China Issues Draft Measures on Data Security in the Industry and Information Technology Sectors | WilmerHale

The Ministry of Field and Information Technology (“MIIT”), adhering to the first spherical of general…

China Issues Draft Measures on Data Security in the Industry and Information Technology Sectors | WilmerHale

The Ministry of Field and Information Technology (“MIIT”), adhering to the first spherical of general public opinions which concluded on October 30, 2021, revealed a new draft of the Administrative Steps on Information Protection in the Business and Information and facts Technologies Sectors (for Demo Implementation) (draft “Measures”) on February 10 for comment via February 21, 2022.1

As one of the industry regulators specified in the Facts Safety Law (“DSL”), MIIT is obligation-certain to refine the stability administration devices for details in the market and info technology sectors (“IIT Data”). The draft Steps would specify demands for info security by category and classification and for the administration of Vital Facts outline the scope of MIIT’s duties and individuals of its nearby counterparts (each individual a “Local Regulator”) and established out the prerequisites for entire lifestyle-cycle information safety security, all of which are reflected in the 41 content throughout eight chapters of the draft Steps.

Scope of Application

The draft Actions initially established forth significant definitions and the bounds for software. The draft Actions outline IIT Data to include things like business knowledge, telecommunications knowledge and radio data. Industry Facts, in change, would imply details generated and collected in the course of R&D and style and design, producing, enterprise functions and management, servicing, and platform operation in different field fields and sectors (Posting 3, para 1). IIT Facts processors (“Data Processors”) would contain industrial enterprises, software program and IT company enterprises, telecommunications service operators with telecommunications business working licenses, as perfectly as radio frequency and station entity users (Report 3, para 2). Administration of the protection of IIT Data involving individual data, armed service facts, condition secrets, cryptography, governing administration affairs, defense technologies and tobacco would mainly be controlled individually pursuant to sector-particular laws (Posts 37-40).

Administration by Classification and Classification

In accordance with the necessities to carry out the DSL, MIIT would formulate criteria and specifications for information category and classification, identification and verification of Significant Info and Main Details, and classified security of Essential Info and Main Details which are to be subject to priority safety (Post 7).

IIT Facts would be classified as, but not limited to: R&D info, manufacturing and functioning facts, management details, routine maintenance data, and small business services data (Report 8).

Important Facts and Main Details

Dependable with the language of the DSL (Report 8), IIT Data would be divided into three types primarily based on the stage of sensitivity: everyday knowledge (i.e., knowledge that does not fall into both of the subsequent two categories), Critical Info and Core Data.

The draft Actions outline “Important Data” in the IIT sectors as details for which the diploma of hazard would fulfill any of the adhering to requirements (Posting 10):

  1. Poses a menace to political, territorial, armed service, financial, cultural, social, scientific and technological, electromagnetic, network, ecological, resource, or nuclear security, or impacts any of these kinds of crucial spots linked to countrywide safety as abroad passions, biology, room, polar regions, deep seas, and synthetic intelligence
  2. Seriously influences the growth, output, operational or economic pursuits of an IIT sector
  3. Results in main info security incidents or generation protection incidents, has a significant impression on the community desire or the legit legal rights and interests of individuals or companies, and/or has a massive adverse social impact
  4. The cascading outcome brought about by the hurt of this sort of details is noticeable, the scope of affect requires numerous industries, areas, or multiple enterprises in the field, or the effect lasts for a prolonged time, resulting in critical effects on the improvement of the marketplace, technological development, and industrial ecology or
  5. Other important data as assessed and identified by MIIT.

The draft Measures determine “Core Data” in the IIT sectors as knowledge for which the degree of hazard meets any of the following problems (Posting 11):

  1. Poses a significant danger to politics, territory, armed forces, financial system, society, culture, science and technologies, electromagnetic, community, ecology, resources, and nuclear security, or has a really serious influence on these kinds of essential places connected to countrywide stability as overseas pursuits, biology, room, polar regions, deep sea, and artificial intelligence
  2. Has a significant effect on IIT and its important top enterprises, significant info infrastructure or significant resources
  3. Leads to significant injury to industrial production and procedure, telecommunications networks (together with World wide web) operation and services, and radio enterprise, benefits in substantial-scale shutdowns, massive-scale radio enterprise interruption, substantial-scale network and services paralysis, and reduction of a large quantity of company processing abilities or
  4. Other main data as assessed and determined by MIIT.

Catalogue of Important Data and Main Information

The draft Steps would need Information Processors to make filings with their Community Regulators regarding their Significant Knowledge and Main Facts. The filings would want to include things like, with no limitation, the classification, classification and dimensions of information reason and techniques of processing scope of use responsible parties shared functions cross-border transfer and safety protection measures, but not the info itself (Article 12, para 1). Info Processors would receive receipts for their filings if the articles of the filings content these demands (Report 12, para 2). Facts Processors would also be required to report a 30% or greater transform of Crucial or Main Knowledge in phrases of category or dimension to the Local Regulator (Post 12, para 3).

As a unique element in the industrial improvement clause, the draft Measures would offer that Info Processors are expected to comply with social morality and ethics (Post 5, para 2).

Entire Daily life-Cycle Protection Administration

Under the draft Steps, Facts Processors would be the key functions accountable for ensuring the security of their data and would be expected to formulate procedures and operating processes with respect to protecting these types of data in link with data collection, storage, use, processing, transmission, provision and disclosure. This obligation would contain in unique:

Cross-border transfer

Vital Info and Main Info collected and generated in China would be needed to be saved in China as demanded by applicable law or laws this sort of as the DSL. This is the data localization necessity. Vital information will be subject to a safety assessment in circumstance of cross-border transfer (Short article 21, para 1). Core Data could not depart China. The draft Steps would further offer that Data Processors may well not present IIT sector info stored inside China to foreign sector, telecommunications or radio legislation enforcement entities devoid of MIIT approval (Short article 21, para 2). These prerequisites are dependable with the DSL.

It is value noting that, when it arrives to cross-border data sharing with non-governing administration parties abroad, only Essential Info and Core Knowledge are subject matter to the earlier mentioned-mentioned compliance specifications and constraints. When transferring regular IIT Facts overseas, Data Processers are not needed to conduct a security assessment. In other words, Chinese subsidiaries and joint ventures of multinational IIT providers can freely transfer everyday facts to their head workplaces, but will want to conduct a stability assessment when transferring Essential Information, and simply cannot transfer Main Facts.

This means that multinational IIT firms will have to have to diligently distinguish involving everyday data and Crucial/Core Facts. Most of the details linked to everyday functions should really represent standard info. Numerous multinational IIT corporations have small accessibility to Critical/Main Data simply because of limits on overseas expense in these sectors (e.g., telecommunications and radio broadcasting). Multinational IIT companies need to also consider precaution not to inadvertently get Significant/Main Data from other companies, particularly condition-owned enterprises, by stipulating these information transfer constraints in contractual phrases with these types of other corporations. In addition, multinational IIT companies may not transfer any IIT Knowledge to the IIT regulators in their residence countries, this sort of as the Federal Communications Commission, Federal Trade Commission and Securities and Trade Fee, ahead of getting acceptance from MIIT.

Protection assessment

Vital Facts and Main Knowledge Processors would be necessary to perform security assessments at minimum the moment a year and deliver the assessment stories to the Neighborhood Regulator (Report 31). Facts Processors for standard details are inspired to perform self-safety assessments on a normal foundation.


Providers that violate the Measures will be penalized pursuant to the DSL and Cybersecurity Law. Penalties contain warnings, fines, confiscation of unlawful proceeds, and suspension or revocation of relevant licenses and permits. Felony legal responsibility may possibly also be imposed if the violation constitutes a crime.

Regular with the DSL, the draft Measures existing bias from cross-border facts transfer which is in stress with China’s commitments beneath the WTO’s Basic Settlement on Trade in Expert services (GATS) and China’s recently mentioned drive to turn out to be a celebration to the Extensive and Progressive Settlement for Trans-Pacific Partnership (CPTPP) and the Electronic Economy Partnership Arrangement (DEPA), two Asia-Pacific regional trade agreements with robust disciplines on facilitating electronic trade, which include cross-border transfers of info.

Footnotes –