Securiti launches Gencore AI, a holistic solution to build Safe Enterprise AI with proprietary data - easily

View

Here’s What ‘China’s GDPR’ Means For International Businesses

Get Free GDPR Assessment
Published September 22, 2021 / Updated November 11, 2024
Contributors

Anas Baig

Product Marketing Manager at Securiti

Muhammad Faisal Sattar

Data Privacy Legal Manager at Securiti

FIP, CIPT, CIPM, CIPP/Asia

Listen to the content

China has passed the Personal Information Protection Law (the “PIPL”) that came into effect on November 1st, 2021. The PIPL is designed based on comprehensive data privacy laws from all over the world and currently stands at par with major regulations such as the CCPA and GDPR. The PIPL applies to organizations handling the personal information of individuals within the borders of China. It also has extraterritorial application scope.

This article will talk about the potential impact of China’s PIPL on the international market and what steps offshore organizations need to take to ensure compliance with the PIPL.

How China’s PIPL applies to international businesses?

Just like the GDPR, the PIPL also has extraterritorial scope, and companies that are operating from outside of China and dealing with Chinese residents’ personal information may also be required to comply with the PIPL in case one of the following thresholds are met:

  1. Providing products or services to natural persons inside China’s borders.
  2. Conducting analysis of activities of natural persons inside China’s borders.
  3. Other circumstances are provided in laws or administrative regulations.

Please note that Point 3) suggests that PIPL has a broader scope of extraterritorial application than GDPR as it leaves a margin of discretion to China’s public authorities to further extend the applicability of the PIPL extraterritorially. Let’s understand the key impacts of PIPL on international organizations that are subject to PIPL compliance.

Impact of PIPL on International Businesses

There are a number of requirements under the PIPL that organizations will need to fulfill if they fall under the extraterritorial scope of the PIPL. These can be on a global level. The requirements include:

1. Appoint a representative or have a dedicated entity in China:

If you are an international organization that is subject to PIPL, you are required to establish a legal entity in China or appoint a “representative” to be responsible for personal information protection in China.

2. Fulfill processing requirements:

International organizations subject to PIPL should oblige with the following:

  • Oblige with personal information processing principles (lawfulness, collection and purpose limitation, transparency, accountability, and security).
  • Identify a lawful basis of processing to process personal information and sensitive personal information.
  • Inform individuals how their personal information would be processed (notice should be concise, easily accessible, easy to understand, and in clear and plain language).

The PIPL requires organizations to obtain clear, voluntary, and well-informed consent. Following are specific consent requirements for certain situations:

  • Specific opt-in consent is required for sensitive data.
  • Specific consent for the disclosure of data.
  • Organizations handling already disclosed personal information, where there is a major impact on individual rights and interests, shall obtain consent.
  • Collected personal distinguishing identity characteristic information can only be used for the purpose of public security.
  • Parental consent is required for the data of children below the age of 14.

4. Honor cross border data transfer requirements:

Under the PIPL, cross border data transfers are allowed if organizations:

  • Provide notices to individuals, and obtain their specific consent for transfer;
  • Conduct Personal Information Impact Assessment; and
  • Meet at least one of the following conditions:
    • Contract with the foreign organization (Standard contractual clauses).
    • Security assessment (mandatory requirement for CIIOs or organizations that process large volume of information).
    • Personal information protection certificate.
    • Other conditions provided in laws or administrative regulations or by CAC.

If it is necessary to transfer personal information outside of China for international judicial assistance or administrative law enforcement, international organizations must file an application with the relevant competent authority for approval.

5. Conduct personal information impact assessment:

A personal information protection impact assessment is necessary before any data can be transferred cross-border or to third-parties. An international organization must conduct an impact assessment if they are conducting processing in one of the following scenarios:

  • Processing sensitive information.
  • Conducting automated decision-making.
  • Entrusting personal information processing to other data controllers, or disclosing personal information.
  • Providing personal information abroad.
  • Other personal information processing activities.

6. Appoint a Data Protection Officer (DPO):

Foreign organizations that are obligated to comply with the PIPL are required to appoint a DPO in specific situations, depending on the volume of personal information processed. Organizations are required to disclose the methods of contacting the DPO, the names of the officers, and contact methods to the departments fulfilling personal information protection duties and responsibilities.

7. Have a Data Subject Rights Requests Mechanism:

Under the PIPL, individuals are given certain rights which they may exercise at any time by sending a request to the data handler. These rights can be exercised under certain situations and are as follows:

  • Right to be know the data collected.
  • Right to decide, refuse, and limit the handling of their personal data unless legally required.
  • Right to request explanation of how organization is handling their data.
  • Right to access personal information.
  • Right to correct inaccurate data stored.
  • Right to erasure of their data.
  • Right to transfer their personal data to another organization.

The PIPL requires that foreign organizations that are obligated to comply with the requirements of PIPL to offer individuals a mechanism for submitting their data requests. This mechanism must allow organizations to accept and process requests from individuals to exercise their rights.

8. Have a Data Breach Response Framework:

In case of a security breach, the PIPL requires organizations complying with the law to take “immediate” remediation actions and notify the relevant agency and affected individuals. Organizations are required to adopt measures that can effectively avoid security breach risks and promptly notify affected individuals about the data breach.

9. Agreements with third party processors:

Third parties trusted with individuals personal data are required to handle this data in accordance with the PIPL. Organizations are required to form an agreement with these third-parties to ensure that the necessary measures:

  1. To safeguard the security of the personal information they handle and the ability.
  2. To assist organizations in fulfilling the obligations provided in the PIPL are in place.

How will the PIPL be Enforced?

The PIPL is going into effect in a little over a month and at the moment there are only speculations on how the law will be enforced. Some experts believe that the CAC could inspect every website and every data transfer contract to see if it is in compliance with the PIPL. That being said, Peggy Chow, a lawyer specialising in data protection and cybersecurity laws in Asia at Herbert Smith Freehills believes that most organizations will not be ready to be in compliance with the PIPL when the enforcement date comes around. Chow says

"I suspect that some companies won't be ready to comply by then," she says. "It remains unclear how some of the provisions might be enforced, given the lack of detail in some areas – such as what constitutes a 'large' amount of data. Companies should aim to comply with the law as soon as possible, and prepare to adjust as clarity around the legislation evolves."

PIPL Non Compliance Penalties

Under the PIPL and GDPR there are different penalties pertaining to non compliance.

  • Under article 66 and 71 of the PIPL, the PIPL prescribes the following penalties for violations and non-compliance:
    • An organization that refuses to correct the violations may be subject to baseline fines of up to 1 million RMB.
    • If the violation is considered serious, the fine may be increased up to 50 million RMB or 5% of the organization’s annual revenue for the prior fiscal year.
    • The personnel who are directly responsible for the personal information processing may be fined up to RMB 1 million.
    • The PIPL also provides a private right of action to individuals.
  • Under Articles: 83 and 84, recitals: 158 and 149, the GDPR has an upper cap on its monetary penalties, either: 2% of global annual turnover or €10 million, whichever is higher, or 4% of global annual turnover or €20 million, whichever is higher. This depends on the circumstances of each individual case, the type of infringement, and the severity of the violation.

How Securiti Can Help?

Organizations need to start operationalizing their processes if they hope to get compliant with the Chinese PIPL. Securiti brings organizations an all-in-one solution that will allow them to comply with global privacy regulations such as the China PIPL with the help of robotic automation and artificial intelligence.

Visit our website and book a free demo today to learn more about the solution and how it can assist you on the road to compliance.


Frequently Asked Questions (FAQs)

The General Data Protection Regulation (GDPR) is an EU regulation, and while it doesn't directly apply to China, organizations outside the EU processing data of EU residents may be subject to its extraterritorial scope.

There isn't a direct equivalent to the GDPR in China. However, China has enacted the Personal Information Protection Law (PIPL), which shares some similarities with GDPR in terms of protecting individuals' privacy and regulating the processing of personal information.

The new  data protection law in China is the Personal Information Protection Law (PIPL), which became effective on November 1, 2021. It sets out comprehensive rules for the processing of personal information and imposes obligations on organizations to ensure privacy protection.

Both laws protect personal data, but PIPL has stricter rules on storing data in China and limits how companies can send data outside the country.

People in China can ask to see, change, or delete their personal data. They must also be informed about how their data is used.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Take a
Product Tour

See how easy it is to manage privacy compliance with robotic automation.

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View
Spotlight 13:35

The Better Organized We’re from the Beginning, the Easier it is to Use Data

Watch Now View
Spotlight 13:11

Securing GenAI: From SaaS Copilots to Enterprise Applications

Rehan Jalil
Watch Now View
Spotlight 47:02

Navigating Emerging Technologies: AI for Security/Security for AI

Rehan Jalil
Watch Now View

Latest

View More

Accelerating Safe Enterprise AI with Gencore Sync & Databricks

We are delighted to announce new capabilities in Gencore AI to support Databricks' Mosaic AI and Delta Tables! This support enables organizations to selectively...

View More

Building Safe, Enterprise-grade AI with Securiti’s Gencore AI and NVIDIA NIM

Businesses are rapidly adopting generative AI (GenAI) to boost efficiency, productivity, innovation, customer service, and growth. However, IT & AI executives—particularly in highly regulated...

Key Differences from DLP & CNAPP View More

Why DSPM is Critical: Key Differences from DLP & CNAPP

Learn about the critical differences between DSPM vs DLP vs CNAPP and why a unified, data-centric approach is an optimal solution for robust data...

DSPM Trends View More

DSPM in 2025: Key Trends Transforming Data Security

DSPM trends in 2025 provides a quick glance at the challenges, risks, and best practices that can help security leaders evolve their data security...

The Future of Privacy View More

The Future of Privacy: Top Emerging Privacy Trends in 2025

Download the whitepaper to gain insights into the top emerging privacy trends in 2025. Analyze trends and embed necessary measures to stay ahead.

View More

Personalization vs. Privacy: Data Privacy Challenges in Retail

Download the whitepaper to learn about the regulatory landscape and enforcement actions in the retail industry, data privacy challenges, practical recommendations, and how Securiti...

Nigeria's DPA View More

Navigating Nigeria’s DPA: A Step-by-Step Compliance Roadmap

Download the infographic to learn how Nigeria's Data Protection Act (DPA) mapping impacts your organization and compliance strategy.

Decoding Data Retention Requirements Across US State Privacy Laws View More

Decoding Data Retention Requirements Across US State Privacy Laws

Download the infographic to explore data retention requirements across US state privacy laws. Understand key retention requirements and noncompliance penalties.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New