Supply Chain Council of European Union | Scceu.org
Procurement

China’s Initial Draft Regulations On The Management Of Online Data Security: Important Takeaways – Privacy

On November 14, 2021, the Cyberspace Administration of China
(CAC) released draft Regulations on the Management of
Online Data Security
(the “Regulations”) for
China’s data privacy and security laws, including the Cybersecurity Law (CSL), Data Security Law (DSL), and Personal Information Protection Law
(PIPL)
. Consistent with such laws, the Regulations broadly
apply to processing activities of individuals and organizations
within China and outside of China. The Regulations contain many
similar principles to those set forth in other comprehensive data
privacy and security laws, such as the EU’s General Data
Protection Regulation (GDPR) and California Consumer Privacy Act
(CCPA), however, there are material differences that, if published,
would reshape privacy and security compliance for many
businesses.

Here are some key takeaways:

Data Breach Reporting

The Regulations provide further guidance on specific
notification timelines for data processors, which are
“individuals and organizations that independently determine
processing purposes and processing methods in data processing
activities,” similar to GDPR’s definition of “data
controller.” (Article 73(5)).  Such notification
timelines were absent from the PIPL, CSL, and vague in the DSL
(requiring “prompt” notice). The Regulations, however, do
not offer any clarity regarding the notification timelines for
“entrusted parties” (an entity that processes personal
information on behalf of the data processor, similar to GDPR’s
definition of “data processor”). For data processors,
such timelines are aggressive and much broader in scope, in
comparison to breach notification laws in other jurisdictions.

If a security incident causes harm to individuals or
organizations, the data processor shall notify the interested party
within three working days. (Article 11). While three working
days
is certainly a very tight timeline, which many EU
organizations can attest to given GDPR’s 72-hour notification
timeline, the expansiveness of the breach notification requirement
is most notable.

  1. There is no mention of the type of data that was compromised in
    the security incident, such as personal information (as defined in
    Article 4 of the PIPL) or important data (as defined in Article
    73(3) of the Regulations). The trigger for such notification lies
    in whether such security incident “causes harm,”
    irrespective of the type of data.

  2. The Regulations do not define what “causes harm
    to individuals or organizations.” (emphasis added). 
    Failure to define what “causes harm” may cause particular
    confusion in the case of security incidents to organizations. GDPR
    and many U.S. state breach notification laws contain a “risk
    of harm” concept, which may serve as a guidepost, but the
    “risk of harm” concept is limited to individuals, not
    organizations.

  3. Extending notification obligations for security incidents that
    cause harm to organizations, not just individuals, is a
    material departure from breach notification laws in other
    jurisdictions and will likely require companies to revise their
    incident response plans accordingly.

Interestingly, the method of notification is also
expansive; data processors may notify the impacted individuals or
organizations via telephone, email, as well as more informal
communication channels, such as text message or instant messaging.
Notification via text message or instant message may present
challenges for companies, from a recordkeeping perspective. If a
company plans to utilize such informal communication channels, it
will be important to implement tools to track such communications,
as such records may be necessary in the future (i.e., in the case
of future litigation).

Further, in the event of a data security incident related to
important data or personal information of more than 100,000 people,
data processors must report the basic information of the incident
to the municipal CAC and relevant competent departments within
eight hours of the occurrence
of a security incident,
including the data volume, types, possible impact, and remedial
measures taken or to be taken. (Article 11). Practically,
compliance with such eight hour notification timeline seems nearly
impossible, as it typically takes more than eight hours to compile
even basic information about the incident, let alone the volume,
types, possible impact, and remedial measures.

The Regulations also require data processors to submit an
assessment report to the municipal CAC and relevant competent
departments within five working days after the incident is handled,
addressing the cause of the event, harmful consequences, handling
of responsibility, and remediation measures. It is unclear whether
such assessment reports will remain confidential or if the
government will publicize such reports.

Data Subject Requests

Data processors must respond to data subject requests within 15
working days and provide a “convenient method and channel to
support” such data subject requests. (Article 23) The
Regulations do not clarify as to what would qualify as a convenient
means and channel to support such inquiries and whether multiple
options must be provided (such as email, phone, and/or website
form).

Important Data

The concept of “important data” originally appeared in
the CSL, which required network operators to implement specific
technical measures to protect important data. Three years later,
the DSL imposed additional obligations for all companies handling
important data, but neither law (nor the PIPL) included a
definition of important data. Article 73(3) of the Regulations
provide the much needed definition, limiting “important
data” to data that might endanger national security or the
public interests if altered, destroyed, leaked, or illegally
obtained/utilized.  The Regulations include helpful, yet
broad, examples such as, “[g]overnment affairs that have not
been disclosed, work secrets, intelligence data, and law
enforcement or judicial data; [.] export control data; data related
to core technology, design plans, and product techniques and so
forth involved in export control items,” amongst other
categories.

Data processors that share, sell or entrust the handling of
important data to a third party must obtain consent of a competent
department at the districted-city level. (Article 33). Details of
the approval and consent process remain unclear. Without further
clarity, data processors will be put in a difficult and potentially
perilous financial position, as it is commonplace for companies to
share and entrust data with third parties and any such violation
may result in a fine of up to RMB 2,000,000. (Article 62). 
Hopefully, further drafts of the Regulations will provide clarity
regarding the consent process.

Cross Border Data Transfers

There are two important developments related to cross-border
transfers:

  1. Data processors may transfer personal information outside of
    China to fulfill contractual requirements, without meeting
    China’s extensive prerequisites, which include passing a safety
    assessment administered by the CAC, entering into standard
    contractual clauses (as provided by the CAC), amongst other
    compliance measures. (Article 35). Such contractual exemption was
    absent in the CSL, DSL and PIPL and will likely serve as welcome
    news for companies transferring data outside of China.

  2. In what is likely to be received as not so welcome news, data
    processors that transfer personal information and important data
    outside of China will be required to submit an annual report to the
    appropriate network information department by January 31st of each
    year; such report shall include contact information of all data
    recipients, the type and volume of data, the purpose of such cross
    border transfer, the location where the data is stored overseas,
    information on further data transfers, among other details.
    (Article 40). The Regulations further emphasize the importance of
    maintaining comprehensive data mapping of all data processing
    activities, particularly related to the processing of personal
    information and important data.

Cybersecurity Assessment for Corporate
Activities

Perhaps the most controversial provision of the Regulations,
Article 13, indicates potential barriers for current or future
corporate activities involving businesses in China. Specifically,
data processors must undergo a cybersecurity review from relevant
national regulators, in the following circumstances:

  • An Internet platform operator that processes and controls a
    large amount of data related to national security, economic
    development or public interests, that affects or may affect
    national security, seeking a merger or corporate
    reorganization;

  • A data processor that processes personal information of
    1,000,000 or more individuals and looking to undertake an initial
    public offering (IPO) outside of China. Such organizations will
    also need to submit an annual data security evaluation to the CAC
    by January 31 of each year. (Article 32).

  • A data processor looking to undertake an IPO on the Hong Kong
    stock market that impacts or may impact national security; or

  • Any  “Large Internet Platform Operators” that
    establish headquarters, operations or development centers outside
    of China. A “Large Internet Platform Operator” refers to
    Internet platform operators that have more than 50 million users,
    handling a large amount of personal information and important data,
    with strong social mobilization capabilities and a dominant market
    position. (Article 73(10)).

Effectively, Article 13 appears to serve as a means for the CAC
to pre-approve many China businesses planning corporate activities
outside of China, which could throttle Chinese companies in the
global market. Such approval process comes on the heels of the
CAC’s recent cybersecurity probing of multiple Chinese-based
companies that issued an IPO in the U.S. this past year.

The Regulations cover a wide range of compliance areas, not all
of which are addressed above, however, in summary, while the
Regulations are still in draft form (the CAC is soliciting comments
through December 13, 2021), all indications point towards the DSL,
CSL and PIPL having far-reaching implications, requiring businesses
to materially revamp their compliance programs to meet China’s
onerous data privacy and security laws.

The content of this article is intended to provide a general
guide to the subject matter. Specialist advice should be sought
about your specific circumstances.

Related posts

Responding to the business impacts of Procurement Management Software Expected to Expand at a Steady CAGR through 2023 – Jewish Market Reports

scceu

Schools issue asbestos notice

scceu

Bill on defense procurement provides that info on half of state defense order will be open – Zahorodniuk

scceu