In 2024, China continued to deepen its practices in cybersecurity and data compliance governance. Regulators in various industries have successively introduced a large number of new laws and regulations, further refining the obligations of businesses in areas such as personal information protection, data security, and cybersecurity. Notably, as restrictions on cross-border data flow gradually ease, China is accelerating the exploration of updated pathways to ensure the safe and orderly flow of data across borders. At the same time, pilot programmes for personal information protection compliance audits have been gradually launched, with the aim of accumulating valuable experience to support the promotion and application of relevant national standards. Furthermore, under the coordination of the National Data Bureau, the establishment of basic systems for data is advancing steadily. Through local pilot initiatives, efforts are being made to fully harness and activate the market value of data elements, thus promoting the development of the digital economy.
As we head into 2025, the implementation of the Regulations on Network Data Security Management will introduce new requirements for businesses in terms of cybersecurity and data compliance governance. In addition to these, what new challenges will businesses face? In the following two-part series, we will further explore the progress of data protection and cybersecurity developments for China in 2024, and how it is likely to shape the landscape in 2025.
In this second article, we set out highlights of the year and 2025 predictions in terms of data security, cyber security, and data exchange and transactions. Click here if you would like to read our first article where we gave an overview of the highlights in China, and developments in personal information protection.
In 2024, China continued to strengthen the establishment of regulations and standards system in the field of data security, aiming to comprehensively enhance governance and regulatory capabilities and deepen the practice of data security governance.
1) Issuance of the Regulations on Network Data Security Management (“Network Data Regulations”)
On 30 September 2024, the Network Data Regulations (Click here to read our comments on the Network Data Regulations) were official released and came into effect on 1 January 2025. Positioned within China’s legal framework, the Network Data Regulations serve as implementing administrative rules for three overarching laws: the Personal Information Protection Law (“PIPL”), the Data Security Law (“DSL”), and the Cybersecurity Law (“CSL”). Building on evolving data security risks and practical insights from regulatory-industry interactions in recent years, the Network Data Regulations refine principles under these laws and clarify long-term regulatory approaches.
Notably, the Network Data Regulations emphasise the principle-based provision in Article 21 of the DSL, which requires relevant authorities to formulate catalogues of important data. It provided that for data identified as important, relevant regions or departments shall promptly notify or publicly release the information to network data processors. This requirement further lays the foundation for delegating the task of identifying important data to various ministries and local governments. Additionally, the Network Data Regulations dedicate a specific chapter to the obligations of important data processors, including the specification of the person in charge of network data security and the management body for network data security, as well as the annual risk assessment of network data processing activities. This is conducive to further promoting enterprises’ implementation of important data security protection responsibilities.
Additionally, the Network Data Regulations imposes cross-cutting obligations on network data processors spanning personal information protection, data security, and cybersecurity, with tiered compliance requirements for different entities. Apart from the general compliance obligations that apply to all network data processors, the Network Data Regulations also imposes additional compliance requirements on entities such as those processing personal information of more than 10 million individuals, network platform service providers, and enterprises offering generative artificial intelligence (“AI”) services. For instance, the Network Data Regulations requires enterprises providing generative AI services to strengthen the security management of training data and the activities related to data processing, and to take effective measures to prevent and handle network data security risks.
2) Data Classification, Grading, and Important Data Identification
In 2024, authorities including the National Cybersecurity Standardisation Technical Committee (“TC260”), the Ministry of Industry and Information Technology (“MIIT”), the Shanghai Municipal Administration for Market Regulation (“Shanghai SAMR”), and the Tianjin Pilot Free Trade Zone (“FTZ”) released standards and guidelines to further advance data classification and grading regimes and carry out the identification of important data across industries and sectors.
At the national level, TC260 released the national standard Data Security Technology – Data Classification and Grading Rules (“Data Classification and Grading Rules”) in March 2024, providing reference for industrial and sectoral authorities in developing data classification and grading normative documents, as well as guiding businesses in classifying and grading the data they hold. The Data Classification and Grading Rules classifies data into three tiers: core data, important data, and general data, with definitions for each category. For important data, the Data Classification and Grading Rules includes an appendix titled “Guidelines for the Identification of Important Data (Normative)”, which provides guidance for industrial and sectoral authorities and data processors in identifying important data.
At the local and sectoral level, in February 2024, the Tianjin FTZ issued the Standards and Specifications of China (Tianjin) Pilot Free Trade Zone for Enterprise Data Classification and Grading, clarifying the implementation requirements for data classification and grading. In September, the Shanghai SAMR released Guidelines for Classifying and Grading Vehicle Networking Data, detailing requirements to ensure security and compliance across application scenarios. In September, the Shanghai SAMR issued the Guidelines for the Classification and Grading of Internet of Vehicles Data, which further details the requirements for the classification and grading of Internet of Vehicle (“IoV”) data to ensure its security and compliance across different application scenarios. Additionally, in November, the MIIT held a second public consultation on the industry standard -- Guidelines for Identifying Important Data in the Industrial Sector, which clarifies the fundamental principles and identification processes for identifying important data in the industrial sector, aiming to provide a reference for industry regulatory bodies in formulating a catalogue of important data in the industrial field.
3) Increasing Legislative Activity in the Industry
In 2024, legislative activities in the data security sector continued to be highly active across various industries. In addition to the ongoing development of legal regulations in sectors such as industry and information technology, automotive, and finance, the field of AI has also accelerated the formulation of data security standards:
Enforcement activities on data security | |
Enforcement regulators | Local Cyberspace Administrations (“CACs”), public security departments |
Enforcement overview and key focus |
|
Penalties | Be ordered to make rectifications; begiven a warning by the competent department; administrative fines, and/or fines for directly liable persons. |
China’s data security governance accelerated in 2024, transitioning from foundational establishment to systematic structuring. Looking ahead to 2025, we anticipate developments in the following areas:
In 2024, China continued to deepen cybersecurity legislation and law enforcement activities. Building upon the detailed elaboration of the principles outlined in the CSL, numerous compliance guidelines have been provided to assist businesses in carrying out cybersecurity protection activities.
1) The Network Data Regulations Deepen Enterprises’ Cybersecurity Protection Responsibilities
The Network Data Regulations refines several provisions of the CSL and enhance the coordination of various laws in the field of cybersecurity. Specifically, the Network Data Regulations imposes stringent network operation security requirements on enterprises in areas such as the multi-level cybersecurity protection, security vulnerability notification and reporting, and emergency response to security incidents:
2) Local and Industrial Authorities Continue to Release Regulatory Requirements to Implement Enterprises’ Network Security Responsibilities
In 2024, relevant departments or regulatory authorities in various regions and industries consecutively released numerous legal requirements to strictly enforce the enterprises’ primary responsibility for network security. For example:
Enforcement activities on data security | |
Enforcement regulators | Local public security departments, local CACs |
Enforcement overview and key focus | In 2024, law enforcement activities in the field of cybersecurity in China exhibited trends of regularised enforcement and decentralised, grassroots-level enforcement:
|
Penalties | Be given a warning to the enterprises, be ordered to make rectifications and be fined; fines will also be imposed on the directly liable persons. |
The implementation of the Network Data Regulations in 2025 means that enterprises might need to adjust their existing cybersecurity compliance and governance models and content. For example, when enterprises develop cybersecurity management systems or emergency response plans for cybersecurity incidents, they will need to incorporate the new timeline introduced by the Network Data Regulations. Specifically, when security flaws or vulnerabilities are suspected to threaten national security or public interests, enterprises must report them to the relevant authorities within 24 hours. This requirement should be integrated into the relevant system standards or emergency response plans. Furthermore, we believe the implementation of the Network Data Regulations’ obligations for reporting cybersecurity incidents may promote the formal release and implementation of the Management Measures for the Reporting of Network Security Incidents (“Management Measures”). This would provide clearer guidelines for enterprises on how to carry out cybersecurity incident reporting. (Click here to read our comments on the Management Measures.)
Regarding enforcement activities, in 2025, enforcement authorities are expected to continue the trends of regularised and grassroots-level enforcement that emerged in 2024, gradually expanding the scope of enforcement to ensure proper compliance with the provisions of the CSL and safeguard enterprise cybersecurity.
Moreover, cybersecurity remains a key focus in current enterprise data protection governance practices, playing an essential role in safeguarding the personal rights of citizens, social interests, and national security. Therefore, we anticipate that, in 2025, more regulatory authorities will introduce new requirements for enterprises to fulfil their network security obligations, taking into account the characteristics of specific industries.
Finally, following the legislative plan for the amended CSL, which was proposed during the 2023 National People’s Congress, the National People’s Congress Standing Committee released the annual legislative work plan in May 2024, confirming that the revision of the CSL has been placed on the agenda for its first review. We continue to look forward to the enactment of the revised CSL, which will provide an updated compliance governance framework for China’s cybersecurity regulation.
In 2024, the marketisation process of data elements in China significantly accelerated, with a surge in the introduction of basic systems for data. Under the coordination of the National Data Bureau and guided by key top-level designs such as the Opinions on Building a Data Basic System to Better Utilise Data Element, local authorities have taken the lead in pilot initiatives, actively making progress in areas such as data intellectual property registration, the authorised operation of public data, and the inclusion of data assets in balance sheets. These efforts have significantly promoted the development and utilisation of data resources.
1) Top-Level Design: Strengthening the Basic Systems for data and Unleashing the Market Value of Data Elements
The National Data Bureau has fully leveraged its coordination capabilities in the marketisation reform of data elements. In 2024, it formulated a series of overarching plans and implementation schemes to guide local authorities in actively exploring and accelerating the development and utilisation of data resources.
At the overall planning level, in early 2024, the National Data Bureau and other departments jointly issued the Three-Year Action Plan (2024-2026) for “Data Element ×” (the “Action Plan”), encouraging regions to conduct pilot program first, promptly summarise practical experience that may be replicated and promoted, and encourage enterprises to conduct accounting processing of data resources in accordance with the unified national accounting system. The Action Plan requires actions in 12 key industries, including industrial manufacturing, modern agriculture, financial services, and healthcare, aiming to increase data supply, optimise the data circulation environment, and enhance security governance, all with the goal of stimulating the market value of data elements.
At the implementation scheme level, the National Data Bureau and relevant departments have issued several plans aimed at promoting the development and utilisation of data resources. For example, in October, the General Office of the CPC Central Committee and the General Office of the State Council issued the Opinions on Accelerating the Development and Utilisation of Public Data Resources, calling for the deepening of data element allocation reforms. This includes expanding the supply of public data resources through measures such as government data sharing, public data openness, and authorised operations. In December, the National Data Bureau released the Opinions on Promoting the Development and Utilisation of Enterprise Data Resources, which emphasises the need to enhance the mechanisms for the establishment, protection, and distribution of enterprise data rights and interests, as well as improve enterprise data governance capabilities.
2) Regions to Conduct Pilot Program First: Implementing Data Asset Management and Data Resource Development and Utilisation Requirements
In 2024, local governments actively implemented the central government’s strategic deployment. Building on detailed policy requirements, they explored key areas such as data intellectual property management, public data authorised operations, and data asset inclusion in balance sheets, achieving initial results:
The issue of how to compliantly realise the value of public data and government data became a subject of widespread public attention in 2024.
In December 2024, the first batch of digital asset public bidding transfer projects in Fuling District, Chongqing, was urgently suspended. The root cause lies in the fact that these assets involved the transaction of “public data,” while the current legal framework still presents several significant barriers, primarily the following three: first, there is a lack of clear legal guidance on public data transfers; second, there are systemic challenges such as unclear data ownership rules, a lack of value assessment systems, and undefined privacy protection boundaries; third, there are hidden compliance risks related to government data transactions. This exploration is not without prior lessons— in November 2023, Hengyang City in Hunan Province was halted due to the auction of government data and smart city franchise rights. In December 2024, the National Audit Office reported a batch of cases of “profit-making through government data” violations. Local governments are advised to learn from these cases and ensure a safe and orderly exploration of public data authorised operations before clarifying the transaction pathways for public and government data.
Additionally, the first case in China concerning the validity of the “Data Intellectual Property Registration Certificate” was upheld in the second instance in 2024. The Beijing Internet Court ruled that data intellectual property registration can serve as preliminary evidence for the plaintiff’s data property rights and as initial evidence for the legality of data collection or the source of the data. The ruling in this case holds significant importance for the ongoing trials of data intellectual property registration across various regions. This case clarifies the legal effectiveness of data intellectual property registration from a judicial perspective, providing strong judicial support for the practice of data intellectual property registration in China and offering valuable insights into converting data products into data assets.
1) Strengthening the Standardised Operation of Public Data
In 2024, multiple regions released trial measures to explore effective models for the authorised operation of public data. Currently, the main challenges in public data authorised operations include unclear data ownership, difficulties in asset value definition, and the balance between data openness and privacy protection. We believe, that with continuous and deeper exploration of effective operational models for public data authorised operations across regions, the regulatory system for such operations will become more refined by 2025. Moreover, the actual operational models will be more standardised. In the coming year, we expect more provinces and cities to release trial measures or drafts for public data authorised operations, further promoting the compliant operation of public data and facilitating the rational flow of public data resources, thereby enhancing the economic and social value of data.
2) Local Experience Feeding into the Development of Higher-Level Legal Systems
In 2024, we observed that local regions have already begun building systems and implementing valuable practices in areas such as data intellectual property registration, public data authorised operations, and the inclusion of data assets in balance sheets. By 2025, we expect local governments to continue to explore these areas and strive to summarise experiences from practice, testing better operational models and solutions. As the exchange and accumulation of local experiences continue, we hope these valuable local practices will contribute to the development of higher-level legal systems. This will ideally lead to the creation of a unified system for the circulation and transaction of data elements, maximising the market value of data elements.
3) Promoting the Development and Utilisation of Enterprise Data Resources and the Inclusion of Data Assets in Balance Sheets
The report released at the Data Elements and the 2nd Data Asset Value Conference in December 2024 revealed that the demand for including enterprise data assets in balance sheets continues to grow, but the process remains in its early stages. There are still notable issues, such as the low number of enterprises including data assets in their balance sheets and the low proportion of total assets represented by data assets. With the ongoing exploration of various inclusion methods, we look forward to seeing effective ways to include data assets in balance sheets emerge in 2025. This will help more enterprises unlock the value of their data resources, thereby increasing the number of companies participating in this process and the value of data assets included in balance sheets.
If you’d like to speak with us about how to align your business, or subscribe to our newsletters and be notified of our events on China cybersecurity and data protection, please contact James Gong at [email protected].