Cloud Computing 2024

Last Updated October 08, 2024

China

Law and Practice

Authors



Global Law Office (GLO) dates back to the establishment of the Legal Consultant Office of China Council for the Promotion of International Trade (CCPIT) in 1979. With the approval of the Ministry of Justice of the People’s Republic of China, it was renamed “China Global Law Office” in 1984, signalling its commitment to an international perspective and full engagement with the global community. Through over four decades of dedicated effort and growth, GLO has emerged as a leading, full-service law firm within China’s legal landscape. From its inception, GLO has embraced the mission of “serving domestic and foreign clients with a globalised vision, globalised team, and globalised quality”. This commitment has allowed it to consistently maintain a position at the forefront of the industry, even amidst the dynamic and ever-evolving global economic environment.

Data Privacy Regulations That Are Applicable to Cloud Computing in China

In the area of data and privacy regulation, PRC law currently has the following major sources: (i) national laws, (ii) administrative regulations and rules, and (iii) national standards.

At the level of national laws, the Cyber Security Law of the PRC (CSL), the Data Security Law of the PRC (DSL), and the Personal Information Protection Law of the PRC (PIPL), are three fundamental laws regulating data and privacy issues, which are applicable to cloud computing and relevant data processing activities in the PRC. 

Those three national laws are implemented mainly by administrative regulations, rules and regulatory documents issued by the competent regulatory governmental agencies. For example, the Measures on Assessing the Security of Cloud Computing Services specifies the security requirements of the Cyber Security Law and the Data Security Law in the scenario where the cloud computing services are provided to the administration agencies, the operators of Critical Information Infrastructure (CII) and the party offices.

In addition, the national standards, compulsory and recommended, also play an important role in implementing those three laws from the perspective of technical, organisational and law-fulfilling measures. The compulsory standards establish the minimum requirements for legal compliance, while the recommended standards showcase best practices. For example, the Information security technology – Security guidance for cloud computing service (GB/T 31167-2023) provides recommendations and guidance on security management and technical measures to protect data on the cloud through its life cycle.

Another unique security requirement applicable to the cloud services hosted in China is the Multi-Layer Protection Scheme (MLPS). MLPS is a requirement imposed in accordance with Article 21 of the CSL and focuses on the infrastructure security of the cloud service that facilitates the protection of the data and personal information processed in the cloud service.

Definition of Personal Data and Sensitive Data

Note that in this guide, personal data and personal information, sensitive data and sensitive personal information are used interchangeably with the same meaning.

According to Article 4 of the PIPL, personal data refers to all types of information of identified or identifiable individuals recorded in electronic or other means, excluding anonymous information.

According to Article 28 of the PIPL, sensitive personal data refers to personal data, the leakage or illegal use of which could easily result in damage to the dignity of an individual, or harm to personal body and property, including biometric information, religion, specific identities, medical and health information, financial accounts, location tracking data, as well as the personal data of minors under the age of 14.

Requirements for Processing Personal Data in the Cloud

The data processor under the PIPL is the counterpart of the data controller under the GDPR, and the processing contractor of a data processor is the counterpart of the data processor under the GDPR. As it is inevitable to distinguish the data controller and the data processor in the cloud environment, for convenience of non-PRC readers, we are using the terms “data controller” and “data processor” of the GDPR in this guide in our responses to the questions about the PRC law.

Therefore, in this article, we are using “data controller” to refer to the “personal information processor” that can autonomously decide the purpose and method of processing data under the PRC law; and “data processor” to refer to the “processing contractor” that is processing data upon the request of the controller.

Chinese laws and regulations do not provide special requirements for processing personal data in the cloud. Processing personal data in the cloud is subject to the same requirements provided in the PIPL for processing personal data in general.

Under the PIPL, the primary requirement for processing personal data is consent or separate consent. There are also legally defined exceptional processing scenarios where no consent or separate consent is required.

Consent and the requirement

Under Article 13 of the PIPL, processing personal data should have a proper legal basis, including consent, or other legal bases that may allow for consent to be waived as illustrated below. To ensure informed consent is obtained, before processing their personal data, a controller must inform individuals truthfully, accurately, and fully of the following information in a prominent way and in clear and plain language:

  • the controller’s name and contact details;
  • processing purposes, methods, information types processed and storage period (which must be the shortest time required to fulfil the processing purpose);
  • the option and procedure for individuals to exercise the statutory rights regarding their personal data; and
  • other matters required by laws and administrative regulations.

Separate consent and the requirement

Under the PIPL, there are several processing activities that require separate consents, including processing sensitive personal data, cross-border transfers of personal data, providing personal data to a third party, publicly disclosing personal data, etc. While the PIPL itself lacks a precise definition of “separate consent”, practical guidance can be found in the recommended national standard GB/T 42574-2023 (Information security technology – Implementation guidelines for notices and consent in personal information processing). This standard clarifies that separate consent signifies a specific, explicit agreement given by the individual solely for a particular processing activity concerning their personal data. Crucially, it does not encompass blanket consent given for multiple processing purposes simultaneously.

Exceptional consent-waiving processing

In addition to consent, the PIPL allows data controllers to process personal data based on several alternative legal grounds:

  • where processing is necessary for:
    1. entering into or performing the contracts to which the individual is a party;
    2. managing human resources in accordance with labour rules or policies or collective employment contracts that are formulated or concluded lawfully;
    3. fulfilling statutory duties or responsibilities; and/or
    4. responding to public health incidents, or protecting the life, health and property security of individuals in urgent situations;
  • processing personal data for the purpose of news reporting or public opinion-based oversight for the public interest, provided it remains within a reasonable scope; and
  • processing the personal data disclosed by an information subject or otherwise lawfully disclosed, provided it remains within a reasonable scope in accordance with the PIPL.

Under these processing conditions, consent can be waived.

Obligations for Data Controllers and Processors in the Cloud Environment

Under PRC law, data controllers should undertake primary legal responsibilities regarding processing personal data, and data processors shall provide necessary assistance for compliance. That is because, in cloud services, data controllers are the customers (cloud tenants or platform users), and their technical capability to comply with the law will be subject to the technical limit provided by the cloud service providers (as data processor).

Data controller’s obligations

According to the PIPL, data controllers using the cloud services are subject to the following key obligations:

  • Lawfulness and transparency: According to Article 13 and Article 17 of the PIPL, data controllers must ensure that personal data is processed on a lawful basis and disclose data processing activities transparently to data subjects. This includes providing clear information about the purpose, method, and scope of data processing.
  • Data security: As stipulated in Article 51 of the PIPL, and Articles 6 and 7 of the Information Security Technology – Personal Information Security Specification (GB/T 35273-2020), data controllers must implement adequate technical and organisational measures to ensure the security, integrity, and confidentiality of data. This includes using security measures such as encryption, anonymisation, access controls, and audit logging.
  • Responding to data subject requests: Under Articles 45, 46, and 47 of the PIPL, data controllers are required to establish effective mechanisms to ensure that data subjects can easily exercise their legal rights, including for example, the right of access, correction, deletion, and the right to object to processing.
  • Data breach notification: In the event of a data breach, Article 57 of the PIPL mandates that data controllers must take immediate remedial actions and notify both the data protection authorities and affected data subjects.

In the cloud environment, data controllers may expect data processors to provide data compliance measures or offer the technical mechanisms or flexibility to allow them to implement such measures independently. Therefore, cloud service providers, as data processors, may need to understand and anticipate such potential requirements in advance.

Data processor’s obligations

Data processors, usually the cloud service providers, are responsible for processing personal data on behalf of data controllers. Their obligations should be geared toward supporting the controller’s compliance efforts and ensuring data protection standards are upheld, including:

  • Processing in accordance with instructions: Per Articles 21 and 59 of the PIPL, data processors must strictly follow the data controller’s instructions and must not process data beyond the scope authorised by the controller.
  • Co-operation obligations: Under Article 59 of the PIPL, data processors are obligated to assist data controllers in fulfilling their legal responsibilities, such as providing necessary data for data subject requests.
  • Sub-processor management: Under Articles 21 and 59 of the PIPL, if data processing tasks are subcontracted to other service providers, data processors must obtain prior written consent from the data controller and ensure sub-processors comply with applicable data protection requirements.
  • Data deletion or return: Under Articles 21 and 47 of the PIPL, upon termination of the processing contract or conclusion of services, data processors must delete or return all personal data as instructed by the data controller and ensure no copies are retained.

CSL, DSL, and PIPL provide a general framework for cross-border data transfers. In addition to those three fundamental laws, a recent regulation, the Provisions on Promoting and Regulating Cross-border Data Flows, has been in effect since March 2024, further facilitating the cross-border transfer of personal data and other types of data outside of China. These laws apply to cross-border data transfers in the cloud environment as well.

According to the above laws, data controllers should undertake the legal obligation concerning cross-border data transfers in the cloud, and data processors should comply with data controllers’ instructions concerning cross-border transfers (for example, the instruction of not transferring personal data outside of China).

Below is a summary of the key PRC laws with respect to cross-border data transfers:

  • Regulatory mechanism regarding cross-border transfers of personal data: Data controllers transferring personal data outside of China should choose a proper compliance mechanism. Under Article 38 of the PIPL, such mechanisms include applying for a security assessment, signing the Chinese standard contractual clauses with the foreign data recipients, obtaining personal information protection certification, or meeting other conditions prescribed by the relevant laws and regulations or the Cyberspace Administration of China (CAC). Under the regulatory framework, the Provisions on Promoting and Regulating Cross-border Data Flows provide exemptions, in the hope of making cross-border data transfers easier for international businesses relating to China.
  • Notification and separate consents: Before carrying out any cross-border transfer of personal data, the data controller must notify the data subjects about the details of the cross-border data transfer, and obtain separate consents from the data subjects, unless the data controller can rely on a legal basis other than consent of a data subject, as outlined in Article 13 of the PIPL.

Cloud providers as data processors must collaborate with data controllers to ensure that the data transfer arrangements meet Chinese regulatory requirements. This involves aligning cloud security protocols with Chinese standards and providing support for assessments that should be completed by the data controller under the regulatory mechanism. Data controllers are advised to include specific clauses in their contracts with cloud service providers to address cross-border data transfer obligations. Please see details in 3. Data Ownership and Control.

Chinese data privacy laws do not impose penalties specifically for data controllers and data processors in the cloud environment. In practice, the penalties vary depending on the role of the legal entities. Below are penalties applicable to each role under Chinese laws and regulations.

Penalties for Data Controllers

Data controllers bear primary responsibility for ensuring the legality, security, and transparency of personal data processing activities. The penalties for non-compliance include administrative penalties, civil liabilities, and criminal liabilities in severe cases.

  • Administrative penalties: According to Article 66 of the PIPL, data controllers can face warnings or substantial fines, up to RMB50 million or 5% of the previous year’s annual turnover for severe infractions. Regulatory authorities may issue corrective orders requiring data controllers to immediately rectify any identified violations. In serious cases, authorities may order suspension or termination of specific data processing activities, potentially leading to significant business disruption. Profits derived from non-compliant data practices may also be confiscated.
  • Civil liability and criminal liability: Data subjects whose rights have been harmed can sue data controllers for compensation. In case of severe violations, data controllers may face criminal charges. Penalties may include imprisonment of responsible individuals, criminal fines, and other legal consequences.

Penalties for Data Processors

Data processors, usually cloud service providers, are responsible for processing personal data according to the instructions of the data controllers. Processors can also face significant penalties for non-compliance.

  • Administrative penalties: As is the case with data controllers, authorities can require data processors to rectify non-compliant behaviours. Although data processors generally face lower fines compared to those of data controllers, repeated, multiple or serious non-compliance can still lead to substantial penalties, including fines, warnings, or even suspension of services under the PIPL and other applicable laws. For severe violations, regulators may order data processors to suspend or cease processing activities or confiscate any illegal profits.
  • Civil liability and criminal liability: In some cases, data processors may be held liable with data controllers or independently for damages suffered by data subjects or other legal entities and individuals concerned. This may happen when processors fail to follow controllers’ instructions or neglect their own security responsibilities. For example, if a processor’s negligence leads to data breaches, affected individuals may file claims for compensation against both the data controller and the processor. Data processors involved in illegal activities, such as unauthorised sale or misuse of personal data by the data processor deliberately, may face criminal prosecution. This includes fines, imprisonment, and other criminal sanctions.

Security Measures Required by the PRC Law for Data Stored in the Cloud

The security of the cloud computing environment is jointly safeguarded by cloud service providers and their customers. The CSL requires operators to take security measures to protect the security of the cloud and services derived from it hosted in China and the data stored in the cloud:

  • According to Article 10 of CSL, operators should comply with laws and regulations and compulsory national standards to adopt technical measures and other necessary measures, in order to ensure the security and availability of cloud services and other services derived from it, and to ensure the integrity, confidentiality and availability of the data processed in the cloud and the services derived from it.
  • Article 21 of the CSL imposes a general requirement regarding data security measures to protect the security of networks and the integrity, confidentiality and availability of data processed in the cloud and the services derived from it, including: (i) measures to prevent computer viruses, cyber-attacks, network intrusions and other activities that endanger cybersecurity; (ii) measures to monitor and record network operation and cybersecurity events, and maintain the cyber-related logs for no less than six months; and (iii) measures such as data classification, and back-up and encryption of important data, etc.

The PIPL requires personal data controllers to take technical measures to ensure the security of personal data. Legal requirements in the PIPL apply to processing activities of personal data stored in the cloud, which are summarised below:

  • Article 51 of the PIPL requires that personal data controllers shall, subject to the purpose and the method of processing personal data, types of personal data, impacts on personal rights and interests and possible security risks, take the following measures to ensure the compliance of personal data processing activities with provisions of laws and administrative regulations, and prevent unauthorised access to, and disclosure, falsification and loss of, personal data:
    1. formulating internal management systems and operating procedures;
    2. implementing category-based management of personal data;
    3. taking corresponding technical security measures such as encryption and de-identification;
    4. reasonably determining the permissions to process personal data and conducting security education and training for relevant employees on a regular basis;
    5. formulating and organising the implementation of emergency response plans for personal data security incidents; and
    6. other measures stipulated by laws and administrative regulations.

The Measures on Assessing the Security of Cloud Computing Services stipulates measures that cloud service providers should comply with when they are providing services to the government and party offices, and the operators of CII. Article 3 of the Measures provides that the security assessment of such cloud services should concentrate on, inter alia: (i) the security of the cloud platform technology, products and supply chain; (ii) the ability to manage security effectively and the strength of the cloud platform’s security protection measures; (iii) the feasibility and ease with which customers can transfer their data; and (iv) the business continuity of the cloud service provider.

In addition, there are a few recommended national standards concerning cloud computing services that specify security measures for cloud services. For example, the standard Information Security Technology – Security Capability Requirements for Cloud Computing Services (GB/T 31168-2023) highlights the security technical measures that cloud service providers need to deploy. There are eleven types of security measures in total, including system development and supply chain, system and communication protection, access control, data protection, management of configuration, operational maintenance, emergency response, audit, risk assessment and continuous monitoring, security management and personnel, and physical and environmental security. The goal of those measures is to ensure the confidentiality, integrity, and availability of data stored in the cloud.

Encryption Standards for Data in Transit and at Rest in the Cloud

  • According to the above standard GB/T 31168-2023, cloud service providers should implement encryption measures to ensure the security of data in transit and at rest in the cloud. The standard recommends that cloud service providers take communication encryption and signature verification measures in compliance with the Chinese national encryption management regulations.
  • However, if the cloud services are intended to support the administration agencies, the operators of CII and the party offices, such cloud services must adopt the encryption technologies recognised by the Chinese government to comply with the Administration Measures of Commercial Encryption (revised in 2023).

Access Controls in the Cloud Environment

  • According to the above laws and national standards, cloud service providers should identify and authenticate personnel, processes, and devices before allowing them access to the cloud computing platform, and restrict the operations they can perform and the functions they can use. For example, the national standard GB/T 31168-2023 recommends different levels of access control measures, depending on the importance of the business and sensitivity of the data. Cloud services providers can adopt proper access control measures depending on the importance of the business and sensitivity of the data, as well as contractual requirements of the cloud customers.
  • As a general requirement, cloud service providers are recommended to identify and recognise the users of their information systems and implement multi-factor authentication for privileged account network access. As an enhanced requirement, for example, when data stored on the cloud is critical and sensitive, cloud service providers are recommended to: (i) implement multi-factor authentication for account network access and ensure that at least one factor is provided by a device separate from the system to prevent simultaneous compromise or leakage of multi-factor authentication credentials; and (ii) implement anti-replay authentication mechanisms, such as dynamic passwords, for privileged account network access to ensure that the cloud computing platform can resist replay attacks.
  • If the data on cloud is very sensitive, and the associated business operations are critically important, as an advanced requirement, cloud service providers are recommended to: (i) implement multi-factor authentication for local access to privileged accounts; and (ii) implement anti-replay authentication mechanisms, such as dynamic passwords, for network access by non-privileged accounts to ensure that the cloud computing platform can resist replay attacks.

Handling of Security Accidents and Breaches in the Cloud

  • According to the CSL, PIPL, and the Administrative Measures on Data Security in the Fields of Industry and Information Technology, cloud service providers should develop emergency response plans for the cloud computing platforms and conduct regular drills to ensure the availability of critical information resources in emergencies. In detail, cloud service providers should establish an emergency response plan, and should track, record, and report incidents to relevant personnel. Cloud service providers should also have disaster recovery capabilities and establish necessary back-up and recovery facilities and mechanisms to support the continuity plan of customers’ businesses.
  • When a data security incident occurs, cloud service providers should promptly carry out emergency response measures according to the emergency response plan. Upon completion of incident handling, a summary report should be prepared within the specified timeframe, and an annual report on data security incident handling should be submitted to the local industry regulatory authorities.

Data Ownership and Control in Cloud Agreements

As a basic principle in a typical cloud business, data in the cloud is owned and controlled by the cloud service customers unless otherwise agreed. The cloud service providers and the cloud service customers are recommended to specify in the cloud agreement that:

  • All data and data related assets provided by the customer to the cloud service provider as well as data collected, generated, or stored during the operation of the customer’s business on the cloud computing platform, are owned and controlled by the customer. Both parties may further stipulate in the agreement that the cloud service provider should ensure the customer retains full rights and obligations over these resources, including the ability to access, utilise, and manage their data on the cloud as needed.
  • The cloud agreement may emphasise the customer’s control over their data, ensuring that the cloud service provider cannot interfere with or restrict the customer’s rights, and providing mechanisms for the customer to efficiently access and manage their data at all times.

Data Subjects’ Rights Over Their Data

In the cloud environment, personal data subjects have rights to their personal data as defined in the PIPL, including the right to know and the right to decide how their personal data is processed, unless otherwise provided by the laws and regulations.

Specifically, the data subjects have the following rights:

  • the right to check and copy their personal data;
  • the right to transfer personal data to a third party designated by the data subjects;
  • the right to rectify and supplement their personal data;
  • the right to request the deletion of personal data; and
  • the right to seek an explanation from the data controller regarding the rules governing the processing of their personal data.

How Can Data Subjects Exercise Their Rights to Access, Rectify, or Delete Their Data

Data subjects need to submit their requests directly to the controller. PIPL requires the data controller to establish a convenient mechanism for accepting and processing requests from personal data subjects in a timely manner.

In the cloud environment, cloud service customers may need support from cloud service providers to fulfil the data subjects’ requests concerning their personal data; for example, the right to access, rectify and delete their personal data stored in the cloud. Therefore, in the cloud agreement, the cloud service customer and the cloud service provider may specify the mechanism and procedures to deal with the personal data subjects’ requests in detail, as well as Standard Operation Procedures (SOP) that must be followed by both parties.

Article 45 of the PIPL provides data subjects with a data portability right: Where an individual requests to transfer his/her personal data to a personal data controller designated by him/her that meets the conditions stipulated by the CAC, the personal data controller shall provide a way for the transfer. The PIPL and its relevant laws have not provided details regarding how to respond to the data portability request in the cloud.

The recommended national standards, GB/T 35273-2020 Information security technology – Personal information security specification, provides the best practices regarding data portability. Upon request from the data subject, the data controller should provide a method for the data subject to obtain copies of the following types of personal data or, where technically feasible, directly transfer copies of the following types of personal data to a third party designated by the data subject: (i) basic personal information and identity information, and (ii) health and physiological information, educational and employment information.

To ensure that the right to data portability is respected, both the cloud customer and the cloud service provider are advised to clearly define in the cloud agreement how such requests will be handled.

The general legal requirement provided in the PIPL concerning data retention and deletion applies to processing in the cloud.

  • According to PIPL, the cloud service customer, as the controller of the data, should follow the principle of data minimisation when determining the data retention period in the cloud, and the controller of the data needs to delete personal data proactively after expiration of the retention period or upon request of the data subjects to delete the personal data. In such a case, the cloud service provider as the processor should delete the personal data as provided in the cloud agreement or requested by the cloud customer accordingly.
  • According to Article 47 of the PIPL, where the retention period as stipulated by laws and administrative regulations does not expire, or the deletion of personal data is technically impossible or difficult to achieve, the data controller shall stop the processing of such data other than storing and taking necessary security protection measures. In the cloud environment, the cloud service providers need to facilitate and provide practical measures to delete such personal data.

Conducting thorough due diligence is crucial to ensuring compliance with Chinese laws and regulations, particularly those related to data security, cybersecurity, and personal information protection. The following is a short, high-level checklist for basic due diligence based on applicable Chinese legal requirements:

  • Check the cloud service provider’s compliance with relevant laws, including the CSL, DSL, and the PIPL. According to the CSL, its implementation regulations, and law enforcement practice, cloud service providers providing services through the cloud hosted in China should obtain the proper level of MLPS certification. Depending on the nature of the business and the volume of personal data that is to be processed in the cloud, the cloud service provider needs to obtain level 2, 3 or 4 MLPS certification.
  • Check whether the cloud service provider has sufficient and state-of-the-art security measures, including, for example, data encryption, access controls, and incident response protocols.
  • Check the cloud service provider’s reputation and history concerning data breaches and security incidents. This involves reviewing the provider’s standing in the market, customer feedback, industry recognition, and any past legal or compliance issues that could affect their reliability.

A cloud service agreement is critical to ensure data protection in the cloud environment. The cloud service agreement may include the following data protection requirements. Details regarding data processing can be found in 4.3 Data Processing Agreements and the Cloud.

  • Customers’ control over data: The agreement shall specify that, without the customers’ authorisation, any access, modification, disclosure, use, transfer, or destruction of data should not be permitted. Upon termination of the service contract, all data should be returned to the customer, and data should be completely deleted per the customers’ instructions.
  • Cloud service providers’ measures to protect data: Effective management and technical measures should be taken to ensure the confidentiality, integrity, and availability of customer data and business systems. It is recommended to list specific security measures in the cloud service agreement.
  • The SLA should comprise specific technical and management parameters of the security of cloud services. The SLA is recommended to be prepared based on the nature of the customer’s business and data and the obligation of the cloud customer to protect their data in the cloud.
  • Periodic supervision and audit are effective measures to make sure the cloud service providers comply with the applicable laws. Details can be found in 7. Compliance and Audits.

Article 21 of the PIPL provides the necessary coverage of a data processing agreement (DPA), which should include: the purpose, time limit and method of processing personal data, type of personal data and protection measures, as well as the rights and obligations of both parties, and mechanisms for supervising the data processor’s personal data processing activities.

According to the above law, national standards, and mainstream market practice in the PRC, a well-structured DPA should define the responsibilities of both parties. Here is an overview of how DPAs are typically structured in a cloud business in the PRC:

  • Scope of data processing: The DPA may provide details about, if applicable, (i) what kind of data will be processed, the purpose of the processing, and the types of processing; (ii) the period during which the data will be processed, typically tied to the duration of the service contract or until the data is securely deleted or returned; and (iii) types of data and data subjects, including descriptions of the categories of personal data and the categories of data subjects.
  • Obligations of the data processor (ie, the cloud service provider): This section may include, for example, (i) a requirement that the processor comply with applicable data protection laws and regulations; (ii) the technical and organisational measures the processor must implement to protect the data’s confidentiality, integrity, and availability; (iii) data access and confidentiality; and (iv) a data breach notification provision.
  • Obligations of the data controller (cloud customer): This section may include customers’ obligations to provide clear and lawful instructions to data processors.
  • Data subject rights: The controller must manage data subject rights, such as access, rectification, deletion, and portability requests, and may require the processor’s timely assistance in fulfilling these rights.
  • Sub-processing: The DPA should provide the conditions under which the processor can engage sub-processors.
  • Liability and indemnification: The DPA often includes indemnification clauses specifying how each party will handle potential claims arising from data processing.

The recommended national standard GB/T 31167-2023 Information security technology – Security guidance for cloud computing services in its Article 9 provides guidance on how to determine proper exist strategies and data migration in practice, including:

  • Negotiate on exit conditions in advance: Before signing contracts or any written documents such as service commitments from cloud service providers, it is advisable for the cloud service providers and the cloud customers to negotiate in advance on the conditions for exit, as well as the responsibilities and obligations of both parties upon exit.
  • Negotiation on migration interfaces and plans: The customer and the cloud service provider should negotiate the interfaces and plans for migrating data and business systems out of the cloud platform, which can ensure a smooth transition and minimise disruption during the exit process.
  • Return of migratable data: During the exit process, the cloud service provider should return the customer data specified as migratable in the contract or service commitment documents.
  • Ensuring business availability and continuity: While migrating data and business systems back to the customers’ own data centre or another cloud platform, the customer and service provider should ensure business availability and continuity. Effective measures may include parallel operation of the original business system and the newly deployed system for a certain period.
  • Revocation of access: The cloud service provider should promptly cancel physical and electronic access to the customer’s resources once the service has been exited.
  • Provider’s ongoing responsibilities post-exit: Even after the customer exits the cloud service, the provider should still uphold certain responsibilities and obligations, such as confidentiality requirements.

The CSL, DSL, and PIPL stipulate the reporting obligations in the event of data breaches. In addition to these general legal requirements, the CAC, China’s data protection regulator, further refines specific reporting requirements through its regulatory rules. There are two sets of different requirements regarding personal data breaches and cybersecurity incidents, which are detailed below.

Personal Data Breaches

In the event of personal data breaches, the PIPL requires the personal data controller to notify the competent authorities in a timely manner. This enables the authorities to understand the situation at the outset and take accurate and effective regulatory measures. The specific matters to be reported are detailed in 5.3 Notifying Data Breaches.

According to Article 66 of the PIPL, personal data controllers failing to fulfil reporting obligations will be subject to administrative penalties. The penalties start with orders to rectify, warnings, confiscation of illegal gains, and orders to suspend or terminate relevant application services; refusal to correct will result in fines of up to RMB1 million. For more severe violations, higher fines may be imposed, along with suspension of business operations or revocation of relevant business licenses or permits.

Cybersecurity Incidents

In the event of cybersecurity incidents, in a proposed draft, the CAC detailed the reporting procedures and contents in Administrative Measures for the Reporting of Cybersecurity Incidents (Draft for Comments) (the “Draft”):

  • reporting entities: network operators that construct or operate networks or provide services through networks within the PRC – ie, the cloud service provider, or the customer of the cloud service, depending on the victim of the incidents;
  • reporting recipients: CAC, industry competent authorities (if any), and the police (where a crime is suspected);
  • reporting contents: organisational details of the reporting entity, incident discovery and impact assessment, incident development, preliminary cause analysis, investigation and analysis requirements, response and plans, site protection status, and additional information; and
  • reporting timeline: based on the classification of security incidents into four classes (general, relatively severe, severe, and extremely severe), the Draft requires that relatively severe, severe, or extremely severe cybersecurity incidents must be reported within one hour; if certain details are not available within one hour, reporting must occur within 24 hours.

The Draft stipulates that network operators failing to report cybersecurity incidents as required may face legal liabilities under CSL, DSL, and PIPL, which could include orders to rectify, warnings, and fines. If competent authorities consider the circumstances severe, heavy fines or even business suspension/termination may be imposed. However, the Draft also provides that if a company has taken reasonable and necessary protective measures to minimise the harm of data breaches and proactively reported as required, liability may be exempted or mitigated accordingly. Otherwise, the personal data subjects must be notified.

While the exact timeframe for the Draft’s finalisation and implementation remains uncertain, its content and regulatory approach signal the government’s preferred handling of data breach response and reporting for network operators (including cloud service providers and customers) based or operating in the PRC. 

The CSL requires network operators to formulate emergency response plans for cybersecurity incidents. When the incident happens, network operators must immediately activate the emergency response plans, take remedial measures, and report to the competent authorities.

Therefore, for cloud service providers and customers, developing an emergency response plan is crucial for investigations and remediation upon a data breach that occurred in the cloud. More information regarding data breaches can be found in 2.1 Data Security and the Cloud and 4.1 Due Diligence.

Notification Obligations Under the PIPL

Article 57 of the PIPL sets out a general notification mechanism of notification, which includes the two aspects detailed below.

Notifying personal data subjects and regulatory authorities

As a default rule under the PIPL, the personal data controller has the obligation to notify affected subjects and authorities. Notification to the authorities is mandatory, whereas notification to the personal data subjects is not.

Article 57 provides that if the personal data controllers take measures that can effectively prevent harm from the breach, they can be exempt from notifying the affected personal data subjects, unless specifically required by the authorities. The PIPL does not explicitly define a clear threshold for when notification becomes necessary. Nor does it outline specific timelines for such notifications.

Information to be notified

The notification should include information such as: (i) the categories of personal data that have been or may be leaked, altered, or lost, the causes for such incidents, and the potential harm they may cause; (ii) the remedial measures taken by the personal data controllers and the mitigation measures that personal data subjects may take; and (iii) the contact information of the personal data controller.

Key Considerations

It is important to note that the above is only a high-level legal requirement provided by the PIPL. In practice, regulators may request more extensive information based on their working rules and specific cases. Cloud service customers may want to consider the following in handling data breach notification matters:

  • Clarifying the definition of a personal data breach, roles of both parties, notification recipients, notification timelines and methods, remedial measures, etc, in the cloud service agreement.
  • Designating emergency contacts for each party and establishing effective communication channels.
  • Reviewing the cloud service provider’s emergency response plan or SLA to ensure a swift response can be carried out in the event of a data breach.
  • Clarifying the liability and indemnification of the defaulting party in the absence of proper notification.

Please refer to details in 1.2 Data Privacy and Cloud Computing.

PRC law does not have a generally applicable and absolute data localisation requirement. However, the CSL, DSL, and PIPL impose localisation requirements on certain specific types of data and outline the administrative requirements for cross-border transfers of such data.

  • Data localisation for CIIO: CIIOs are required to store the personal data they collect and process within China. Any cross-border transfer of data by operators of CIIs is subject to prior approval from the competent government authorities. CIIs are identified in strategically important sectors such as national defence, energy, and finance. Government authorities overseeing these industries will notify CIIOs individually about their designation as CIIs and the corresponding data localisation requirements.
  • Data localisation for specific types of data: Certain specific types of data that are crucial to state security and the public interest are subject to data localisation requirements. Examples include geographic and mapping information, health and medical information (such as patient records), and other sensitive categories. The localisation requirements for such types of data can be found in the industrial regulations that are publicly available. 
  • Data localisation for “Important Data”: Important Data is a specially defined type of data under Chinese law that is highly sensitive from the perspective of national security and the general welfare of the public. Important Data must be stored in China unless prior approval is obtained. While Important Data is intended to be identified by relevant industrial regulators, the process for formally designating data as “Important” has been slower than anticipated.
  • No data localisation for personal data: For general personal data (not falling within the scope of specific types of data and Important Data as outlined above), there is no data localisation requirement.

Data localisation requirements have a direct effect on the compliance of cloud computing services.  The slow and ambiguous identification of Important Data raises concerns regarding data transfers in and out of the PRC. Cloud service providers and users need to have a data compliance strategy in place that allows them to address the concern of data localisation requirements in the PRC. 

Among cross-border data transfers, it is not uncommon for legal systems or judicial procedures of different jurisdictions to clash. For instance, in cross-border litigation, a US governmental agency may require a company in China to present data information in its routine regulatory check or special investigation. However, under the DSL and PIPL, submitting personal information or data stored in China to foreign law enforcement authorities is subject to prior approval from the competent Chinese regulatory authority. The approval process in China may be complex and time-consuming, making it difficult to meet the demands of the foreign law enforcement authority in a timely fashion. The conflicts of laws between different jurisdictions may therefore increase compliance costs and legal risks for multinational companies.

Addressing such an issue requires clearly understanding the nature and type of the data request from the foreign authority, and the scope and procedure of the PRC data cross-border approval.  Although potentially complex and time-consuming, successful resolution involves collaboration between PRC counsel well-versed in Chinese law and foreign counsel familiar with the requesting country’s law enforcement procedures.

In China, the personal data processing compliance audit was introduced in the PIPL in 2021, and regulatory requirements related to it have been gradually taking shape since then. In 2023, the CAC released the draft Administrative Measures for Compliance Audit of Personal Information Protection (the “Audit Measures”) for public comment, but to date it has not come into effect. The Audit Measures draft applies to personal data processing activities conducted by personal data controllers in all scenarios, including cloud-based processing.

In July 2024, the national recommended standard Data Security Technology- Personal Information Protection Compliance Audit Requirements (the “Standard”) was introduced for public comment, which provides more comprehensive and practical guidance based on the Audit Measures.

Cloud service providers and cloud service customers should comply with the above in their personal data processing once they become final and effective. The following is a summary of the key aspects of personal information protection compliance audits in the Audit Measures and the Standard.

Occurrence of Compliance Audit

As an independent supervisory mechanism to confirm and ascertain a personal data controller is processing personal data in accordance with the law, a compliance audit is mandatory. Companies that process personal data are required to conduct audits on a regular basis (every one or two years, as the case may be). Audits can be performed internally by the company itself or by engaging third-party professional agencies.

Additionally, if the regulatory authorities find that there is a significant risk in the processing of personal data or if a personal data breach occurs, the authorities may require the personal data controller to engage a third-party agency for a compliance audit. This is a type of audit process triggered by regulators.

A compliance audit generally involves several processes, including audit preparation, audit implementation, audit reporting, issue rectification, and archive management.

Key Areas of Compliance Audit

The scope of a compliance audit can be very broad, covering almost all aspects of personal data processing activities and the obligations provided by the PIPL. Key areas include, but are not limited to the following:

  • the legal basis for personal data processing;
  • transparency and completeness of privacy policies;
  • fulfilment of notification requirements;
  • the whole life cycle management of personal data processing;
  • methods for personal data subjects to exercise their legal rights; and
  • organisational structure, managerial and technical measures, and data protection policies.

Independence, Fairness, and Comprehensiveness of Compliance Audit

The Standard provides an essential guide to understanding and complying with the principles of independence, fairness and comprehensiveness of a compliance audit, covering aspects such as the audit process, implementation management, evidence management, qualifications of auditors, etc.

In terms of evidence management, the Standard requires that the audited party must ensure the authenticity, completeness, and validity of the evidence provided. Only evidence that meets both formal and substantive requirements can be accepted and used in the audit report.

Implementation of Compliance Audit Findings and Recommendations

The Standard highlights that once the audit report is completed and delivered, the audited party should address the identified issues within a specified timeframe. Auditors have the right to confirm the status of rectification.

Penalties for Non-compliance

Personal data controllers who fail to conduct compliance audits as required or improperly perform such audits will be subject to administrative penalties under Article 66 of the PIPL. In cases where the violation is even more severe and constitutes a crime, criminal liability may also be imposed.

Global Law Office

36th Floor
Shanghai One ICC
No. 999 Middle Huaihai Road
Xuhui District
Shanghai 200031
China

(8621) 2310 8288

(8621) 2310 8299

vincentwang@glo.com.cn www.glo.com.cn
Author Business Card

Trends and Developments


Authors



Han Kun Law Offices is a leading full-service law firm in China, widely recognised for providing tailored legal services and effective solutions to clients. Han Kun has professionals in eight offices in Beijing, Shanghai, Shenzhen, Haikou, Wuhan, Hong Kong, Singapore and New York. Most of Han Kun’s practices have been consistently recognised as top Chinese law firm practices by authoritative international legal ranking organisations. The firm is also a trend-setter in the data field. The data protection team comprises more than a dozen lawyers ‒ all of whom graduated from top Chinese or foreign universities. With a deep understanding of data laws both in China and abroad, the team represents some of the most prominent corporate names across the globe in solving their complex data compliance matters. By advising clients on cutting-edge matters, the data protecion team integrates expertise from within the firm and beyond to provide creative solutions that meet clients’ needs.

Regulations on Cloud Computing in China

For more than a decade, the Chinese government has adopted various measures to promote the advancement of cloud computing in China. In 2010, the Ministry of Industry and Information Technology (MIIT) and the National Development and Reform Commission (NDRC) jointly issued an announcement to launch pilot projects in Beijing, Shanghai, Shenzhen, Hangzhou, and Wuxi. This initiative encouraged the relevant organisations to develop software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS), as well as build cloud computing centres, bolster the research of core technologies, establish a nationwide industry alliance, and draft corresponding standards and regulations.

In 2013, the MIIT, the NDRC, and some other departments jointly issued Guiding Opinions on the Construction and Arrangement of Data Centres, providing political and financial incentives for the establishment of new data centres. In 2015, the MIIT included cloud computing in the 2015 Telecoms Catalogue and issued the first version of the Guidelines on the Construction of a Comprehensive Standardisation System for Cloud Computing. In the same year, the Fifth Plenary of the 18th Communist Party of China (CPC)’s Central Committee passed the 13th Five-Year Plan for Economic and Social Development, which listed cloud computing as a key field for the coming five years. These policies illustrate the Chinese central government’s decade-long dedication to the development of cloud computing.

Following in the footsteps of the central government, many local governments issued policies to stimulate the growth of cloud computing. By way of example, in 2014, Guangdong Province announced its plan to turn the province into a national hub for cloud computing technology, a leading area for cloud computing application services, and a global manufacturing base for cloud infrastructure equipment and cloud terminals by 2020. In 2017, Shanghai proposed to increase its investment in cloud computing so that by 2020 the revenue from cloud computing technology and services will reach CNY150 billion and the revenue from cloud computing, big data, mobile internet, and other related industries will reach CNY500 billion.

China has recognised the importance of cloud computing to its global competitiveness and boosted the industry through diverse policies since 2010. Government policies will likely remain supportive, given that the 14th Five-Year Plan for National Informatisation ‒ published in 2021 ‒ continued to emphasise the significance of cloud computing as China seeks to accelerate digitised development.

Cloud computing: requirements and potential risks for cybersecurity, data security, and personal information protection

The upstream of cloud computing usually encompasses cloud infrastructure providers who supply servers, networking hardware (eg, routers and switches), storage devices, network security devices, and optical fibre. The midstream includes data centres and cloud service providers. The downstream consists of customers in various industries such as finance, manufacturing, and education. Providing or using cloud computing services usually relies on co-operation among multiple parties and may therefore lead to different data processing roles, data security compliance obligations and responsibilities.

Under the Data Security Law (DSL) and the Personal Information Protection Law (PIPL), the cloud service users or the customers of cloud service providers (together referred to as “customers”) usually serve as data handlers or personal information handlers (“handlers” ‒ ie, the party who determines the purpose, method and scope of data/personal information processing, similar to the concept of controller under the EU’s General Data Protection Regulation (GDPR)). Cloud service providers may generally be regarded as entrusted parties (ie, the party who processes data/personal information under the instruction of handlers, similar to the concept of processor under the GDPR).

Therefore, the customer is mainly responsible and accountable for fulfilling the compliance and security obligations required by relevant laws, and the cloud service provider must assist the handler in fulfilling its obligations and take measures to ensure the security of data. Although in most of the enforcement cases penalties are imposed on handlers, there are also cases where the entrusted party or cloud service providers were directly penalised for failing to take adequate security measures. Thus, cloud service providers still need to focus on their data security protection obligations.

In addition, under the Cybersecurity Law (CSL), both customers and cloud service providers may constitute the network operator and must comply with the obligations set forth in the CSL.

Special protection requirements for critical information infrastructure operations

The Security Protection Regulations for Critical Information Infrastructure (the “Regulations on CII”) defines critical information infrastructure (CII) as key network facilities and information systems in important industries and fields (such as public telecommunications, information services, energy, transportation, water conservancy, finance, public services, e-government, and science and technology for national defence) that may seriously endanger national security, national economy, people’s livelihood, and public welfare once they are subject to any destruction, loss of function, or data leakage. Accordingly, CII is subject to special regulation under Chinese law.

Against the backdrop of digital transformation, many CII operators (CIIOs) are migrating their applications and data to the cloud and many new CIIOs opt to adopt a cloud-native approach, giving rise to new risks in network and data security. In response to this trend, the Guiding Opinions on Implementing the Classified Protection System and the Security Protection System for Critical Information Infrastructure ‒ promulgated in 2020 ‒ stipulate that cloud platforms that meet the relevant identification criteria also fall under the scope of CII. Therefore, cloud service providers identified by the competent authorities as CIIOs should make sure they comply with the relevant requirements.

The CSL and the Regulations on CII constitute the pillars of CII regulation, laying out provisions on the identification of CII and the obligations of CIIOs. In addition, certain national standards (such as GB/T 39204-2022 Information Security Technology ‒ Cybersecurity Requirements for Critical Information Infrastructure Protection) clarify the specific protection measures that CIIOs can adopt to ensure the security of CII.

A cloud service provider that is not identified as a CIIO may nonetheless be subject to CII regulation if it provides services to a CIIO customer. By way of example, Article 16 of Regulation on Network Data Security Management requires network data handlers that provide services for CIIOs to fulfil their obligations of network data security protection and provide secure, stable and continuous services in accordance with laws, regulations and contractual stipulations. Under the same article, without the consent of the contracting party, the network data handler may not access, obtain, retain, use, divulge or provide others with network data, nor may it conduct association analysis of network data.

Security technology risks

All liable parties should abide by the relevant security requirements, including but not limited to:

  • Information Security Technology ‒ Security Capability Requirements for Cloud Computing Services (GB/T 31168-2023);
  • Information Security Technology ‒ Security Reference Architecture of Cloud Computing (GB/T 35279-2017);
  • Information Security Technology ‒ Security Guidance for Cloud Computing Services (GB/T 31167-2023); and
  • Information Security Technology ‒ The Assessment Method for Security Capability of Cloud Computing Service (GB/T 34942-2017).

i) Logs

Data handlers are required by law to retain record logs on data processing, authority management, and personnel operations in the processing of the full life cycle of data for no less than six months. It is important to note that specific requirements for logs are scattered across various laws and regulations and that the form and content of the logs to be retained depend on the nature of the service provided.

ii) Cybersecurity Classified Protection System

China implements the Cybersecurity Classified Protection System (CCPS), which requires network operators and CIIOs to classify their information systems or networks into five levels based on their potential impact on individuals’ rights and national security. Specifically, network operators must refer to Article 21 of the CSL to fulfil their obligations of security protection according to the requirements of the CCPS.

The competent authorities actively enforce the CCPS. By way of example, in 2017, the police force in Anhui Province investigated a school whose website was hacked. The police determined that the school had not performed its obligations as a network operator and fined the school CNY15,000 and the liable person CNY5,000. To avoid warnings and fines, relevant businesses and organisations should regularly test their security management systems and evaluate their compliance with the CCPS.

iii) Procuring qualified cybersecurity products

Certain cybersecurity products (such as firewalls and intrusion detection systems) are classified as Critical Network Equipment (CNE) and Specialised Cybersecurity Products (SCPs) in the Catalogue of Critical Network Equipment and Specialised Cybersecurity Products. Pursuant to Article 23 of the CSL, CNE and SCPs should not be sold or supplied until such equipment or product successfully obtains security certification or passes security tests conducted by a qualified organisation. Therefore, cloud service providers should procure qualified CNEs and SCPs to ensure the security of their systems and data, as well as the security of supply chains.

iv) Obligations upon security incidents

Several Chinese laws and regulations set forth the obligation of reporting to the competent authorities and notifying personal information subjects upon discovering security incidents (ie, incidents or risks of cybersecurity attacks or data breaches), including Article 59 of the CSL, Article 29 of the DSL, Article 57 of the PIPL, and the Regulations on the Reporting of Cybersecurity Incidents (Draft for Comments) (the “Incident Draft”). The Incident Draft provides that if a security incident involves more than one million people, the operator should report it to the authorities within one hour. In addition, there has been a precedent enforcement case where a major cloud service provider was penalised for not reporting security incident to the authority.

Personnel risks

To ensure data security, network operators should implement management measures for individuals with access to systems and data, including current or former employees, system administrators, contractors, or business partners. Network operators should conduct background checks on these individuals, formulate internal security management systems and operating instructions, and maintain personnel records, as well as conduct monitoring and audits.

Data localisation and cross-border data transfer

Under Chinese law, certain types of data should be stored in China. When cross-border data transfer is indeed necessary, these types of data can only be transferred overseas after receiving approval from the competent authorities. By way of example, the Measures on Real Name Collection and Delivery of Postal and Courier Items set forth that user information and important data collected and generated by delivery enterprises when collecting users’ real names and delivering postal and courier items in China should be stored in China. The Measures for the Administration of Population Health Information (for Trial Implementation) provide that population health information must be stored in China and may not be hosted or leased on servers outside China.

Furthermore, China implements a data export regulation system for important data and personal information through such regulations as:

  • the Provisions on Promoting and Regulating Cross-Border Data Flows;
  • the Measures (Negative List) for Outbound Data Transfer from China (Beijing) Pilot Free Trade Zone (for Trial Implementation); and
  • the Administrative List (Negative List) for Outbound Data Transfer from China (Beijing) Pilot Free Trade Zone (Edition 2024).

Under these regulations, if the data to be transferred overseas falls under certain categories, data handlers must pass data export security assessments, file standard contracts, or obtain personal information protection certifications.

In a cloud computing scenario, as outlined earlier, the customer is usually identified as the personal information handler and is thus responsible for fulfilling the aforementioned obligations of data localisation and export compliance. Nevertheless, cloud service providers should also assist their customers in performing the relevant compliance obligations through contractual agreements.

Qualifications for providing cloud services

Pursuant to the Provisions for Foreign-Funded Telecommunications Enterprises, the proportion of foreign investment in enterprises operating value-added telecommunications services should not exceed 50%, unless otherwise provided by laws or regulations. In addition, the Measures (Negative List) for Foreign Investment provide that foreign investment in value-added telecommunications is limited to telecommunications services that China agreed to open to foreign investors in its accession to the WTO, which does not include services such as B11. Therefore, in principle, companies applying for licences such as B11 should not have any foreign investment.

Under such regulations, foreign enterprises usually conduct telecommunications businesses in the following three ways.

  • CEPA model ‒ the government of the Chinese mainland has signed the Closer Economic Partnership Arrangement (CEPA) and a series of supplementary agreements with the governments of Hong Kong SAR and Macau SAR to strengthen trade and investment co-operation, including preferential policies for investment in value-added telecommunications services. By way of example, with regard to B11, CEPA raises the limitations on the proportion of foreign investment to 50%. Therefore, foreign enterprises may invest in entities in the Chinese mainland through their service providers in Hong Kong SAR and Macau SAR for favourable VAT treatment.
  • Variable interest entity (VIE) model ‒ foreign entities may establish a wholly foreign-owned enterprise (WFOE) in the Chinese mainland. The WFOE may control a domestic operator (ie, the entity that obtains a value-added telecommunications licence and conducts business) through a series of agreements. However, such VIE models may be subject to regulatory concerns in practice.
  • Co-operating with licensed value-added telecommunications providers on the Chinese mainland ‒ foreign entities may sign co-operation agreements with cloud service providers holding value-added telecommunications licences in the Chinese mainland (“domestic entities”) to provide IP licences and technical support. The domestic entity would sign service contracts with customers to provide cloud services with the same technical standards as the foreign entity. In addition, data collected would mainly be stored in local data centres operated by the domestic entity and remain isolated from data centres of the foreign entity. At present, some prominent cloud service providers adopt this approach to provide cloud services in the Chinese mainland.

Meanwhile, China is gradually easing the above-mentioned limits and has adopted a broader opening-up initiative on foreign investment in value-added telecommunications. In April 2024, the Notice of the Pilot Programme for Expanding the Openness of Value-Added Telecommunications Businesses to Foreign Investment proposes to carry out a pilot programme in certain regions of Beijing, Shanghai, Hainan and Shenzhen.

In the pilot programme, restrictions on the foreign equity ratios for some value-added telecommunications services including internet data centres, content delivery networks, internet service providers, online data processing and transaction processing, information-releasing platforms and delivery services contained in information services (excluding the operation of internet news information, online publishing, online audio and video, and internet culture) ‒ as well as information protection and processing services ‒ will be removed. On 23 October 2024, the MIIT organised a seminar on the pilot programme for expanding the opening-up of value-added telecommunications services and formally launched the pilot programme in the four pilot regions.

Special regulation for financial sector

Certain industries face special requirements for the use of cloud services given their high sensitivity. This section will briefly introduce the relevant regulations using the financial sector as an example.

Related policies

A series of policies indicate that authorities in the financial sector support the use of cloud computing, as follows.

  • The 13th Five-Year Plan for the Development of Information Technology in China’s Financial Industry, released in 2017, proposes to steadily promote research on the application of system architecture and cloud computing technology and to strengthen policy research and guidance on the application of cloud computing in the financial sector.
  • The Financial Technology (Fintech) Development Plan (2019‒21) ‒ published in 2019 ‒ further proposes to co-ordinate the planning of cloud computing applications in the financial sector, with the goal of building a safe and controllable cloud service platform for the financial sector.
  • The Financial Technology Development Plan (2022‒25) ‒ released in 2021 ‒ proposes to accelerate the application of cloud computing technology, providing financial services with efficient management of cross-region data centre resources, elastic provisioning, cloud-network linkage, and multi-location multi-activity deployment capabilities.

Financial cloud standards

In the meantime, the financial sector has introduced financial standards on cloud computing technology and applications (“financial cloud standards”) to ensure network and data security, including but not limited to:

  • JR/T 0166-2020 Financial Application Specification of Cloud Computing Technology ‒ Technical Architectures (the “Architecture Standard”);
  • JR/T 0167-2020 Financial Application Specification of Cloud Computing Technology ‒ Security Technical Requirements (the “Security Standard”); and
  • JR/T 0168-2020 Financial Application Specification of Cloud Computing Technology ‒ Disaster Recovery (the “Recovery Standard”).

The financial cloud standards apply to both financial institutions (ie, financial cloud service users) and financial cloud service providers, setting forth special requirements for financial clouds. By way of example, Article 5.2 of the Architecture Standard provides that cloud computing deployment models in the financial sector mainly include private clouds, group clouds, and hybrid clouds composed of the previous two kinds of cloud. Article 6.1 of the Security Standard further provides that the operating environment of cloud computing data centres used to serve the financial sector should be physically isolated from other industries. Therefore, financial clouds should not be operated as public cloud models or on public clouds.

In addition to standards specifically regulating financial clouds, requirements for financial clouds may also be addressed in other financial sector standards on personal information and data. By way of example, Article 6.1.6 of JR/T 0171-2020 Personal Financial Information Protection Technical Specification stipulates that the erasure of personal financial information in cloud environments should be performed in accordance with the standard JR/T 0167-2018.

Han Kun Law Offices

9/F
Office Tower C1
Oriental Plaza
1 East Chang An Avenue
Dongcheng District
Beijing 100738
China

+86 10 8525 5500

+86 10 8525 5511/5522

beijing@hankunlaw.com www.hankunlaw.com/en/
Author Business Card

Law and Practice

Authors



Global Law Office (GLO) dates back to the establishment of the Legal Consultant Office of China Council for the Promotion of International Trade (CCPIT) in 1979. With the approval of the Ministry of Justice of the People’s Republic of China, it was renamed “China Global Law Office” in 1984, signalling its commitment to an international perspective and full engagement with the global community. Through over four decades of dedicated effort and growth, GLO has emerged as a leading, full-service law firm within China’s legal landscape. From its inception, GLO has embraced the mission of “serving domestic and foreign clients with a globalised vision, globalised team, and globalised quality”. This commitment has allowed it to consistently maintain a position at the forefront of the industry, even amidst the dynamic and ever-evolving global economic environment.

Trends and Developments

Authors



Han Kun Law Offices is a leading full-service law firm in China, widely recognised for providing tailored legal services and effective solutions to clients. Han Kun has professionals in eight offices in Beijing, Shanghai, Shenzhen, Haikou, Wuhan, Hong Kong, Singapore and New York. Most of Han Kun’s practices have been consistently recognised as top Chinese law firm practices by authoritative international legal ranking organisations. The firm is also a trend-setter in the data field. The data protection team comprises more than a dozen lawyers ‒ all of whom graduated from top Chinese or foreign universities. With a deep understanding of data laws both in China and abroad, the team represents some of the most prominent corporate names across the globe in solving their complex data compliance matters. By advising clients on cutting-edge matters, the data protecion team integrates expertise from within the firm and beyond to provide creative solutions that meet clients’ needs.

Compare law and practice by selecting locations and topic(s)

{{searchBoxHeader}}

Select Topic(s)

loading ...
{{topic.title}}

Please select at least one chapter and one topic to use the compare functionality.