11 June, 2019
Data security is one of the key emphases prescribed under China’s Cyber Security Law (CSL), which came into force in 2017. On 28 May 2019, the Cyberspace Administration of China released its Data Security Management Measures (draft for public comments) (Data Draft). The Data Draft is prepared based on the CSL, and has taken into account relevant supplementary legislation and recommended national standards (both currently in force and still in the process of soliciting public opinion). Based on this, the Data Draft sets forth detailed compliance requirements with respect to data security.
After coming into force, the Data Draft will become one of the enforcement bases (as a supplementary legislation) for China’s government agencies. It will have higher legal effects than the recommended national standards (e.g., the Information Security Technology – Personal Information Security Specification (2018 version)), which do not have mandatory enforcement power. Compared with the CSL (the fundamental law which also works as a law enforcement base), the Data Draft has supplemented and expanded the interpretation of some existing rules. Among them, the areas with more substantial changes include:
No. |
Matters regulated |
CSL |
Data Draft |
1 |
Record-filing for the collection of important data and sensitive personal information |
No specific rules. |
Network operators collecting important data or sensitive personal information for business operation purposes shall file the record with local cyberspace administration. |
2 |
Access by automated means |
No specific rules. |
Network operators use automated means (e.g., web robot) to access or collect website data must cease such automated access and collection if: (1) the access or collection seriously affects the website’s operation, e.g., their traffic of automated visits or data collection exceeds one-third of the website’s daily average traffic, and (2) so requested by the website. |
3 |
Individual data subject’s rights |
The CSL provides for the correction rightsand deletion rights for data subjects (e.g., users) to their personal information collected. |
The Data Draft further defines the data subject’s consent withdrawal rights, information access rights, and account closure rights to personal information1. |
4 |
Targeted push |
No specific rules. |
Network operators using user data and algorithms to push news information and commercial advertisements etc., shall clearly indicate the term “targeted push”, and provide the users with a function to stop receiving the targeted push information. When the user chooses not to receive the targeted push, network operators shall delete the user data as well as any personal information. |
5 |
Automatically synthetized information |
No specific rules. |
Network operators using technologies to automatically synthesize information such as news, blog posts, posts and comments, shall clearly indicate the word “synthesized”. Moreover, such activity shall not be conducted for the purposes of making profits or damaging other person’s interests. |
6 |
Security assessment on important data by government agencies2
|
The assessment applies to cross-border transfer of important data by critical information infrastructure operators. |
The assessment applies to the publishing, sharing, transaction and cross-border transfer of the network operators’ important data3.
|
7 |
Duty to assist government agencies |
Network operators shall provide technical support and assistance to public security authorities and national security authorities in their efforts to maintain national security and investigate crimes. |
In order to perform their duties with respect to national security, social management, economic control and so forth, relevant competent departments of the State Councilmay require a network operator to provide relevant data in its possession in accordance with the laws. |
As for the other compliance requirements, the Data Draft makes extensive reference to the relevant rules (e.g., the rules concerning the collection and use of personal information) under the recommended national standards, and tries to clarify some basic issues (e.g., it provides that “important data normally doesn’t include information related to the production, operation and internal management of businesses, or any personal information”).
Judging from the current text of the draft, Data Security Management Measures probably will impose heavier compliance burdens on network operators. On the whole, however, the data regulatory system established by this legislation is still conducive to data protection and compliance practice. We will continue to watch out for any further developments of this legislation.
For further information, please contact:
Myles Seto, Partner, Deacons
myles.seto@deacons.com.hk