Cyberspace Administrations (Draft for Comments) (the “Provisions”). The Provisions set forth the jurisdiction and application of administrative law enforcement and the general procedures, implementation, and case conclusion of administrative penalties. Among them, the general procedures include the provisions on the procedures for case filing, investigation, evidence collection, hearing, interview, and administrative penalty decision and service.
Guiyang Data Exchange released interpretations on China’s First Set of Data Trading Rules
On 27 September, the Guiyang Data Exchange released the interpretations on its first set of Data Trading Rules in China (the “Rules”). The Rules will play an important role in establishing an efficient service system for data trading and are intended to regulate the registration of trading entities, listing of traded objects, operation of trading venues, implementation of trading procedures, and related supervision and administration measures.
NHC and other departments issued Cybersecurity Management Measures for Medical and Healthcare Institutions
On 1 September, the National Health Commission (NHC) and other departments jointly issued the Cybersecurity Management Measures for Medical and Healthcare Institutions (the “Measures”). According to the Measures, medical and health institutions are required to identify their cybersecurity protection level under the relevant standards and conduct security tests before any new network is put into operation. In addition, the cybersecurity budget for new informationised projects shall not be less than 5% of the total budget and efforts shall be made to strengthen the institution’s capability to report and alert about cybersecurity incidents.
CMA released Implementing Rules for Meteorological Data Opening and Sharing (for Trial Implementation)
On 19 September, the China Meteorological Administration (CMA) issued the Implementing Rules for Meteorological Data Access and Sharing (for Trial Implementation) (the “Rules”). According to the Rules, only data that has been strictly evaluated for quality control and operation eligibility should be used as raw data and data products in order to ensure data quality; and only operational data that has been evaluated for operation eligibility and updated in real time should be used for forecast products and service products so as to secure the timeliness of services.
SHEITC seeks public comments on Implementing Rules of Shanghai Municipality for Opening of Public Data (Draft for Comments)
On 13 September, the Shanghai Municipal Commission of Economy and Informatization (SHEITC) issued the Implementation Rules of the Shanghai Municipality for the Opening of Public Data (Draft for Comments) (the “Rules”). The Rules call for a set scope of the public data that should be made accessible and a new mechanism for sample data development. The purposes of the Rules are to improve the quality of public data, reinforce the relevant standards, and introduce mechanisms for data examination and correction, objection verification, and quality control.
Shaanxi released provincial big data regulations
On 29 September, the Standing Committee of the Shaanxi Provincial People's Congress adopted the Shaanxi Provincial Regulations on Big Data (the “Regulations”). The Regulations allow for the lawful trading of data products and services generated from data processing activities conducted by market entities under the law unless exceptions apply. The Regulations also set forth the range of fines for violations.
Beijing launched second round of deliberation on Regulations of Beijing Municipality on Digital Economy Promotion (Draft) to include provisions on personal information protection
On 21 September, the Standing Committee of the Beijing Municipality People's Congress launched the second round of deliberation on the Regulations of the Beijing Municipality on Digital Economy Promotion (Draft) (the “Regulations”). Key revisions are made in the second deliberation draft of the Regulations to strengthen the protection of personal information, establish a list for open public data, and provide alternative digital public services for the elderly and other specific groups.
CCIA seeks public comments on Guidelines on Social Responsibilities in Data Security and Personal Information Protection (Draft for Comments)
On 8 September, the Data Security Committee of the China Cybersecurity Industry Alliance (CCIA) released the alliance’s technical document, the Guidelines on the Social Responsibilities in Data Security and Personal Information Protection (Draft for Comments) (the “Guidelines”) prepared by its member institutions. The Guidelines are applicable to data-processing organizations and may also serve as guidance for third parties to evaluate the organizations’ performance of social responsibilities in data security and personal information protection.
TC260 released Information Technology - Security Technology - Methodology for IT Security Evaluation (Draft for Comments)
On 30 September, the National Information Security Standardization Technical Committee (TC260) released the Information Technology - Security Technology - Methodology for IT Security Evaluation (Draft for Comments) (the “Methodology”), a set of complementary standards for the GB/T 18336 Information Technology - Security Technology - Evaluation Criteria for IT Security. The Methodology includes a detailed description of the evaluation methods for security criteria such as Protection Profile (APE), PP Configuration (ACE), Security Target (ASE), Development (ADV), Guidance Documents (AGD), Lifecycle Support (ALC), Tests (ATE), Vulnerability Assessment (AVA), and Combination (ACO).
TC260 released Information Security Technology - Guidelines for Cybersecurity Information Submission (Draft for Comments)
On 28 September, the National Information Security Standardization Technical Committee (TC260) released the Information Security Technology - Guidelines for Cybersecurity Information Submission (Draft for Comments) (the “Guidelines”). According to the Guidelines, cybersecurity information is categorized into various types such as vulnerabilities, cybersecurity threats, cybersecurity events, cybersecurity incidents, cybersecurity situations, and cybersecurity news. The information element requirements for each type are also set in the Guidelines.
TC260 released Information Security Technology - Requirements for Crowdsourcing Security Test Services (Draft for Comments)
On 27 September, the National Information Security Standardization Technical Committee (TC260) released the Information Security Technology - Requirements for Crowdsourcing Security Test Services (Draft for Comments) (the “Requirements”). According to the Requirements, the crowdsourcing test demand-side should authorize the subjects for testing; the crowdsourcing test provider should develop and publicize the code of conduct for the authorized test entity and prepare a security plan; the authorized test entity should strictly comply with the code of conduct during the implementation stage; and the crowdsourcing test auditing entity should conduct an audit on the authorized test entity. In addition, the crowdsourcing security test service platform is required to pass the assessment under the Multi-Level Protection Scheme and be graded at Level 3 or above.