Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

What is China’s Data Security Law?

Contributors

Anas Baig

Product Marketing Manager at Securiti

Muhammad Faisal Sattar

Data Privacy Legal Manager at Securiti

FIP, CIPT, CIPM, CIPP/Asia

Published August 9, 2021 / Updated June 26, 2025

Listen to the content

In China, the following are three main laws that cover the data privacy and data security regime:

The focus of this article is on the DSL that was promulgated to standardize data processing activities, ensure data security, promote data development and utilization, and protect the legitimate rights and interests of individuals and organizations.

Scope of Application and Extraterritorial Effect of DSL:

The DSL applies to and regulates data processing activities by organizations and individuals, and security supervision of such activities within the territory of China. The DSL also regulates data processing activities conducted outside of China that harm China’s national security or the public interest, or the legal interests of citizens and organizations in China. It would be right to state that DSL has extensive and extra-territorial application. It imposes a number of obligations on organizations and individuals even those that are not based in China regarding data categorization and classification, data risk controls and risk assessments, cross-border data transfers, and data export controls.

The DSL applies to data recorded in electronic and other forms including digital and cyber information, and information recorded in other forms such as paper records. Data processing activities regulated by DSL include, without limitation, the collection, storage, use, processing, transmission, provision, or disclosure of data.

Organizations and individuals need to understand and fulfill the following requirements of the DSL in order to avoid unnecessary compliance risks and penalties:

1. Data Categorization and Classification Under DSL:

The DSL categorizes data into two main classes: National Core Data, and Important Data. The DSL prescribes stricter regulation and protection of the “National Core Data” that covers data related to national security, the lifeline of the national economy, and people’s livelihoods and that is important to major public interests.There is no clarity on  which category of the data will fall under the important data under the DSL at the moment. The Chinese government will set official criteria for the industry specific important data rather than allow business operators to decide the scope of important data at their discretion. However, under the CAC Draft Data Security Administration Guidelines published in May 2019, important data refers to data that, if leaked, may directly affect national security, economic security, social stability, public health, and safety.

As described under Article 21 of the DSL, the government of China will establish a hierarchical data classification management and data protection system focused on the importance of different types of data to the national economy, national security, and public interest. The relevant departments which shall be responsible for the development of the hierarchical categorization and multilevel data security schemes are as follows:

  1. The national data security coordination mechanism will coordinate with the relevant departments to formulate an important data catalogue at the national level.
  2. Different administrative regions and regulatory authorities of different industrial sectors (the relevant departments) will formulate their own specific important data catalogues with protection requirements.This process involves relevant departments formulating data classification standards and detailed rules for important data identification and declaration within their specific industries and fields, like the "Industrial Field Important Data Identification Guide" or the "Telecommunications Field Important Data Identification Guide."

This will affect how organizations structure their own data classification programs regarding important data and multilevel data protection schemes to protect certain categories of information.

2. Cross Border Data Transfers and Data Localization:

Critical Information Infrastructure (the “CII”) refers to information infrastructure in important industries and sectors (such as information service, public service, and e-government) and other information infrastructure that, if leaked, may severely threaten the national security, national economy, people’s livelihood, and public interests.

The DSL has different cross-border data transfer requirements for the CII operators from those of non-CII operators. Article 31 of the DSL provides that CII operators must comply with data localization and cross-border data transfer measures prescribed under the CSL and subsequent measures. Under the CSL, CII operators are required to ensure that important data, collected or generated in China, is stored within China. CIIs operators can only transfer data out of China when:

  1. There is a genuine business necessity;
  2. The network operator conducts a security assessment in accordance with the measures jointly defined by China’s Cyberspace Administration (the “CAC”) bodies and the relevant departments under the State Council; and
  3. The CII obtains the consent of the concerned individual to transfer personal information outside of China (unless such consent is implied because the individual is the one sending such information).

Whereas all non-CII operators transferring "important data" outside of China will  be required to comply with the rules to be formulated by the CAC and authorities under the State Council.Moreover, once data is identified as "important," an exit security assessment must be declared within two months and its results must be complied with to ensure secure cross-border data flow. This assessment ensures the data transfer will not compromise national security or public interests.

Most importantly, the DSL explicitly prohibits organizations and individuals from providing any data stored in China to foreign law enforcement authorities or other foreign judicial departments without obtaining prior approval from the Chinese government. Organizations need to understand this obligation would significantly impact their cross-border data transfers for the purposes of legal proceedings.

3. Data Security Management System:

The DSL requires that organizations must adopt technical, organizational, and other data security measures to safeguard the protected data categories. Organizations must establish and complete a data security management system. The DSL also imposes obligations on organizations to deploy data security training and organizations are required to designate individuals and departments responsible for data security.

As per Article 29 of the DSL, organizations should also strengthen their risk monitoring measures and take timely remedial measures in the event any security flaw, vulnerability, or other risk is discovered.

Furthermore, under the DSL, organizations that are processing data through the internet are required to comply with the Multi-level Protection Scheme ("MLPS"), a classification system for companies physically located in China and adopted under the CSL. Under MLPS, organizations should:

  1. Ensure their networks are protected against interference, damage, or unauthorized access, and
  2. Classify their infrastructure and application systems in five separate protection levels and fulfill protection obligations as described under Article 27 of the CSL.

4. Risk Assessments:

Under the DSL, China will establish a uniform, authoritative system for data security risk assessment reporting. Article 30 of the DSL imposes an obligation on all organizations to periodically carry out risk assessments of their data handling activities and practices for the handling of "important data". Organizations are also required to send these risk assessments to the relevant regulatory departments. Organizations should include the following information in such risk assessment reports:

  1. The categories and quantities of important data processed;
  2. How the data processing activities are carried out; and
  3. Relevant data security risks and response mechanisms.

5. Data Incident Response and Notifications:

Similar to data incident response obligations under the CSL, the DSL also requires organizations to have incident contingency planning. As per Article 29 of the DSL, organizations have the obligation to immediately remediate the incident, promptly notify relevant individuals, and report such data security incidents to the regulatory department(s). As required under Article 23 of the DSL, a national data security emergency response mechanism will be established by the Chinese government requiring regulatory departments to initiate emergency response plans in the event of a data security incident.

6. Data Trading Intermediary Services Obligations:

The DSL requires that organizations engaged in data trading intermediary services shall require the data provider to fulfill the following requirements:

  1. Explain the source of the data;
  2. Examine the identity of both parties to the transaction; and
  3. Keep audit and transaction records when providing services.

7. Other General Obligations:

  • Organizations and individuals are required to adopt a legal and legitimate way to collect data, and should not steal or obtain data in other illegal ways.
  • Where laws and administrative regulations contain provisions on the purposes and scope of data collection and use, organizations must collect and use data within the purposes and scope prescribed by laws and administrative regulations.

Penalties for Non-Compliance:

Chapter VI of the DSL provides that organizations and individuals who fail to comply with DSL requirements may face enforcement notices/warnings and fines up to RMB 1 million in severe cases, as well as sanctions with very significant operational consequences such as suspension of business, etc.

Individuals and organizations that fail to meet data security protection obligations of the DSL may be subject to an order to correct, a warning, and/or a fine of not less than RMB50,000 but not more than RMB500,000. Furthermore, criminal liability may be imposed if a violation of the DSL amounts to a criminal offense; such criminal liability may extend to individuals or directors of organizations.

The DSL also provides individuals a right to complain and bring civil claims against any non-compliance with the DSL.

How Securiti Can Help

Global privacy regulations are encouraging organizations to be responsible custodians of their consumers' data and automate privacy and security operations. In order to operationalize  compliance, organizations need to incorporate robotic automation in order to keep up with the current digital landscape. Several organizations offer software that helps companies comply with global privacy regulations, but these solutions have been restricted to mainly process-driven tasks or rudimentary data-driven functions.

Securiti combines reliability, intelligence, and simplicity, working on the PrivacyOps framework to allow end-to-end automation for organizations. Securiti can help you stay compliant with China’s Data Security Law, as well as other privacy and security regulations all over the world. See how it works. Request a demo today.

Frequently Asked Questions (FAQs)

The Data Security Law in China governs the creation, use, storage, transfer of data in China. More specifically, it is focused on protecting national security and public interest. It also sets requirements for data processing and cross-border data transfers.

The Chinese cybersecurity law includes various regulations aimed at safeguarding China's cyberspace and network security. The Data Security Law is a component of this broader framework, focusing specifically on data protection and security measures.

China has implemented a comprehensive system of internet censorship and content control called the Golden Shield Project and colloquially referred to as the "Great Firewall of China." This system restricts access to certain websites and platforms and monitors online content for compliance with government guidelines. It also includes restrictions on virtual private networks (VPNs) and other tools used to bypass internet censorship.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox



More Stories that May Interest You

Take a
Product Tour

See how easy it is to manage privacy compliance with robotic automation.

Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Spotlight 13:32
Ensuring Solid Governance Is Like Squeezing Jello
Watch Now View
Latest
View More
Securiti and Databricks: Putting Sensitive Data Intelligence at the Heart of Modern Cybersecurity
Securiti is thrilled to partner with Databricks to extend Databricks Data Intelligence for Cybersecurity. This collaboration marks a pivotal moment for enterprise security, bringing...
Shrink The Blast Radius: Automate Data Minimization with DSPM View More
Shrink The Blast Radius
Recently, DaVita disclosed a ransomware incident that ultimately impacted about 2.7 million people, and it’s already booked $13.5M in related costs this quarter. Healthcare...
View More
All You Need to Know About Ontario’s Personal Health Information Protection Act 2004
Here’s what you need to know about Ontario’s Personal Health Information Protection Act of 2004 to ensure effective compliance with it.
View More
What is Trustworthy AI? Your Comprehensive Guide
Learn what Trustworthy AI means, the principles behind building reliable AI systems, its importance, and how organizations can implement it effectively.
Maryland Online Data Privacy Act (MODPA) View More
Maryland Online Data Privacy Act (MODPA): Compliance Requirements Beginning October 1, 2025
Access the whitepaper to discover the compliance requirements under the Maryland Online Data Privacy Act (MODPA). Learn how Securiti helps ensure swift compliance.
Retail Data & AI: A DSPM Playbook for Secure Innovation View More
Retail Data & AI: A DSPM Playbook for Secure Innovation
The resource guide discusses the data security challenges in the Retail sector, the real-world risk scenarios retail businesses face and how DSPM can play...
DSPM vs Legacy Security Tools: Filling the Data Security Gap View More
DSPM vs Legacy Security Tools: Filling the Data Security Gap
The infographic discusses why and where legacy security tools fall short, and how a DSPM tool can make organizations’ investments smarter and more secure.
Operationalizing DSPM: 12 Must-Dos for Data & AI Security View More
Operationalizing DSPM: 12 Must-Dos for Data & AI Security
A practical checklist to operationalize DSPM—12 must-dos covering discovery, classification, lineage, least-privilege, DLP, encryption/keys, policy-as-code, monitoring, and automated remediation.
The DSPM Architect’s Handbook View More
The DSPM Architect’s Handbook: Building an Enterprise-Ready Data+AI Security Program
Get certified in DSPM. Learn to architect a DSPM solution, operationalize data and AI security, apply enterprise best practices, and enable secure AI adoption...
Gencore AI and Amazon Bedrock View More
Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock
Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...
What's
New