Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

New Draft Amendments to China Cybersecurity Law

Author

Salma Khan

Data Privacy Analyst

CIPP/Asia

Listen to the content

Introduction

On March 28, 2025, the Cyberspace Administration of China (CAC) issued new draft amendments to the Cybersecurity Law (CSL Draft Amendments) for public comment until 27 April 2025. Originally enacted on 1 June 2017, the Cybersecurity Law (CSL) is now being revised to better align with related legislation—namely, the Data Security Law (DSL), Personal Information Protection Law (PIPL), and the Administrative Penalty Law (APL).

This article explores the key amendments, enforcement shifts, and practical compliance strategies businesses need to navigate China’s rapidly evolving cybersecurity landscape.

The CSL Draft Amendment strengthens penalties for severe network security breaches, aligning Article 59 of the CSL with the DSL.

Operator Type

Violation

Penalty on Entity

Penalty on Personnel

General Network Operators Failure to meet obligations under Articles 21 & 25 

  • Article 21 requires network operators to implement a cybersecurity multi-level protection system (MLPS) by adopting security management systems, technical measures to prevent cyber threats, monitoring and logging practices, data protection measures, and compliance with other legal obligations.
  • Article 25 requires network operators to create emergency response plans for cybersecurity incidents, promptly address risks, and report to relevant authorities when incidents occur.
Warning + RMB 10,000–50,000 Up to RMB 100,000
If harm is caused or failure to rectify. RMB 50,000–500,000 RMB 10,000–100,000
Critical Information Infrastructure (CII) Operators Failure to meet obligations under Articles 33, 34, 36, & 38. 

  • Article 33 outlines obligations for critical information infrastructure (CII) operators, including ensuring business stability and security through synchronized planning and technical measures.
  • Article 34 requires setting up specialized security management bodies, providing regular cybersecurity training, and conducting disaster recovery and emergency drills.
  • Article 36 requires CII operators to sign security agreements with providers.
  • Article 38 requires CII operators to conduct annual security assessments and submit the reports to the relevant authorities.
Warning + RMB 50,000–100,000 Up to RMB 100,000
If harm is caused or failure to rectify RMB 100,000–1,000,000 RMB 10,000–100,000
Severe incident (data breach / partial function loss) RMB 500,000–2,000,000 

Business suspension, app/website shutdown, license revocation

RMB 50,000–200,000
Critical incident (loss of core CII functions) RMB 2,000,000–10,000,000 

Business suspension, app/website shutdown, license revocation

RMB 200,000–1,000,000
Under the current law, fines range from RMB 10,000 - 100,000 for general network operators and RMB 100,000 - 1 million for CII Operators.  The CSL Draft Amendments introduce legal consequences scaling with the impact of the violation. Penalties are broader and deeper, especially for CII operators.

 

The CSL Draft Amendments update Articles 68 and 69. They address emerging risks and reflect recent enforcement practices. They also clarify penalties for not reporting or stopping the spread of prohibited information.

Violation Type

Penalty on Entity

Penalty on Personnel

Enforcement Action

Failure to: 

  • Stop illegal information transmission
  • Remove prohibited content
  • Retain logs
  • Report to authorities
  • Comply with Article 50 orders
RMB 50,000–500,000 RMB 50,000–200,000 Rectification orders, warnings
If not rectified or a serious violation RMB 500,000–2,000,000 RMB 50,000–200,000 Business suspension, app/website shutdown, license revocation
If a violation causes particularly severe consequences RMB 2,000,000–10,000,000 RMB 200,000–1,000,000 Business suspension, app/website shutdown, license revocation
Electronic information & app service providers 

(Failing obligations under Art. 48(2))

RMB 2,000,000–10,000,000 RMB 200,000–1,000,000 Business suspension, app/website shutdown, license revocation
Under the current law, failure to handle illegal information leads to fines ranging from RMB 10,000–500,000. 

The CSL Draft Amendments propose increased penalties for failing to manage illegal content.

Non-Compliant Procurement of Cyber Security Products

The CSL Draft Amendment amends article 65 of the CSL into a new article 67.

Violation Type

Penalty on Entity

Penalty on Personnel

Using unapproved products in CII 1–10 times the procurement amount. RMB 10,000–100,000.
The fine for using unapproved products in the proposed amendments is significantly higher than the one imposed by the current law.  The amendment advocates stricter penalties for non-compliant procurement of cybersecurity products in critical sectors.

The Addition of New Provisions

New provisions 

Violation Type

Penalty on Entity

Key takeaway 

Article 61 Introduces a penalty for selling unapproved network devices/products Illegal gains will be confiscated, and violators may be fined 1 to 3 times the amount earned. If no illegal profits are made, a fixed fine of RMB 30,000 to 100,000 will apply. Regulates new market entry and ensures the sale of certified cybersecurity products.
Article 72 Introduces a principle of lenient enforcement aimed at encouraging proactive compliance. Under this approach, entities that voluntarily correct their violations and eliminate any resulting harm may be exempt from penalties altogether. Additionally, first-time or minor infractions that are promptly addressed may result in reduced penalties, reflecting a shift toward a more balanced and corrective enforcement strategy. Violators who promptly fix issues and prevent harm may avoid penalties, while first-time or minor breaches corrected in time may face lighter fines. Prevents excessive enforcement and encourages voluntary compliance.

 

The CSL Draft Amendment aligns the CSL with China’s DSL and PIPL by clarifying that violations involving personal information and important data will be subject to penalties under those more specific frameworks. Specifically, the following actions will now be punished in accordance with relevant laws and administrative regulations:

  • Publishing or transmitting prohibited information, including content restricted under Article 12(2) and other laws.
  • Violations of personal information protection, such as breaches of Article 22(3) and Articles 41–43, which safeguard individuals’ lawful data rights.
  • Cross-border data violations, including unlawfully storing or transferring personal or important data overseas in breach of Article 37.

This shift ensures more consistent and specialized enforcement of data protection obligations across China's broader legal landscape.

Significance of the CSL Proposed Draft Amendments

The amendment is crucial to closing regulatory gaps and ensuring consistency with newer, stricter laws like the DSL and the PIPL. It enhances enforcement by introducing tougher penalties, addressing previous weaknesses in deterrence. As cyber threats grow in scale and complexity, the changes equip regulators with stronger legal tools to manage risks across network security, critical infrastructure, and cybersecurity products. Additionally, the amendment reflects China's strategic shift toward digital sovereignty by tightening controls on foreign technologies in sensitive sectors.

Impact of the CSL Proposed Draft Amendments

The latest amendments to China’s CSL significantly heighten compliance requirements and enforcement risks for businesses, impacting not only CII operators but also general network operators and network product suppliers.

For CII operators, the proposed revision of CSL demands

  • stronger supply chain security practices,
  • reassessment of their security review processes, particularly in procuring network equipment and services, and
  • compliance with China's cross-border data transfer regulations.

General network operators must prioritize stronger mechanisms for managing illegal online content, as the amendments impose higher penalties for failing to prevent or address such violations. Developing robust emergency response plans for content-related incidents is critical, and businesses should enforce more stringent vetting procedures for third-party network product suppliers to meet China’s enhanced cybersecurity standards.

Network product suppliers will face more stringent market access requirements. Under the proposed revised law, companies must secure security certifications or testing approvals before selling products in China, requiring them to implement comprehensive security lifecycle management practices to ensure compliance from design through to deployment and maintenance.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View
Spotlight 21:30

Companies Cannot Grow If CISOs Don’t Allow Experimentation

Watch Now View
Spotlight 2:48

Unlocking Gen AI For Enterprise With Rehan Jalil

Rehan Jalil
Watch Now View

Latest

View More

From Trial to Trusted: Securely Scaling Microsoft Copilot in the Enterprise

AI copilots and agents embedded in SaaS are rapidly reshaping how enterprises work. Business leaders and IT teams see them as a gateway to...

The ROI of Safe Enterprise AI View More

The ROI of Safe Enterprise AI: A Business Leader’s Guide

The fundamental truth of today’s competitive landscape is that businesses harnessing data through AI will outperform those that don’t. Especially with 90% of enterprise...

Understanding Data Regulations in Australia’s Telecom Sector View More

Understanding Data Regulations in Australia’s Telecom Sector

1. Introduction Australia’s telecommunications sector plays a crucial role in connecting millions of people. However, with this connectivity comes the responsibility of safeguarding vast...

Data Security Governance View More

Data Security Governance: Key Principles and Best Practices for Protection

Learn about Data Security Governance, its importance in protecting sensitive data, ensuring compliance, and managing risks. Best practices for securing data.

ROPA View More

Records of Processing Activities (RoPA): A Cross-Jurisdictional Analysis

Download the whitepaper to gain a cross-jurisdictional analysis of records of processing activities (RoPA). Learn what RoPA is, why organizations should maintain it, and...

Managing Privacy Risks in Large Language Models (LLMs) View More

Managing Privacy Risks in Large Language Models (LLMs)

Download the whitepaper to learn how to manage privacy risks in large language models (LLMs). Gain comprehensive insights to avoid violations.

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Navigating Kenya’s Data Protection Act View More

Navigating Kenya’s Data Protection Act: What Organizations Need To Know

Download the infographic to discover key details about navigating Kenya’s Data Protection Act and simplify your compliance journey.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New