The draft legislation provides further guidance on the regulations provided in the recent cybersecurity law, including definitions and details on the security assessments required for cross-border data transfers.
China’s recently enacted Cybersecurity Law (CL), effective June 1, 2017, requires that personal information and important data collected and produced by critical information infrastructure (CII) operators in China be stored in China. The CL also requires that security assessments be performed before personal information and important data are provided to any entity or individual outside of China (Cross-border Data Transfer). Along with the CL, China has published other draft legislation addressing the requirements for local storage and Cross-border Data Transfer and soliciting public comments. The new draft implementing rules include
These drafts provide definitions and the scope of key concepts under the CL as well as more details regarding the security assessment required for Cross-border Data Transfer. Multinational corporations collecting and transferring data from China should consult this draft legislation and understand the legislative trends in order to prepare for the specific steps that must be taken regarding the storage and transfer of data once the legislation comes into effect. In this LawFlash we set out the highlights of this draft legislation and compare them to the CL.
While the CL only applies the local storage and security assessment requirements for the Cross-border Data Transfer of “personal information” and “important data” to CII operators, the current draft of the Assessment Measures states that all “network operators” are generally obliged to conduct a security review of Cross-border Data Transfers if the data contains “personal information” or “important data”; it also says that such data must be stored inside China. The draft Assessment Guidelines follow the Assessment Measures and provide the security assessment process to be used for all “network operators.”
However, in May 2017, during an official press briefing on the implementation of the CL, the chief of the Network Security Coordination Office of the CAC clearly stated that the local storage and security assessment requirements for Cross-border Data Transfer apply only to CII operators, so this will remain uncertain until the Assessment Measures have been finalized and published.
Definition of CII
The CL defines CII as “infrastructure that, in the event of damage, loss of function, or data leak, might seriously endanger national security, national welfare or the livelihoods of the people, or the public interest.” The CL also provides examples of CII, including network operators in the areas of public communications, information services, energy, transportation, water utilities, finance, public services, and e-government, but leaves the specific definition of CII to the regulations to be made by the State Council.
The CII Regulation defines the scope of CII by listing operators in certain industries, including
We note that multinational companies in the manufacturing, IT, food, healthcare, and medical sectors can be included in such a broad definition if regulators decide that any data leakage or malfunction of its information system may affect national security, national welfare, or the people’s livelihood and public interest.
Definition of “network operator”
The CL’s definition of “network operator” is much broader compared to its definition for CII operators. Network operators include “owners and administrators of networks as well as network service providers.” Multinational corporations that use certain networks in China to transmit data offshore, including through the internet and email, could potentially be deemed “network operators.”
The local storage and security assessment requirements for Cross-border Data Transfer under the CL protect “personal information” and “important data.” The ongoing legislative efforts further define “personal information” and “important data” and provide detailed protective measures.
Definition of “personal information”
The CL’s definition of “personal information” includes the name, date of birth, ID number, personal biological identification information, address, and telephone number of a natural person, but is not limited to the foregoing. The Assessment Guidelines specifically add accounts and passwords, financial status, location, and behavioral information to the CL’s definition. Considering that the CL’s definition is not limited to the listed types of personal information, the Assessment Guidelines’ definition remains consistent with the CL, so it is possible that regulators may treat location and behavioral information as “personal information” in the future.
Consent required for the cross-border transfer of personal information and exceptions
The Assessment Measures require that a network operator inform the owners of personal information about the purpose, scope, content, recipient, and recipient’s country related to the cross-border transfer of the information, and the network operators must obtain the owners’ consent for the cross-border information transfer to take place.
The Assessment Guidelines do provide an exception to the principle of obtaining consent: where there is an emergency threatening a citizen’s life or the security of their property, consent need not be obtained.
Notably, the CL provides an exception for personal information that has been irreversibly processed so as to prevent a specific person from being identified. The CL allows such processed information to be disclosed to others without receiving the owner’s consent. Comments suggest that this exception was designed for the convenience of developing big-data and cloud businesses in China.
Businesses have also requested that inferred consent be recognized under certain circumstances in the Assessment Measures, including where international phone calls are made, emails and instant messages are sent to individuals or organizations overseas, and cross-border e-commerce transactions and other activities are initiated by data subjects. It is uncertain whether such an exception may be included in the Assessment Measures.
Definition of “important data”
The CL does not define “important data.” The Assessment Measures define “important data” as data closely related to national security, economic development, and public interest. The Assessment Guidelines provide a more specific definition of “important data”:
[D]ata (including original and derived data) collected by the Chinese government, enterprises, and individuals within the territory of China, which does not involve state secrets, but which is closely related to national security, economic development, or the public interest, and when disclosed without authorization, lost, used abusively, tampered with or destroyed, or after aggregation, or integration and analysis, may cause serious consequences related to national security, national economic and financial security, social public interests and the legitimate rights and interests of individuals.
The Assessment Guidelines provide comprehensive examples of important data in 27 industries and sectors, as well as a catchall category for any other data in any other area that may affect the peace, prosperity, or social welfare of China. The Assessment Guidelines also specify the industry regulators for these 27 industries and provide that the definitions, scope, and identifying criteria of important data in these key industries may be further specified by the competent industry regulators.
For example, under the “Demographic Health” category, the Assessment Guidelines list eight types of important data, including
According to the Assessment Measures and Assessment Guidelines, industry regulators, instead of the CAC, will be responsible for the security assessment of the Cross-border Data Transfer. The CAC will lead and coordinate the efforts of the security assessment.
Per the Assessment Measures and Assessment Guidelines, the security assessment can be conducted by network operators themselves, subject to industry regulators’ periodic examinations. However, security assessments should be conducted by industry regulators for the following transfers:
The Assessment Measures also provide the following circumstances where data cannot be transferred abroad:
The Assessment Guidelines provide more details about the procedures used for both self-assessment and assessment by industry regulators, including the assessment process, key assessment factors, and an assessment methodology. Factors that network operators must take into account include the type and degree of sensitivity of the information; the volume and scope of the information; whether or not the information has been desensitized; the possible effects of its transfer; its effect on state security and the public interest; safety precautions taken by the sender; safety capabilities of the recipient; and the local legal climate of the recipient.
Although the Assessment Measures, Assessment Guidelines, and CII Regulation have not yet been formally promulgated, they provide detailed practical guidance regarding what businesses are categorized as CII operators, the types of data subject to local storage and security assessment requirements for Cross-border Data Transfer, and the manner in which the security self-assessments and security assessments by regulators will be conducted. However, there will still be uncertainty regarding the issues discussed above until these draft regulations are finalized. Companies in China should remain alert and aware of legislative developments and be prepared to take the necessary steps for compliance with the new rules.
If you have any questions or would like more information on the issues discussed in this LawFlash, please contact the author, Todd Liao.
 Art. 37, CL.
 Draft circulated by the Cyberspace Administration of China (CAC) on April 11, 2017.
 Draft circulated by the National Information Security Standardization Technical Committee on May 27, 2017. Notably, the Assessment Guidelines are classified in GB/T, indicating that the Assessment Guidelines are advisory standards to be voluntarily adopted by enterprises after their promulgation; nevertheless, they reflect the standards that are likely to be adopted by regulators for security assessments in the future.
 Draft circulated by the CAC on July 10, 2017.
 Art. 2, Assessment Measures.
 Art. 31, CL.
 Art. 18, CII Regulation.
 Art. 76, CL.
 Art. 76, CL and Art. 17, Assessment Measures.
 Section 3.3, Assessment Guidelines.
 Art. 4, Assessment Measures.
 Section 5.1, Assessment Guidelines.
 Art. 42, CL.
 Art. 17, Assessment Measures.
 Ex. A, Assessment Guidelines.
 Ex. A, Assessment Guidelines.
 Art. 18, Exhibit A, Assessment Guidelines.
 Arts. 5–6, Assessment Measures.
 Art. 9, Assessment Measures.
 Art. 11, Assessment Measures.