Data Privacy Regulations That Are Applicable to Cloud Computing in China
In the area of data and privacy regulation, PRC law currently has the following major sources: (i) national laws, (ii) administrative regulations and rules, and (iii) national standards.
At the level of national laws, the Cyber Security Law of the PRC (CSL), the Data Security Law of the PRC (DSL), and the Personal Information Protection Law of the PRC (PIPL), are three fundamental laws regulating data and privacy issues, which are applicable to cloud computing and relevant data processing activities in the PRC.
Those three national laws are implemented mainly by administrative regulations, rules and regulatory documents issued by the competent regulatory governmental agencies. For example, the Measures on Assessing the Security of Cloud Computing Services specifies the security requirements of the Cyber Security Law and the Data Security Law in the scenario where the cloud computing services are provided to the administration agencies, the operators of Critical Information Infrastructure (CII) and the party offices.
In addition, the national standards, compulsory and recommended, also play an important role in implementing those three laws from the perspective of technical, organisational and law-fulfilling measures. The compulsory standards establish the minimum requirements for legal compliance, while the recommended standards showcase best practices. For example, the Information security technology – Security guidance for cloud computing service (GB/T 31167-2023) provides recommendations and guidance on security management and technical measures to protect data on the cloud through its life cycle.
Another unique security requirement applicable to the cloud services hosted in China is the Multi-Layer Protection Scheme (MLPS). MLPS is a requirement imposed in accordance with Article 21 of the CSL and focuses on the infrastructure security of the cloud service that facilitates the protection of the data and personal information processed in the cloud service.
Definition of Personal Data and Sensitive Data
Note that in this guide, personal data and personal information, sensitive data and sensitive personal information are used interchangeably with the same meaning.
According to Article 4 of the PIPL, personal data refers to all types of information of identified or identifiable individuals recorded in electronic or other means, excluding anonymous information.
According to Article 28 of the PIPL, sensitive personal data refers to personal data, the leakage or illegal use of which could easily result in damage to the dignity of an individual, or harm to personal body and property, including biometric information, religion, specific identities, medical and health information, financial accounts, location tracking data, as well as the personal data of minors under the age of 14.
Requirements for Processing Personal Data in the Cloud
The data processor under the PIPL is the counterpart of the data controller under the GDPR, and the processing contractor of a data processor is the counterpart of the data processor under the GDPR. As it is inevitable to distinguish the data controller and the data processor in the cloud environment, for convenience of non-PRC readers, we are using the terms “data controller” and “data processor” of the GDPR in this guide in our responses to the questions about the PRC law.
Therefore, in this article, we are using “data controller” to refer to the “personal information processor” that can autonomously decide the purpose and method of processing data under the PRC law; and “data processor” to refer to the “processing contractor” that is processing data upon the request of the controller.
Chinese laws and regulations do not provide special requirements for processing personal data in the cloud. Processing personal data in the cloud is subject to the same requirements provided in the PIPL for processing personal data in general.
Under the PIPL, the primary requirement for processing personal data is consent or separate consent. There are also legally defined exceptional processing scenarios where no consent or separate consent is required.
Consent and the requirement
Under Article 13 of the PIPL, processing personal data should have a proper legal basis, including consent, or other legal bases that may allow for consent to be waived as illustrated below. To ensure informed consent is obtained, before processing their personal data, a controller must inform individuals truthfully, accurately, and fully of the following information in a prominent way and in clear and plain language:
Separate consent and the requirement
Under the PIPL, there are several processing activities that require separate consents, including processing sensitive personal data, cross-border transfers of personal data, providing personal data to a third party, publicly disclosing personal data, etc. While the PIPL itself lacks a precise definition of “separate consent”, practical guidance can be found in the recommended national standard GB/T 42574-2023 (Information security technology – Implementation guidelines for notices and consent in personal information processing). This standard clarifies that separate consent signifies a specific, explicit agreement given by the individual solely for a particular processing activity concerning their personal data. Crucially, it does not encompass blanket consent given for multiple processing purposes simultaneously.
Exceptional consent-waiving processing
In addition to consent, the PIPL allows data controllers to process personal data based on several alternative legal grounds:
Under these processing conditions, consent can be waived.
Obligations for Data Controllers and Processors in the Cloud Environment
Under PRC law, data controllers should undertake primary legal responsibilities regarding processing personal data, and data processors shall provide necessary assistance for compliance. That is because, in cloud services, data controllers are the customers (cloud tenants or platform users), and their technical capability to comply with the law will be subject to the technical limit provided by the cloud service providers (as data processor).
Data controller’s obligations
According to the PIPL, data controllers using the cloud services are subject to the following key obligations:
In the cloud environment, data controllers may expect data processors to provide data compliance measures or offer the technical mechanisms or flexibility to allow them to implement such measures independently. Therefore, cloud service providers, as data processors, may need to understand and anticipate such potential requirements in advance.
Data processor’s obligations
Data processors, usually the cloud service providers, are responsible for processing personal data on behalf of data controllers. Their obligations should be geared toward supporting the controller’s compliance efforts and ensuring data protection standards are upheld, including:
CSL, DSL, and PIPL provide a general framework for cross-border data transfers. In addition to those three fundamental laws, a recent regulation, the Provisions on Promoting and Regulating Cross-border Data Flows, has been in effect since March 2024, further facilitating the cross-border transfer of personal data and other types of data outside of China. These laws apply to cross-border data transfers in the cloud environment as well.
According to the above laws, data controllers should undertake the legal obligation concerning cross-border data transfers in the cloud, and data processors should comply with data controllers’ instructions concerning cross-border transfers (for example, the instruction of not transferring personal data outside of China).
Below is a summary of the key PRC laws with respect to cross-border data transfers:
Cloud providers as data processors must collaborate with data controllers to ensure that the data transfer arrangements meet Chinese regulatory requirements. This involves aligning cloud security protocols with Chinese standards and providing support for assessments that should be completed by the data controller under the regulatory mechanism. Data controllers are advised to include specific clauses in their contracts with cloud service providers to address cross-border data transfer obligations. Please see details in 3. Data Ownership and Control.
Chinese data privacy laws do not impose penalties specifically for data controllers and data processors in the cloud environment. In practice, the penalties vary depending on the role of the legal entities. Below are penalties applicable to each role under Chinese laws and regulations.
Penalties for Data Controllers
Data controllers bear primary responsibility for ensuring the legality, security, and transparency of personal data processing activities. The penalties for non-compliance include administrative penalties, civil liabilities, and criminal liabilities in severe cases.
Penalties for Data Processors
Data processors, usually cloud service providers, are responsible for processing personal data according to the instructions of the data controllers. Processors can also face significant penalties for non-compliance.
Security Measures Required by the PRC Law for Data Stored in the Cloud
The security of the cloud computing environment is jointly safeguarded by cloud service providers and their customers. The CSL requires operators to take security measures to protect the security of the cloud and services derived from it hosted in China and the data stored in the cloud:
The PIPL requires personal data controllers to take technical measures to ensure the security of personal data. Legal requirements in the PIPL apply to processing activities of personal data stored in the cloud, which are summarised below:
The Measures on Assessing the Security of Cloud Computing Services stipulates measures that cloud service providers should comply with when they are providing services to the government and party offices, and the operators of CII. Article 3 of the Measures provides that the security assessment of such cloud services should concentrate on, inter alia: (i) the security of the cloud platform technology, products and supply chain; (ii) the ability to manage security effectively and the strength of the cloud platform’s security protection measures; (iii) the feasibility and ease with which customers can transfer their data; and (iv) the business continuity of the cloud service provider.
In addition, there are a few recommended national standards concerning cloud computing services that specify security measures for cloud services. For example, the standard Information Security Technology – Security Capability Requirements for Cloud Computing Services (GB/T 31168-2023) highlights the security technical measures that cloud service providers need to deploy. There are eleven types of security measures in total, including system development and supply chain, system and communication protection, access control, data protection, management of configuration, operational maintenance, emergency response, audit, risk assessment and continuous monitoring, security management and personnel, and physical and environmental security. The goal of those measures is to ensure the confidentiality, integrity, and availability of data stored in the cloud.
Encryption Standards for Data in Transit and at Rest in the Cloud
Access Controls in the Cloud Environment
Handling of Security Accidents and Breaches in the Cloud
Data Ownership and Control in Cloud Agreements
As a basic principle in a typical cloud business, data in the cloud is owned and controlled by the cloud service customers unless otherwise agreed. The cloud service providers and the cloud service customers are recommended to specify in the cloud agreement that:
Data Subjects’ Rights Over Their Data
In the cloud environment, personal data subjects have rights to their personal data as defined in the PIPL, including the right to know and the right to decide how their personal data is processed, unless otherwise provided by the laws and regulations.
Specifically, the data subjects have the following rights:
How Can Data Subjects Exercise Their Rights to Access, Rectify, or Delete Their Data
Data subjects need to submit their requests directly to the controller. PIPL requires the data controller to establish a convenient mechanism for accepting and processing requests from personal data subjects in a timely manner.
In the cloud environment, cloud service customers may need support from cloud service providers to fulfil the data subjects’ requests concerning their personal data; for example, the right to access, rectify and delete their personal data stored in the cloud. Therefore, in the cloud agreement, the cloud service customer and the cloud service provider may specify the mechanism and procedures to deal with the personal data subjects’ requests in detail, as well as Standard Operation Procedures (SOP) that must be followed by both parties.
Article 45 of the PIPL provides data subjects with a data portability right: Where an individual requests to transfer his/her personal data to a personal data controller designated by him/her that meets the conditions stipulated by the CAC, the personal data controller shall provide a way for the transfer. The PIPL and its relevant laws have not provided details regarding how to respond to the data portability request in the cloud.
The recommended national standards, GB/T 35273-2020 Information security technology – Personal information security specification, provides the best practices regarding data portability. Upon request from the data subject, the data controller should provide a method for the data subject to obtain copies of the following types of personal data or, where technically feasible, directly transfer copies of the following types of personal data to a third party designated by the data subject: (i) basic personal information and identity information, and (ii) health and physiological information, educational and employment information.
To ensure that the right to data portability is respected, both the cloud customer and the cloud service provider are advised to clearly define in the cloud agreement how such requests will be handled.
The general legal requirement provided in the PIPL concerning data retention and deletion applies to processing in the cloud.
Conducting thorough due diligence is crucial to ensuring compliance with Chinese laws and regulations, particularly those related to data security, cybersecurity, and personal information protection. The following is a short, high-level checklist for basic due diligence based on applicable Chinese legal requirements:
A cloud service agreement is critical to ensure data protection in the cloud environment. The cloud service agreement may include the following data protection requirements. Details regarding data processing can be found in 4.3 Data Processing Agreements and the Cloud.
Article 21 of the PIPL provides the necessary coverage of a data processing agreement (DPA), which should include: the purpose, time limit and method of processing personal data, type of personal data and protection measures, as well as the rights and obligations of both parties, and mechanisms for supervising the data processor’s personal data processing activities.
According to the above law, national standards, and mainstream market practice in the PRC, a well-structured DPA should define the responsibilities of both parties. Here is an overview of how DPAs are typically structured in a cloud business in the PRC:
The recommended national standard GB/T 31167-2023 Information security technology – Security guidance for cloud computing services in its Article 9 provides guidance on how to determine proper exist strategies and data migration in practice, including:
The CSL, DSL, and PIPL stipulate the reporting obligations in the event of data breaches. In addition to these general legal requirements, the CAC, China’s data protection regulator, further refines specific reporting requirements through its regulatory rules. There are two sets of different requirements regarding personal data breaches and cybersecurity incidents, which are detailed below.
Personal Data Breaches
In the event of personal data breaches, the PIPL requires the personal data controller to notify the competent authorities in a timely manner. This enables the authorities to understand the situation at the outset and take accurate and effective regulatory measures. The specific matters to be reported are detailed in 5.3 Notifying Data Breaches.
According to Article 66 of the PIPL, personal data controllers failing to fulfil reporting obligations will be subject to administrative penalties. The penalties start with orders to rectify, warnings, confiscation of illegal gains, and orders to suspend or terminate relevant application services; refusal to correct will result in fines of up to RMB1 million. For more severe violations, higher fines may be imposed, along with suspension of business operations or revocation of relevant business licenses or permits.
Cybersecurity Incidents
In the event of cybersecurity incidents, in a proposed draft, the CAC detailed the reporting procedures and contents in Administrative Measures for the Reporting of Cybersecurity Incidents (Draft for Comments) (the “Draft”):
The Draft stipulates that network operators failing to report cybersecurity incidents as required may face legal liabilities under CSL, DSL, and PIPL, which could include orders to rectify, warnings, and fines. If competent authorities consider the circumstances severe, heavy fines or even business suspension/termination may be imposed. However, the Draft also provides that if a company has taken reasonable and necessary protective measures to minimise the harm of data breaches and proactively reported as required, liability may be exempted or mitigated accordingly. Otherwise, the personal data subjects must be notified.
While the exact timeframe for the Draft’s finalisation and implementation remains uncertain, its content and regulatory approach signal the government’s preferred handling of data breach response and reporting for network operators (including cloud service providers and customers) based or operating in the PRC.
The CSL requires network operators to formulate emergency response plans for cybersecurity incidents. When the incident happens, network operators must immediately activate the emergency response plans, take remedial measures, and report to the competent authorities.
Therefore, for cloud service providers and customers, developing an emergency response plan is crucial for investigations and remediation upon a data breach that occurred in the cloud. More information regarding data breaches can be found in 2.1 Data Security and the Cloud and 4.1 Due Diligence.
Notification Obligations Under the PIPL
Article 57 of the PIPL sets out a general notification mechanism of notification, which includes the two aspects detailed below.
Notifying personal data subjects and regulatory authorities
As a default rule under the PIPL, the personal data controller has the obligation to notify affected subjects and authorities. Notification to the authorities is mandatory, whereas notification to the personal data subjects is not.
Article 57 provides that if the personal data controllers take measures that can effectively prevent harm from the breach, they can be exempt from notifying the affected personal data subjects, unless specifically required by the authorities. The PIPL does not explicitly define a clear threshold for when notification becomes necessary. Nor does it outline specific timelines for such notifications.
Information to be notified
The notification should include information such as: (i) the categories of personal data that have been or may be leaked, altered, or lost, the causes for such incidents, and the potential harm they may cause; (ii) the remedial measures taken by the personal data controllers and the mitigation measures that personal data subjects may take; and (iii) the contact information of the personal data controller.
Key Considerations
It is important to note that the above is only a high-level legal requirement provided by the PIPL. In practice, regulators may request more extensive information based on their working rules and specific cases. Cloud service customers may want to consider the following in handling data breach notification matters:
Please refer to details in 1.2 Data Privacy and Cloud Computing.
PRC law does not have a generally applicable and absolute data localisation requirement. However, the CSL, DSL, and PIPL impose localisation requirements on certain specific types of data and outline the administrative requirements for cross-border transfers of such data.
Data localisation requirements have a direct effect on the compliance of cloud computing services. The slow and ambiguous identification of Important Data raises concerns regarding data transfers in and out of the PRC. Cloud service providers and users need to have a data compliance strategy in place that allows them to address the concern of data localisation requirements in the PRC.
Among cross-border data transfers, it is not uncommon for legal systems or judicial procedures of different jurisdictions to clash. For instance, in cross-border litigation, a US governmental agency may require a company in China to present data information in its routine regulatory check or special investigation. However, under the DSL and PIPL, submitting personal information or data stored in China to foreign law enforcement authorities is subject to prior approval from the competent Chinese regulatory authority. The approval process in China may be complex and time-consuming, making it difficult to meet the demands of the foreign law enforcement authority in a timely fashion. The conflicts of laws between different jurisdictions may therefore increase compliance costs and legal risks for multinational companies.
Addressing such an issue requires clearly understanding the nature and type of the data request from the foreign authority, and the scope and procedure of the PRC data cross-border approval. Although potentially complex and time-consuming, successful resolution involves collaboration between PRC counsel well-versed in Chinese law and foreign counsel familiar with the requesting country’s law enforcement procedures.
In China, the personal data processing compliance audit was introduced in the PIPL in 2021, and regulatory requirements related to it have been gradually taking shape since then. In 2023, the CAC released the draft Administrative Measures for Compliance Audit of Personal Information Protection (the “Audit Measures”) for public comment, but to date it has not come into effect. The Audit Measures draft applies to personal data processing activities conducted by personal data controllers in all scenarios, including cloud-based processing.
In July 2024, the national recommended standard Data Security Technology- Personal Information Protection Compliance Audit Requirements (the “Standard”) was introduced for public comment, which provides more comprehensive and practical guidance based on the Audit Measures.
Cloud service providers and cloud service customers should comply with the above in their personal data processing once they become final and effective. The following is a summary of the key aspects of personal information protection compliance audits in the Audit Measures and the Standard.
Occurrence of Compliance Audit
As an independent supervisory mechanism to confirm and ascertain a personal data controller is processing personal data in accordance with the law, a compliance audit is mandatory. Companies that process personal data are required to conduct audits on a regular basis (every one or two years, as the case may be). Audits can be performed internally by the company itself or by engaging third-party professional agencies.
Additionally, if the regulatory authorities find that there is a significant risk in the processing of personal data or if a personal data breach occurs, the authorities may require the personal data controller to engage a third-party agency for a compliance audit. This is a type of audit process triggered by regulators.
A compliance audit generally involves several processes, including audit preparation, audit implementation, audit reporting, issue rectification, and archive management.
Key Areas of Compliance Audit
The scope of a compliance audit can be very broad, covering almost all aspects of personal data processing activities and the obligations provided by the PIPL. Key areas include, but are not limited to the following:
Independence, Fairness, and Comprehensiveness of Compliance Audit
The Standard provides an essential guide to understanding and complying with the principles of independence, fairness and comprehensiveness of a compliance audit, covering aspects such as the audit process, implementation management, evidence management, qualifications of auditors, etc.
In terms of evidence management, the Standard requires that the audited party must ensure the authenticity, completeness, and validity of the evidence provided. Only evidence that meets both formal and substantive requirements can be accepted and used in the audit report.
Implementation of Compliance Audit Findings and Recommendations
The Standard highlights that once the audit report is completed and delivered, the audited party should address the identified issues within a specified timeframe. Auditors have the right to confirm the status of rectification.
Penalties for Non-compliance
Personal data controllers who fail to conduct compliance audits as required or improperly perform such audits will be subject to administrative penalties under Article 66 of the PIPL. In cases where the violation is even more severe and constitutes a crime, criminal liability may also be imposed.
36th Floor
Shanghai One ICC
No. 999 Middle Huaihai Road
Xuhui District
Shanghai 200031
China
(8621) 2310 8288
(8621) 2310 8299
vincentwang@glo.com.cn www.glo.com.cnRegulations on Cloud Computing in China
For more than a decade, the Chinese government has adopted various measures to promote the advancement of cloud computing in China. In 2010, the Ministry of Industry and Information Technology (MIIT) and the National Development and Reform Commission (NDRC) jointly issued an announcement to launch pilot projects in Beijing, Shanghai, Shenzhen, Hangzhou, and Wuxi. This initiative encouraged the relevant organisations to develop software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS), as well as build cloud computing centres, bolster the research of core technologies, establish a nationwide industry alliance, and draft corresponding standards and regulations.
In 2013, the MIIT, the NDRC, and some other departments jointly issued Guiding Opinions on the Construction and Arrangement of Data Centres, providing political and financial incentives for the establishment of new data centres. In 2015, the MIIT included cloud computing in the 2015 Telecoms Catalogue and issued the first version of the Guidelines on the Construction of a Comprehensive Standardisation System for Cloud Computing. In the same year, the Fifth Plenary of the 18th Communist Party of China (CPC)’s Central Committee passed the 13th Five-Year Plan for Economic and Social Development, which listed cloud computing as a key field for the coming five years. These policies illustrate the Chinese central government’s decade-long dedication to the development of cloud computing.
Following in the footsteps of the central government, many local governments issued policies to stimulate the growth of cloud computing. By way of example, in 2014, Guangdong Province announced its plan to turn the province into a national hub for cloud computing technology, a leading area for cloud computing application services, and a global manufacturing base for cloud infrastructure equipment and cloud terminals by 2020. In 2017, Shanghai proposed to increase its investment in cloud computing so that by 2020 the revenue from cloud computing technology and services will reach CNY150 billion and the revenue from cloud computing, big data, mobile internet, and other related industries will reach CNY500 billion.
China has recognised the importance of cloud computing to its global competitiveness and boosted the industry through diverse policies since 2010. Government policies will likely remain supportive, given that the 14th Five-Year Plan for National Informatisation ‒ published in 2021 ‒ continued to emphasise the significance of cloud computing as China seeks to accelerate digitised development.
Cloud computing: requirements and potential risks for cybersecurity, data security, and personal information protection
The upstream of cloud computing usually encompasses cloud infrastructure providers who supply servers, networking hardware (eg, routers and switches), storage devices, network security devices, and optical fibre. The midstream includes data centres and cloud service providers. The downstream consists of customers in various industries such as finance, manufacturing, and education. Providing or using cloud computing services usually relies on co-operation among multiple parties and may therefore lead to different data processing roles, data security compliance obligations and responsibilities.
Under the Data Security Law (DSL) and the Personal Information Protection Law (PIPL), the cloud service users or the customers of cloud service providers (together referred to as “customers”) usually serve as data handlers or personal information handlers (“handlers” ‒ ie, the party who determines the purpose, method and scope of data/personal information processing, similar to the concept of controller under the EU’s General Data Protection Regulation (GDPR)). Cloud service providers may generally be regarded as entrusted parties (ie, the party who processes data/personal information under the instruction of handlers, similar to the concept of processor under the GDPR).
Therefore, the customer is mainly responsible and accountable for fulfilling the compliance and security obligations required by relevant laws, and the cloud service provider must assist the handler in fulfilling its obligations and take measures to ensure the security of data. Although in most of the enforcement cases penalties are imposed on handlers, there are also cases where the entrusted party or cloud service providers were directly penalised for failing to take adequate security measures. Thus, cloud service providers still need to focus on their data security protection obligations.
In addition, under the Cybersecurity Law (CSL), both customers and cloud service providers may constitute the network operator and must comply with the obligations set forth in the CSL.
Special protection requirements for critical information infrastructure operations
The Security Protection Regulations for Critical Information Infrastructure (the “Regulations on CII”) defines critical information infrastructure (CII) as key network facilities and information systems in important industries and fields (such as public telecommunications, information services, energy, transportation, water conservancy, finance, public services, e-government, and science and technology for national defence) that may seriously endanger national security, national economy, people’s livelihood, and public welfare once they are subject to any destruction, loss of function, or data leakage. Accordingly, CII is subject to special regulation under Chinese law.
Against the backdrop of digital transformation, many CII operators (CIIOs) are migrating their applications and data to the cloud and many new CIIOs opt to adopt a cloud-native approach, giving rise to new risks in network and data security. In response to this trend, the Guiding Opinions on Implementing the Classified Protection System and the Security Protection System for Critical Information Infrastructure ‒ promulgated in 2020 ‒ stipulate that cloud platforms that meet the relevant identification criteria also fall under the scope of CII. Therefore, cloud service providers identified by the competent authorities as CIIOs should make sure they comply with the relevant requirements.
The CSL and the Regulations on CII constitute the pillars of CII regulation, laying out provisions on the identification of CII and the obligations of CIIOs. In addition, certain national standards (such as GB/T 39204-2022 Information Security Technology ‒ Cybersecurity Requirements for Critical Information Infrastructure Protection) clarify the specific protection measures that CIIOs can adopt to ensure the security of CII.
A cloud service provider that is not identified as a CIIO may nonetheless be subject to CII regulation if it provides services to a CIIO customer. By way of example, Article 16 of Regulation on Network Data Security Management requires network data handlers that provide services for CIIOs to fulfil their obligations of network data security protection and provide secure, stable and continuous services in accordance with laws, regulations and contractual stipulations. Under the same article, without the consent of the contracting party, the network data handler may not access, obtain, retain, use, divulge or provide others with network data, nor may it conduct association analysis of network data.
Security technology risks
All liable parties should abide by the relevant security requirements, including but not limited to:
i) Logs
Data handlers are required by law to retain record logs on data processing, authority management, and personnel operations in the processing of the full life cycle of data for no less than six months. It is important to note that specific requirements for logs are scattered across various laws and regulations and that the form and content of the logs to be retained depend on the nature of the service provided.
ii) Cybersecurity Classified Protection System
China implements the Cybersecurity Classified Protection System (CCPS), which requires network operators and CIIOs to classify their information systems or networks into five levels based on their potential impact on individuals’ rights and national security. Specifically, network operators must refer to Article 21 of the CSL to fulfil their obligations of security protection according to the requirements of the CCPS.
The competent authorities actively enforce the CCPS. By way of example, in 2017, the police force in Anhui Province investigated a school whose website was hacked. The police determined that the school had not performed its obligations as a network operator and fined the school CNY15,000 and the liable person CNY5,000. To avoid warnings and fines, relevant businesses and organisations should regularly test their security management systems and evaluate their compliance with the CCPS.
iii) Procuring qualified cybersecurity products
Certain cybersecurity products (such as firewalls and intrusion detection systems) are classified as Critical Network Equipment (CNE) and Specialised Cybersecurity Products (SCPs) in the Catalogue of Critical Network Equipment and Specialised Cybersecurity Products. Pursuant to Article 23 of the CSL, CNE and SCPs should not be sold or supplied until such equipment or product successfully obtains security certification or passes security tests conducted by a qualified organisation. Therefore, cloud service providers should procure qualified CNEs and SCPs to ensure the security of their systems and data, as well as the security of supply chains.
iv) Obligations upon security incidents
Several Chinese laws and regulations set forth the obligation of reporting to the competent authorities and notifying personal information subjects upon discovering security incidents (ie, incidents or risks of cybersecurity attacks or data breaches), including Article 59 of the CSL, Article 29 of the DSL, Article 57 of the PIPL, and the Regulations on the Reporting of Cybersecurity Incidents (Draft for Comments) (the “Incident Draft”). The Incident Draft provides that if a security incident involves more than one million people, the operator should report it to the authorities within one hour. In addition, there has been a precedent enforcement case where a major cloud service provider was penalised for not reporting security incident to the authority.
Personnel risks
To ensure data security, network operators should implement management measures for individuals with access to systems and data, including current or former employees, system administrators, contractors, or business partners. Network operators should conduct background checks on these individuals, formulate internal security management systems and operating instructions, and maintain personnel records, as well as conduct monitoring and audits.
Data localisation and cross-border data transfer
Under Chinese law, certain types of data should be stored in China. When cross-border data transfer is indeed necessary, these types of data can only be transferred overseas after receiving approval from the competent authorities. By way of example, the Measures on Real Name Collection and Delivery of Postal and Courier Items set forth that user information and important data collected and generated by delivery enterprises when collecting users’ real names and delivering postal and courier items in China should be stored in China. The Measures for the Administration of Population Health Information (for Trial Implementation) provide that population health information must be stored in China and may not be hosted or leased on servers outside China.
Furthermore, China implements a data export regulation system for important data and personal information through such regulations as:
Under these regulations, if the data to be transferred overseas falls under certain categories, data handlers must pass data export security assessments, file standard contracts, or obtain personal information protection certifications.
In a cloud computing scenario, as outlined earlier, the customer is usually identified as the personal information handler and is thus responsible for fulfilling the aforementioned obligations of data localisation and export compliance. Nevertheless, cloud service providers should also assist their customers in performing the relevant compliance obligations through contractual agreements.
Qualifications for providing cloud services
Pursuant to the Provisions for Foreign-Funded Telecommunications Enterprises, the proportion of foreign investment in enterprises operating value-added telecommunications services should not exceed 50%, unless otherwise provided by laws or regulations. In addition, the Measures (Negative List) for Foreign Investment provide that foreign investment in value-added telecommunications is limited to telecommunications services that China agreed to open to foreign investors in its accession to the WTO, which does not include services such as B11. Therefore, in principle, companies applying for licences such as B11 should not have any foreign investment.
Under such regulations, foreign enterprises usually conduct telecommunications businesses in the following three ways.
Meanwhile, China is gradually easing the above-mentioned limits and has adopted a broader opening-up initiative on foreign investment in value-added telecommunications. In April 2024, the Notice of the Pilot Programme for Expanding the Openness of Value-Added Telecommunications Businesses to Foreign Investment proposes to carry out a pilot programme in certain regions of Beijing, Shanghai, Hainan and Shenzhen.
In the pilot programme, restrictions on the foreign equity ratios for some value-added telecommunications services including internet data centres, content delivery networks, internet service providers, online data processing and transaction processing, information-releasing platforms and delivery services contained in information services (excluding the operation of internet news information, online publishing, online audio and video, and internet culture) ‒ as well as information protection and processing services ‒ will be removed. On 23 October 2024, the MIIT organised a seminar on the pilot programme for expanding the opening-up of value-added telecommunications services and formally launched the pilot programme in the four pilot regions.
Special regulation for financial sector
Certain industries face special requirements for the use of cloud services given their high sensitivity. This section will briefly introduce the relevant regulations using the financial sector as an example.
Related policies
A series of policies indicate that authorities in the financial sector support the use of cloud computing, as follows.
Financial cloud standards
In the meantime, the financial sector has introduced financial standards on cloud computing technology and applications (“financial cloud standards”) to ensure network and data security, including but not limited to:
The financial cloud standards apply to both financial institutions (ie, financial cloud service users) and financial cloud service providers, setting forth special requirements for financial clouds. By way of example, Article 5.2 of the Architecture Standard provides that cloud computing deployment models in the financial sector mainly include private clouds, group clouds, and hybrid clouds composed of the previous two kinds of cloud. Article 6.1 of the Security Standard further provides that the operating environment of cloud computing data centres used to serve the financial sector should be physically isolated from other industries. Therefore, financial clouds should not be operated as public cloud models or on public clouds.
In addition to standards specifically regulating financial clouds, requirements for financial clouds may also be addressed in other financial sector standards on personal information and data. By way of example, Article 6.1.6 of JR/T 0171-2020 Personal Financial Information Protection Technical Specification stipulates that the erasure of personal financial information in cloud environments should be performed in accordance with the standard JR/T 0167-2018.
9/F
Office Tower C1
Oriental Plaza
1 East Chang An Avenue
Dongcheng District
Beijing 100738
China
+86 10 8525 5500
+86 10 8525 5511/5522
beijing@hankunlaw.com www.hankunlaw.com/en/