Securiti+Veeam Will Accelerate Safe Enterprise Al at Scale

View

China’s Regulation on Protection of Minors in Cyberspace

Contributors

Anas Baig

Product Marketing Manager at Securiti

Maria Khan

Data Privacy Legal Manager at Securiti

FIP, CIPT, CIPM, CIPP/E

Published March 4, 2024

Listen to the content

Decree No. 766 of the State Council of the People’s Republic of China, also known as the Regulations on the Protection of Minors on the Internet, was adopted at the 15th executive meeting of the State Council on September 20th, 2023. Following its adoption, the Cyberspace Administration of China (CAC) published the Regulations on October 24th, 2023. The CAC is responsible for supervising and coordinating the protection of minors in cyberspace.

The Regulations carry several obligations for various government bodies, departments, schools, online products, and service providers, especially those providing network products and services to minors.

These obligations require all subject organizations to consider the impact of their offerings on the physical and mental health of minors and ensure through the design, implementation, development, and research to mitigate any harmful effects.

These regulations and the subsequent obligations will come into effect on January 1st, 2024.

Application of the Regulation

The regulations apply to guardians, schools, and various market players who carry out activities in cyberspace in relation to minors. The following entities comprise the market players:

  1. Internet product and service providers: The Cybersecurity Law defines the “internet” broadly as a system that collects, stores, transmits, exchanges, and processes information according to certain rules and procedures using computers or other information terminals and related equipment.
  2. Personal information processors: The Regulations do not define personal information processors. However, the Personal Information Protection Law defines personal information processors as organizations or individuals who independently determine the purposes and means of processing personal information.
  3. Manufacturers and sellers of smart terminal products: Smart devices are networked devices such as mobile phones and computers that can connect to the Internet, have an operating system, and allow users to install application software.

General Provisions

The general provisions of these Regulations include the following:

  • These Regulations have been formed in accordance with the Law of the People's Republic of China on the Protection of Minors, the Cyber Security Law of the People's Republic of China (CSL), the Personal Information Protection Law of the People's Republic of China (PIPL) and other relevant regulations;
  • All regulations meant to protect minors must adhere to the leadership of the Communist Party of China, the guidance of socialist core values, and the principle that is most beneficial to minors;
  • The State Network Information Department shall be responsible for coordinating the network protection of minors;
  • Any organization or individual that finds a violation of the provisions of these Regulations may complain and report to relevant departments;
  • The department that receives the complaint and report shall deal with it in a timely manner in accordance with the law;
  • Organizations and individuals that make outstanding contributions to the network protection of minors will be commended and rewarded in accordance with the relevant provisions of the State.

Promotion of Network Literacy

All relevant organizations subject to these Regulations must undertake the following measures related to the promotion of network literacy:

  • Any software developed for specific use by minors must have the appropriate in-built mechanisms to effectively identify illegal information that may impact the physical and mental health of minors, prevent minors from using the Internet, or pose any significant threats to the minors’ personal information;
  • Manufacturers of all smart devices designed specifically for minors must install appropriate network protection software on all such products before they leave the factory while also providing the necessary resources to inform the users of these measures;
  • Network platform service providers that have a significant number of users or possess a significant impact on a group of minors are subject to the following obligations:
    • They must fully consider the characteristics of the physical and mental health development of minors while designing, researching, developing, and operating their network platform services by carrying out regular impact assessments;
    • Provide minors with specific platforms or areas within existing platforms to facilitate their physical and mental health;
    • Establish and improve a compliance system in accordance with national regulations as well as an independent body composed mainly of external members to supervise the network protection of minors on the platform;
    • Follow the necessary principles of openness, fairness, and justice when creating guidelines meant to protect minors on the platform;
    • Cease services to products or service providers that seriously violate the physical and mental health of minors or infringe on other legitimate rights and interests of minors in violation of other administrative regulations;
    • Issue a special social responsibility report on the online protection of minors on their platform annually.

Specifications of Network Information Content

  • No organization should produce, reproduce, publish, or disseminate network information that contains content that endangers the physical and mental health of minors;
  • No organization may produce, copy, publish, disseminate, or hold obscene and pornographic online information about minors;
  • If any network product or service contains information that may result in minors imitating unsafe behaviors or acts, developing bad hobbies, or generating extreme emotions that affect the mental and physical health of minors, the organization developing such a product or service must display a significant prompt or warning before any such information is displayed and no organization or individual shall produce, copy, publish or disseminate the information;
  • The State Department of Network Information, together with the State Press and Publication, Film Department and the Education, Telecommunications, Public Security, Culture and Tourism, Radio and Television, and Other Departments of the State Council, must collaborate and determine the specific types, scope, judgment standards and tips of information that may affect the physical and mental health of minors;
  • No organization can coax or force a minor to access online information that may contain content harmful to their physical or mental health;
  • No organization can engage in behaviors that insult, slander, threaten, or damage the image of minors in the form of text, pictures, audio, and video through the Internet;
  • Network product and service providers must establish an early warning, prevention, identification, monitoring, and disposal mechanism for cyberbullying;
  • Network product and service providers must set up functions and channels to facilitate minors and their guardians to keep records of cyberbullying and make it easier for minors to block users engaging in cyberbullying;
  • No organization or individual will organize, instigate, coerce, induce, deceive, or help minors to commit illegal and criminal acts in the form of text, pictures, audio, and video through the Internet;
  • Network product and service providers must take strict actions to restrict the unlawful release of users’ information;
  • Network product and service providers must take relevant actions such as deletion, blocking, and disconnection of links providing access to such information;
  • Network product and service providers must issue warnings, restrict functions, and, in extreme cases, suspend services for users that produce, copy, release, and disseminate such information.

Protection of Personal Information

Here are the measures all subject organizations must undertake related to protecting any personal information they may have collected:

  • If an Internet service provider provides a product or service specifically for minors, it must require the guardian or the minor to provide their true identity in accordance with the necessary regulations. In case such identification cannot be provided, the service provider cannot give such users access to their services;
  • The service provider must establish a dynamic verification mechanism that verifies the user information promptly;
  • All such service providers must adhere to the provisions of the national network information department and relevant departments when processing non-essential personal information;
  • The guardians of minors that use such services must adequately educate and guide minors to raise their awareness related to protecting their personal information and understanding the security risks of personal information;
  • The guardians must also guide minors in exercising their right to access, copy, correct, supplement, and delete all personal information collected from them;
  • If a minor or their guardians request to access, copy, correct, supplement, and delete all personal information collected from them, the personal information processor must abide by the following obligations:
    • Provide a convenient method to exercise their rights;
    • Provide convenient functions within the method to exercise their rights;
    • If a minor or their guardian’s request to access, copy, correct, supplement, and delete all personal information collected from them is denied, they must be informed in writing with the relevant reasons.

The personal information processor shall provide a way to transfer if the request made by the minors or their guardians is made in accordance with the law and the conditions of the national network information department;

  • In case of a data breach affecting minors’ personal information, the personal information processor must immediately initiate the incident response plan and take the necessary remedial and administrative measures necessary under various relevant regulations;
  • If the personal information processor cannot inform each affected individual of the data breach, they must publish the news within the stipulated period and abide by the laws and administrative regulations;
  • The personal information processor must set strict limits on the rights of its own staff members’ access to minors’ personal information based on the principle of least privilege;
  • The personal information processor must conduct an annual compliance audit of the measures in place to handle minors’ personal information;
  • If the personal information processor discovers minors’ personal information published anywhere on their network, they must promptly take the necessary steps to prevent the proliferation of such information.

Prevention & Control of Internet Addiction

Here’s what each subject organization must do related to the prevention and control of minor’s internet addiction:

  • All network product and service providers must establish an anti-addiction system, refrain from addition-inducing products and services, modify the contents functions and rules timely, and announce anti-addiction work to the public every year;
  • All online games, online live broadcasts, online audio and video, online social, and other network service providers must adhere to the principles of integration, friendliness, practicality, and effectiveness in accordance with relevant national regulations and standards and provide time management, authority management, consumption management, and other functions for guardians to perform guardianship duties;
  • All online games, online live broadcasts, online audio and video, online social, and other network service providers must undertake measures to limit the single-day internet consumption of minors of different ages;
  • All online games, online live broadcasts, online audio and video, online social, and other network service providers must not set up online communities, groups, and topics with the theme of assistance fund-raising, voting, ranking, volume control, and evaluation to induce minors;
  • All online games, online live broadcasts, online audio and video, online social, and other network service providers must verify the true identity of all minors using their platforms and must not provide game account rental and sales services for minors;
  • All online games, online live broadcasts, online audio and video, online social, and other network service providers must limit minors’ access to functions that may potentially affect their mental and physical health;
  • It is strictly prohibited for an organization or individual to interfere in internet addiction and infringe upon the rights and interests of minors by using tactics that exploit or coerce minors on the internet.
  • Any network service providers found in violation of their obligations may face fines ranging from 50,000 yuan to 500,000 yuan. The staff and other directly responsible personnel shall be fined not less than 10,000 yuan but not more than 100,000 yuan;
  • If any network platform service provider fails to make corrections, they can be fined not more than 1 million yuan;
  • The staff and other directly responsible personnel shall be fined not less than 10,000 yuan but not more than 100,000 yuan;
  • In case of serious issues, government departments such as network information, press, telecommunications, public security, culture, and tourism may order corrections, confiscate illegal income, and impose fines (up to 50 million yuan or a percentage of the previous year's turnover);
  • Any network service providers that do not display appropriate warnings to minors may face a fine of not more than 100,000 yuan;
  • Any network service providers that are found violating their obligations may face a fine of not more than 100,000 yuan;
  • Violations of these Regulations resulting in harm to a minor's rights lead to civil liability. Public security violations incur punishment according to relevant laws, and if a crime is committed, criminal responsibility will be investigated according to the law.

How Securiti Can Help

China is one of the few countries to have adopted a highly proactive approach toward protecting its citizens’ data and information. Its three distinct regulations, the Personal Information Protection Law (PIPL), the Data Security Law (DSL), and Cyber Security Law (CSL), all carry various obligations related to various aspects of organizations related to how they must manage their users’ data.

These Regulations are another addition to a series of measures China’s CAC has adopted to manage how the Internet evolves and is used within the country. Hence, organizations need an effective and efficient solution to address these obligations.

Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls, and orchestration across hybrid multi-cloud environments.

The Data Command Center gives organizations access to critical modules and solutions designed to ensure compliance with the plethora of obligations China’s extensive data regulations place on organizations.

Request a demo today and learn more about how Securiti can help your organization comply with CAC’s latest Regulations on the Protection of Minors on the Internet, as well as all of China’s other data-related regulations.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox



More Stories that May Interest You
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Latest
View More
Securiti+Veeam Will Accelerate Safe Enterprise Al at Scale
We started Securiti Al with the strong conviction that in the Information Age, the Information aka Data, is the life blood of businesses and a unified platform was needed to provide all essential controls and deep intelligence around...
View More
DataAI Security for Financial Services: Turn Risk Into competitive Advantage
Financial services run on sensitive data. AI is now in fraud detection, underwriting, risk modelling, and customer service, raising both upside and risk. Institutions...
View More
Navigating China’s AI Regulatory Landscape in 2025: What Businesses Need to Know
A 2025 guide to China’s AI rules - generative-AI measures, algorithm & deep-synthesis filings, PIPL data exports, CAC security reviews with a practical compliance...
View More
All You Need to Know About Ontario’s Personal Health Information Protection Act 2004
Here’s what you need to know about Ontario’s Personal Health Information Protection Act of 2004 to ensure effective compliance with it.
The 5 Tenets of Modern DSPM for Financial Services View More
The 5 Tenets of Modern DSPM for Financial Services
Learn the 5 tenets of modern DSPM for financial services: continuous discovery, access governance, real-time risk visibility, automated remediation, and continuous compliance.
Maryland Online Data Privacy Act (MODPA) View More
Maryland Online Data Privacy Act (MODPA): Compliance Requirements Beginning October 1, 2025
Access the whitepaper to discover the compliance requirements under the Maryland Online Data Privacy Act (MODPA). Learn how Securiti helps ensure swift compliance.
DSPM vs Legacy Security Tools: Filling the Data Security Gap View More
DSPM vs Legacy Security Tools: Filling the Data Security Gap
The infographic discusses why and where legacy security tools fall short, and how a DSPM tool can make organizations’ investments smarter and more secure.
Operationalizing DSPM: 12 Must-Dos for Data & AI Security View More
Operationalizing DSPM: 12 Must-Dos for Data & AI Security
A practical checklist to operationalize DSPM—12 must-dos covering discovery, classification, lineage, least-privilege, DLP, encryption/keys, policy-as-code, monitoring, and automated remediation.
The DSPM Architect’s Handbook View More
The DSPM Architect’s Handbook: Building an Enterprise-Ready Data+AI Security Program
Get certified in DSPM. Learn to architect a DSPM solution, operationalize data and AI security, apply enterprise best practices, and enable secure AI adoption...
Gencore AI and Amazon Bedrock View More
Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock
Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...
What's
New