Net is Tightening, Revised Cybersecurity Review Measures Coming
#China
Within the legislation structure of China’s Cyber-security, Data security, and Personal Information Protection, the Measures for Cybersecurity Review (“Measures”), with a capacity of merely 22 articles, is the administrative regulations that will directly guide and govern the security review procedures based on the PRC Cybersecurity Law. Therefore it has a significantly important hierarchic and effectual level in the legislative structure and directly connects to the administration and law enforcement practice. As for the spirit and underlying purpose of this legislation, important considerations have been granted to national security.
Cybersecurity Review Measures (Revised Draft for Comments)
On July 12th, 2021, for the first time since the taking effect of the PRC Measures for Cybersecurity Review (effective from June 1st 2020), the State Internet Information Office released the Cybersecurity Review Measures (Revised Draft for Comments) (hereinafter referred to as the “Draft”).
The recent incident concerning DIDI and data security issues has had a great impact on this Draft.
More specifically, on June 11th, 2021, DIDI Chuxing, a unicorn enterprise that had merged with Uber and enjoying a monopoly in the Chinese marketplace, officially submitted an SEC filing for an IPO in the United States. On June 30th, only 20 days after the submission, DIDI was successfully registered and listed on the New York Stock Exchange. Then, on July 2nd, 2021, The China National Network Information Office launched a Cybersecurity review on DIDI’s activity in China, requiring all DIDI’s apps to be taken off of online App stores for rectification, and stopping the registration of new users during the review period on the grounds that DIDI was suspected of collecting and using private information in serious violation of laws and regulations. As of the date of this article, the normal operation of DIDI has not been restored.
The review of DIDI is the first publicly launched cybersecurity review process by the Chinese authorities since the Cybersecurity Law has taken effect. The disputes regarding data security and transferring data overseas caused by DIDI’s alleged package-selling of user data to the United States was very likely to be the direct reason why DIDI was subject to the review.
Modifications on the Draft
Article 6 of the Draft directly adds: “An operator applying for a listing overseas must apply to the CRC for a cybersecurity review if it is in possession of the personal information of more than 1 million users.” In the case of DIDI’s aforementioned incident, it is difficult not to see the similarities to their current position and the wording of this draft article).
In addition, the Draft also directly extended the special review procedure to three months, which was originally meant to be completed within 45 days. This is applicable as the relevant authorities have since gained first-hand practical experience in the cybersecurity review case of DIDI.
Furthermore, Article 10 of the Draft refines the Cybersecurity review factors from “The risk of theft, leakage, corruption of the key data” to “The risk of theft, leakage, corruption or illegal use or export of any critical or key data or a large amount of personal information”. Personal information and user data are to be included in the review and protection objects. The Draft has shown a clear direction for how protection wil be carried out, which will provide a practical introduction for the start of the Cybersecurity review procedure.
Conclusion
Although it is only a revised Draft released at this time, without certainty whether this version will be subject to further modifications in subsequent deliberations, it can be perceived from this Draft that the DIDI incident has made the Chinese government aware of potential national security problems behind the user data held by the Internet giants, and shows the urgency and importance the government attaches to monitoring the security of such data going abroad.
Alongside the entry into force of the Data Security Law on September 1st, 2021, the introduction of other subsequent relevant laws, regulations, and measures, and the overall turbulence occurring within the international political environment, the Chinese government may wish to devote an unprecedented level of attention to online security. Companies should therefore be well prepared for higher threshold of supervision in this area in the near future.
We at D’Andrea & Partners Legal Counsel constantly monitor the latest developments in the Chinese market. Please feel free to contact us at for more information: info@dandreapartners.com.
Preface As the leader of China’s economic development and the forefront of reform and opening up, Shanghai has always attached great importance to attracting foreign investment. Recently, the Shanghai Government deliberated and adopted a series of policy measures to promote the sustained economic recovery, and at the same time actively responded to the Action Plan
In recent years, the winter sports industry has seen unprecedented global growth, particularly with the successful hosting of the Beijing 2022 Winter Olympics and the upcoming Milan-Cortina 2026 Winter Olympics. These events have not only brought significant attention to winter sports but have also spurred a surge in international investment and collaboration. Legal sectors such
Introduction With the continuous improvement of labor laws and regulations, open-ended labor contracts, as a form of contract that provides stronger protection for the rights and interests of employees, have attracted increasing attention. In particular, whether employees have the right to demand the signing of open-ended labor contracts after two consecutive fixed-term labor contracts has
#China
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.