Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

China’s Draft Measures for the Protection and Certification of Outbound Personal Information

Contributors

Asaad Ahmad Qureshy

Associate Data Privacy Analyst at Securiti

Salma Khan

Data Privacy Analyst at Securiti

CIPP/Asia

Listen to the content

Introduction

On January 3, 2025, the Cyberspace Administration of China (CAC) released the Draft Measures for the Protection and Certification of Outbound Personal Information (Draft Certification Measures) for public consultation. These Draft Certification Measures, aligned with the Personal Information Protection Law (PIPL) and related regulations, aim to standardize the certification and secure cross-border transfer of personal data. Under Article 38 of the PIPL, businesses transferring personal data overseas must meet strict requirements, including passing a security assessment, signing a standard contract, or obtaining certification. The Draft Certification Measures expand on the certification mechanism, providing a pathway for non-CII businesses to comply with cross-border data transfer rules. They do not modify the exemptions established under the CAC’s Regulations on Promoting and Regulating Outward Data Flows (Regulation), issued in March 2024. Businesses will continue to be exempt from any Cross-Border Data Transfer (CBDT) legal mechanisms if their data transfer scenarios fall within the scope of the relaxed provisions of the Regulation.

Applicability

Territorial Scope

As per Article 3 of the Draft Certification Measures, there are specific scenarios where personal information is transferred outside China for legitimate business or operational needs, including:

  • Direct Transfer of Data:
    • A Chinese business sends personal information to an overseas recipient for processing.
    • Example: A Chinese e-commerce business shares customer data with an overseas provider for order fulfillment.
  • Indirect Access to Data Stored in China:
    • Personal data stays in China, but entities outside can access it for various purposes like querying or exporting.
    • Example: A global marketing team accesses a Chinese business’s customer database remotely for analysis.
  • Other Cross-Border Processing Activities:
    • This covers situations where data about Chinese individuals is processed abroad, even if not transferred from within China.
    • Example: A foreign tech business processes data from Chinese users via an app hosted outside China.
      Material Scope

Material Scope

The Draft Certification Mechanism does not apply to:

  • Transfers of important data.
    • In the context of Data Security Law (DSL) and PIPL, "important data" is a term used to signify data that, if leaked, tampered with, lost, or illegally accessed, could pose risks to national security, economic interests, public interests, or other significant societal interests.
  • Data transfers by Critical Information Infrastructure (CII) operators
    • The Cybersecurity Law of China (CSL) defines CII as information infrastructure that, if destroyed, disabled, or exposed, could severely harm national security, the national economy, people's livelihoods, or the public interest.

It is intended for non-CII businesses transferring:

  • Sensitive personal data of fewer than 10,000 individuals
  • Non-sensitive personal data of between 100,000 and 1 million individuals

These transfers must have occurred since January 1 of the current year.

Personal Information Exit Protection Certification

The newly introduced  Draft Certification Measures ensure personal information transferred outside China complies with the PIPL. Under the Draft Certification Measures, CBDT is conducted by professional certification institutions that are:

  • Established under Chinese law (specifically PIPL) and;
  • Approved by the National Market Supervision and Administration Department

The certification confirms that outbound data transfers are secure and compliant with Chinese regulations, ensuring proper safeguards are in place to protect personal data.

Certification for Domestic Processors

The personal information certification under the Draft Certification Measures process for outbound data transfers is voluntary. Businesses can choose to seek certification to meet the requirements outlined in Article 3 of the PIPL. The certification process is designed to align with principles of voluntariness, marketization, and socialization, allowing flexibility for businesses to comply based on their specific needs.

Certification for Foreign Processors

Foreign personal information processors must collaborate with a designated local representative or a specialized institution within China to apply for certification. This ensures foreign entities are subject to Chinese legal and regulatory frameworks. To qualify, foreign applicants must:

  • Collaborate with a designated local representative or a specialized institution established within China for assistance.
  • Comply with the PIPL and related regulations.
  • Submit to supervision and management by Chinese authorities.
  • Undergo ongoing monitoring by professional certification institutions for the duration of their certification period.

Key Criteria for Certification

Article 10 of the Draft Certification Measures specifies the factors certification bodies will assess during the certification process:

  1. Legality, legitimacy, and necessity
  2. Impact assessment of the recipient’s jurisdiction
  3. Compliance with Chinese standards
  4. Legally binding agreements
  5. Organizational and technical safeguards
    1. Certification bodies will review whether the applicant has sufficient organizational frameworks, management systems, and technical measures to ensure personal data security.
  6. Other necessary evaluations
    1. Certification agencies retain discretion to conduct additional assessments, based on the specific requirements of the applicable certification standards.

Formulation of Standards and Supervision

Under the Draft Certification Measures:

  • The State Network Information Department (CAC), in coordination with other relevant agencies, is responsible for creating the standards, technical regulations, and assessment procedures for personal information certification.
  • The State Market Supervision and Administration Department, together with the CAC, will develop implementation rules, including guidelines for the certification certificates (both physical and digital) and logos.

Penalties and Administrative Measures

If cross-border personal information transfer activities threaten national security, and public interests, or seriously harm individuals' data and rights, certification agencies can report such activities to the National Network Information Department (CAC) and other relevant authorities.

If certified processors violate certification standards or operate outside their approved scope, certification agencies can suspend or revoke certificates and publicly announce the changes. The CAC and other authorities can also intervene during supervision, requiring cooperation from the certifying agency. Certification details, including certificate numbers, processor names, and status changes (e.g., suspension or revocation), must be submitted to the National Public Information Platform within five working days.

The CAC and the State Market Supervision and Administration Department oversee certification activities, conducting spot checks and evaluations. Agencies found violating regulations may face penalties, including warnings, required corrections, or suspension and revocation of qualifications.

Certification records obtained through false information may result in the revocation of certification and additional penalties. Organizations or individuals can report violations to relevant authorities, who may intervene if significant risks or security incidents occur.

How Securiti Can Help

Navigating evolving privacy requirements can be complex. Fortunately, Securiti’s suite of automation modules offers a comprehensive solution for organizations seeking to ensure compliance with the China’s evolving regulatory landscape.

Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. Securiti provides unified data intelligence, controls, and orchestration across hybrid multi-cloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance.

Request a demo to learn more.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 10:35

There’s Been a Material Shift in the Data Center of Gravity

Watch Now View
Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View

Latest

View More

From Trial to Trusted: Securely Scaling Microsoft Copilot in the Enterprise

AI copilots and agents embedded in SaaS are rapidly reshaping how enterprises work. Business leaders and IT teams see them as a gateway to...

The ROI of Safe Enterprise AI View More

The ROI of Safe Enterprise AI: A Business Leader’s Guide

The fundamental truth of today’s competitive landscape is that businesses harnessing data through AI will outperform those that don’t. Especially with 90% of enterprise...

Understanding Data Regulations in Australia’s Telecom Sector View More

Understanding Data Regulations in Australia’s Telecom Sector

1. Introduction Australia’s telecommunications sector plays a crucial role in connecting millions of people. However, with this connectivity comes the responsibility of safeguarding vast...

Understanding Saudi Arabia’s Global AI Hub Law View More

Understanding Saudi Arabia’s Global AI Hub Law

Gain insights into Saudi Arabia’s Global AI Hub Law - a legal framework for operating various types of data centers referred to as Hubs....

ROPA View More

Records of Processing Activities (RoPA): A Cross-Jurisdictional Analysis

Download the whitepaper to gain a cross-jurisdictional analysis of records of processing activities (RoPA). Learn what RoPA is, why organizations should maintain it, and...

Managing Privacy Risks in Large Language Models (LLMs) View More

Managing Privacy Risks in Large Language Models (LLMs)

Download the whitepaper to learn how to manage privacy risks in large language models (LLMs). Gain comprehensive insights to avoid violations.

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Navigating Kenya’s Data Protection Act View More

Navigating Kenya’s Data Protection Act: What Organizations Need To Know

Download the infographic to discover key details about navigating Kenya’s Data Protection Act and simplify your compliance journey.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New