Securiti launches Gencore AI, a holistic solution to build Safe Enterprise AI with proprietary data - easily

View

China’s Draft Measures for the Protection and Certification of Outbound Personal Information

Contributors

Asaad Ahmad Qureshy

Associate Data Privacy Analyst at Securiti

Salma Khan

Data Privacy Analyst

CIPP/Asia

Listen to the content

Introduction

On January 3, 2025, the Cyberspace Administration of China (CAC) released the Draft Measures for the Protection and Certification of Outbound Personal Information (Draft Certification Measures) for public consultation. These Draft Certification Measures, aligned with the Personal Information Protection Law (PIPL) and related regulations, aim to standardize the certification and secure cross-border transfer of personal data. Under Article 38 of the PIPL, businesses transferring personal data overseas must meet strict requirements, including passing a security assessment, signing a standard contract, or obtaining certification. The Draft Certification Measures expand on the certification mechanism, providing a pathway for non-CII businesses to comply with cross-border data transfer rules. They do not modify the exemptions established under the CAC’s Regulations on Promoting and Regulating Outward Data Flows (Regulation), issued in March 2024. Businesses will continue to be exempt from any Cross-Border Data Transfer (CBDT) legal mechanisms if their data transfer scenarios fall within the scope of the relaxed provisions of the Regulation.

Applicability

Territorial Scope

As per Article 3 of the Draft Certification Measures, there are specific scenarios where personal information is transferred outside China for legitimate business or operational needs, including:

  • Direct Transfer of Data:
    • A Chinese business sends personal information to an overseas recipient for processing.
    • Example: A Chinese e-commerce business shares customer data with an overseas provider for order fulfillment.
  • Indirect Access to Data Stored in China:
    • Personal data stays in China, but entities outside can access it for various purposes like querying or exporting.
    • Example: A global marketing team accesses a Chinese business’s customer database remotely for analysis.
  • Other Cross-Border Processing Activities:
    • This covers situations where data about Chinese individuals is processed abroad, even if not transferred from within China.
    • Example: A foreign tech business processes data from Chinese users via an app hosted outside China.
      Material Scope

Material Scope

The Draft Certification Mechanism does not apply to:

  • Transfers of important data.
    • In the context of Data Security Law (DSL) and PIPL, "important data" is a term used to signify data that, if leaked, tampered with, lost, or illegally accessed, could pose risks to national security, economic interests, public interests, or other significant societal interests.
  • Data transfers by Critical Information Infrastructure (CII) operators
    • The Cybersecurity Law of China (CSL) defines CII as information infrastructure that, if destroyed, disabled, or exposed, could severely harm national security, the national economy, people's livelihoods, or the public interest.

It is intended for non-CII businesses transferring:

  • Sensitive personal data of fewer than 10,000 individuals
  • Non-sensitive personal data of between 100,000 and 1 million individuals

These transfers must have occurred since January 1 of the current year.

Personal Information Exit Protection Certification

The newly introduced  Draft Certification Measures ensure personal information transferred outside China complies with the PIPL. Under the Draft Certification Measures, CBDT is conducted by professional certification institutions that are:

  • Established under Chinese law (specifically PIPL) and;
  • Approved by the National Market Supervision and Administration Department

The certification confirms that outbound data transfers are secure and compliant with Chinese regulations, ensuring proper safeguards are in place to protect personal data.

Certification for Domestic Processors

The personal information certification under the Draft Certification Measures process for outbound data transfers is voluntary. Businesses can choose to seek certification to meet the requirements outlined in Article 3 of the PIPL. The certification process is designed to align with principles of voluntariness, marketization, and socialization, allowing flexibility for businesses to comply based on their specific needs.

Certification for Foreign Processors

Foreign personal information processors must collaborate with a designated local representative or a specialized institution within China to apply for certification. This ensures foreign entities are subject to Chinese legal and regulatory frameworks. To qualify, foreign applicants must:

  • Collaborate with a designated local representative or a specialized institution established within China for assistance.
  • Comply with the PIPL and related regulations.
  • Submit to supervision and management by Chinese authorities.
  • Undergo ongoing monitoring by professional certification institutions for the duration of their certification period.

Key Criteria for Certification

Article 10 of the Draft Certification Measures specifies the factors certification bodies will assess during the certification process:

  1. Legality, legitimacy, and necessity
  2. Impact assessment of the recipient’s jurisdiction
  3. Compliance with Chinese standards
  4. Legally binding agreements
  5. Organizational and technical safeguards
    1. Certification bodies will review whether the applicant has sufficient organizational frameworks, management systems, and technical measures to ensure personal data security.
  6. Other necessary evaluations
    1. Certification agencies retain discretion to conduct additional assessments, based on the specific requirements of the applicable certification standards.

Formulation of Standards and Supervision

Under the Draft Certification Measures:

  • The State Network Information Department (CAC), in coordination with other relevant agencies, is responsible for creating the standards, technical regulations, and assessment procedures for personal information certification.
  • The State Market Supervision and Administration Department, together with the CAC, will develop implementation rules, including guidelines for the certification certificates (both physical and digital) and logos.

Penalties and Administrative Measures

If cross-border personal information transfer activities threaten national security, and public interests, or seriously harm individuals' data and rights, certification agencies can report such activities to the National Network Information Department (CAC) and other relevant authorities.

If certified processors violate certification standards or operate outside their approved scope, certification agencies can suspend or revoke certificates and publicly announce the changes. The CAC and other authorities can also intervene during supervision, requiring cooperation from the certifying agency. Certification details, including certificate numbers, processor names, and status changes (e.g., suspension or revocation), must be submitted to the National Public Information Platform within five working days.

The CAC and the State Market Supervision and Administration Department oversee certification activities, conducting spot checks and evaluations. Agencies found violating regulations may face penalties, including warnings, required corrections, or suspension and revocation of qualifications.

Certification records obtained through false information may result in the revocation of certification and additional penalties. Organizations or individuals can report violations to relevant authorities, who may intervene if significant risks or security incidents occur.

How Securiti Can Help

Navigating evolving privacy requirements can be complex. Fortunately, Securiti’s suite of automation modules offers a comprehensive solution for organizations seeking to ensure compliance with the China’s evolving regulatory landscape.

Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. Securiti provides unified data intelligence, controls, and orchestration across hybrid multi-cloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance.

Request a demo to learn more.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View
Spotlight 13:35

The Better Organized We’re from the Beginning, the Easier it is to Use Data

Watch Now View
Spotlight 13:11

Securing GenAI: From SaaS Copilots to Enterprise Applications

Rehan Jalil
Watch Now View
Spotlight 47:02

Navigating Emerging Technologies: AI for Security/Security for AI

Rehan Jalil
Watch Now View

Latest

View More

Accelerating Safe Enterprise AI with Gencore Sync & Databricks

We are delighted to announce new capabilities in Gencore AI to support Databricks' Mosaic AI and Delta Tables! This support enables organizations to selectively...

View More

Building Safe, Enterprise-grade AI with Securiti’s Gencore AI and NVIDIA NIM

Businesses are rapidly adopting generative AI (GenAI) to boost efficiency, productivity, innovation, customer service, and growth. However, IT & AI executives—particularly in highly regulated...

Key Differences from DLP & CNAPP View More

Why DSPM is Critical: Key Differences from DLP & CNAPP

Learn about the critical differences between DSPM vs DLP vs CNAPP and why a unified, data-centric approach is an optimal solution for robust data...

DSPM Trends View More

DSPM in 2025: Key Trends Transforming Data Security

DSPM trends in 2025 provides a quick glance at the challenges, risks, and best practices that can help security leaders evolve their data security...

The Future of Privacy View More

The Future of Privacy: Top Emerging Privacy Trends in 2025

Download the whitepaper to gain insights into the top emerging privacy trends in 2025. Analyze trends and embed necessary measures to stay ahead.

View More

Personalization vs. Privacy: Data Privacy Challenges in Retail

Download the whitepaper to learn about the regulatory landscape and enforcement actions in the retail industry, data privacy challenges, practical recommendations, and how Securiti...

Nigeria's DPA View More

Navigating Nigeria’s DPA: A Step-by-Step Compliance Roadmap

Download the infographic to learn how Nigeria's Data Protection Act (DPA) mapping impacts your organization and compliance strategy.

Decoding Data Retention Requirements Across US State Privacy Laws View More

Decoding Data Retention Requirements Across US State Privacy Laws

Download the infographic to explore data retention requirements across US state privacy laws. Understand key retention requirements and noncompliance penalties.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New