Veeam Completes Acquisition of Securiti AI to Create the Industry’s First Trusted Data Platform for Accelerating Safe AI at Scale

View

China’s Draft Measures for the Protection and Certification of Outbound Personal Information

Contributors

Asaad Ahmad Qureshy

Associate Data Privacy Analyst at Securiti

Salma Khan

Data Privacy Analyst at Securiti

CIPP/Asia

Published January 16, 2025

Listen to the content

Introduction

On January 3, 2025, the Cyberspace Administration of China (CAC) released the Draft Measures for the Protection and Certification of Outbound Personal Information (Draft Certification Measures) for public consultation. These Draft Certification Measures, aligned with the Personal Information Protection Law (PIPL) and related regulations, aim to standardize the certification and secure cross-border transfer of personal data. Under Article 38 of the PIPL, businesses transferring personal data overseas must meet strict requirements, including passing a security assessment, signing a standard contract, or obtaining certification. The Draft Certification Measures expand on the certification mechanism, providing a pathway for non-CII businesses to comply with cross-border data transfer rules. They do not modify the exemptions established under the CAC’s Regulations on Promoting and Regulating Outward Data Flows (Regulation), issued in March 2024. Businesses will continue to be exempt from any Cross-Border Data Transfer (CBDT) legal mechanisms if their data transfer scenarios fall within the scope of the relaxed provisions of the Regulation.

Applicability

Territorial Scope

As per Article 3 of the Draft Certification Measures, there are specific scenarios where personal information is transferred outside China for legitimate business or operational needs, including:

  • Direct Transfer of Data:
    • A Chinese business sends personal information to an overseas recipient for processing.
    • Example: A Chinese e-commerce business shares customer data with an overseas provider for order fulfillment.
  • Indirect Access to Data Stored in China:
    • Personal data stays in China, but entities outside can access it for various purposes like querying or exporting.
    • Example: A global marketing team accesses a Chinese business’s customer database remotely for analysis.
  • Other Cross-Border Processing Activities:
    • This covers situations where data about Chinese individuals is processed abroad, even if not transferred from within China.
    • Example: A foreign tech business processes data from Chinese users via an app hosted outside China.
      Material Scope

Material Scope

The Draft Certification Mechanism does not apply to:

  • Transfers of important data.
    • In the context of Data Security Law (DSL) and PIPL, "important data" is a term used to signify data that, if leaked, tampered with, lost, or illegally accessed, could pose risks to national security, economic interests, public interests, or other significant societal interests.
  • Data transfers by Critical Information Infrastructure (CII) operators
    • The Cybersecurity Law of China (CSL) defines CII as information infrastructure that, if destroyed, disabled, or exposed, could severely harm national security, the national economy, people's livelihoods, or the public interest.

It is intended for non-CII businesses transferring:

  • Sensitive personal data of fewer than 10,000 individuals
  • Non-sensitive personal data of between 100,000 and 1 million individuals

These transfers must have occurred since January 1 of the current year.

Personal Information Exit Protection Certification

The newly introduced  Draft Certification Measures ensure personal information transferred outside China complies with the PIPL. Under the Draft Certification Measures, CBDT is conducted by professional certification institutions that are:

  • Established under Chinese law (specifically PIPL) and;
  • Approved by the National Market Supervision and Administration Department

The certification confirms that outbound data transfers are secure and compliant with Chinese regulations, ensuring proper safeguards are in place to protect personal data.

Certification for Domestic Processors

The personal information certification under the Draft Certification Measures process for outbound data transfers is voluntary. Businesses can choose to seek certification to meet the requirements outlined in Article 3 of the PIPL. The certification process is designed to align with principles of voluntariness, marketization, and socialization, allowing flexibility for businesses to comply based on their specific needs.

Certification for Foreign Processors

Foreign personal information processors must collaborate with a designated local representative or a specialized institution within China to apply for certification. This ensures foreign entities are subject to Chinese legal and regulatory frameworks. To qualify, foreign applicants must:

  • Collaborate with a designated local representative or a specialized institution established within China for assistance.
  • Comply with the PIPL and related regulations.
  • Submit to supervision and management by Chinese authorities.
  • Undergo ongoing monitoring by professional certification institutions for the duration of their certification period.

Key Criteria for Certification

Article 10 of the Draft Certification Measures specifies the factors certification bodies will assess during the certification process:

  1. Legality, legitimacy, and necessity
  2. Impact assessment of the recipient’s jurisdiction
  3. Compliance with Chinese standards
  4. Legally binding agreements
  5. Organizational and technical safeguards
    1. Certification bodies will review whether the applicant has sufficient organizational frameworks, management systems, and technical measures to ensure personal data security.
  6. Other necessary evaluations
    1. Certification agencies retain discretion to conduct additional assessments, based on the specific requirements of the applicable certification standards.

Formulation of Standards and Supervision

Under the Draft Certification Measures:

  • The State Network Information Department (CAC), in coordination with other relevant agencies, is responsible for creating the standards, technical regulations, and assessment procedures for personal information certification.
  • The State Market Supervision and Administration Department, together with the CAC, will develop implementation rules, including guidelines for the certification certificates (both physical and digital) and logos.

Penalties and Administrative Measures

If cross-border personal information transfer activities threaten national security, and public interests, or seriously harm individuals' data and rights, certification agencies can report such activities to the National Network Information Department (CAC) and other relevant authorities.

If certified processors violate certification standards or operate outside their approved scope, certification agencies can suspend or revoke certificates and publicly announce the changes. The CAC and other authorities can also intervene during supervision, requiring cooperation from the certifying agency. Certification details, including certificate numbers, processor names, and status changes (e.g., suspension or revocation), must be submitted to the National Public Information Platform within five working days.

The CAC and the State Market Supervision and Administration Department oversee certification activities, conducting spot checks and evaluations. Agencies found violating regulations may face penalties, including warnings, required corrections, or suspension and revocation of qualifications.

Certification records obtained through false information may result in the revocation of certification and additional penalties. Organizations or individuals can report violations to relevant authorities, who may intervene if significant risks or security incidents occur.

How Securiti Can Help

Navigating evolving privacy requirements can be complex. Fortunately, Securiti’s suite of automation modules offers a comprehensive solution for organizations seeking to ensure compliance with the China’s evolving regulatory landscape.

Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. Securiti provides unified data intelligence, controls, and orchestration across hybrid multi-cloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance.

Request a demo to learn more.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox



More Stories that May Interest You
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Latest
View More
DataAI Security: Why Healthcare Organizations Choose Securiti
Discover why healthcare organizations trust Securiti for Data & AI Security. Learn key blockers, five proven advantages, and what safe data innovation makes possible.
View More
The Anthropic Exploit: Welcome to the Era of AI Agent Attacks
Explore the first AI agent attack, why it changes everything, and how DataAI Security pillars like Intelligence, CommandGraph, and Firewalls protect sensitive data.
View More
Aligning Your AI Systems With GDPR: What You Need to Know
Securiti’s latest blog walks you through all the important information and guidance you need to ensure your AI systems are compliant with GDPR requirements.
Network Security: Definition, Challenges, & Best Practices View More
Network Security: Definition, Challenges, & Best Practices
Discover what network security is, how it works, types, benefits, and best practices. Learn why network security is core to having a strong data...
Australia’s Guidance for AI Adoption View More
Australia’s Guidance for AI Adoption
Access the whitepaper to learn about what businesses need to know about Australia’s Guidance for AI Adoption. Discover how Securiti helps ensure compliance.
Montana Privacy Amendment on Notices: What to Change by Oct 1 View More
Montana Privacy Amendment on Notices: What to Change by Oct 1
Download the whitepaper to learn about the Montana Privacy Amendment on Notices and what to change by Oct 1. Learn how Securiti helps.
View More
Solution Brief: Microsoft Purview + Securiti
Extend Microsoft Purview with Securiti to discover, classify, and reduce data & AI risk across hybrid environments with continuous monitoring and automated remediation. Learn...
Top 7 Data & AI Security Trends 2026 View More
Top 7 Data & AI Security Trends 2026
Discover the top 7 Data & AI security trends for 2026. Learn how to secure AI agents, govern data, manage risk, and scale AI...
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
The DSPM Architect’s Handbook View More
The DSPM Architect’s Handbook: Building an Enterprise-Ready Data+AI Security Program
Get certified in DSPM. Learn to architect a DSPM solution, operationalize data and AI security, apply enterprise best practices, and enable secure AI adoption...
What's
New