Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Personal Information Protection Law (PIPL) Compliance Checklist

Published November 1, 2023
Author

Omer Imran Malik

Data Privacy Legal Manager, Securiti

FIP, CIPT, CIPM, CIPP/US

Listen to the content

This post is also available in: Brazilian Portuguese

China has passed its data protection law named the Personal Information Protection Law (PIPL) that came into effect on November 1, 2021. The PIPL is comparatively more strict than other privacy laws. However, it does have several similarities to the GDPR.

PIPL is going to have a great impact on organizations because of its extraterritorial application, strict compliance requirements, and hefty fines. Most of the organizations already have privacy policies and effective privacy management practices in place to ensure compliance with the GDPR. However, these existing policies won’t be fully able to address the compliance requirements required under the PIPL. Organizations should begin reviewing their policies and practices in preparation for complying with the PIPL (effective from November 1st, 2021). We  have compiled a checklist of key requirements under China’s PIPL:

1. Identify whether your organization needs to have a dedicated entity or a representative within the borders of China:

China’s PIPL extends its territorial scope to the processing of personal information conducted outside of China, provided that the purpose of the processing is:

(i)   To provide products or services to individuals in China, or
(ii)  To “analyze” or “assess" the behavior of individuals in China, or
(iii) For other purposes to be specified by laws and regulations.

So if you are an offshore organization that is processing the personal data of Chinese residents for the purpose of providing services or products, or for analyzing and assessing their behavior, you must establish a “dedicated office” or appoint a “designated representative” in China for personal information protection purposes, and also file the information of the entity or the representative with competent government authorities.

2. Identify the lawful basis for collection and use of all personal information:

Under the PIPL, organizations can process personal information only on a lawful basis. PIPL provides seven lawful basis for the processing of personal information. Please find these lawful basis here and ensure that your organization relies on one of these basis for the processing of personal information. Your organization’s processing activities should have a clear and reasonable purpose and shall be directly related to the processing purpose. Please note that, unlike the GDPR,  “legitimate interest” is not a recognized lawful basis under the PIPL.

3. Provide individuals the right to withdraw their consent to the processing of their personal information:

Where your organization relies on consent as a lawful basis of processing, you must provide a convenient mechanism for individuals to withdraw their consent. You should not refuse to provide services to individuals who don’t agree to have their data processed, unless that data is necessary for the provision of that product or service.

4. Provide privacy notices to individuals before the processing activities:

PIPL requires organizations to provide an explicit privacy notice to individuals in a clear and easily understood language before the processing of their personal information. Your privacy notice should include the following information:

  • The name or personal name and contact method of the data controller;
  • The purpose of personal information processing and the processing methods, the categories of processed personal information, and the retention period;
  • Methods and procedures for individuals to exercise the rights provided in the PIPL;
  • Other items that laws or administrative regulations provide shall be notified.

If your organization notifies individuals through the method of formulating personal information processing rules, then you should make these processing rules public and convenient to read and store.

5. Have data subject requests mechanisms to fulfill data subjects rights:

PIPL provides individuals with several data subjects rights (i.e, access, rectification, limit, deletion, etc.), and mandates that organizations should establish convenient mechanisms to accept and process requests from individuals to exercise their rights. Therefore, your organization should have an automated data subject requests mechanism.

6. Have a security breach response and notification mechanism in place:

PIPL requires that in the event of a security breach, organizations should take “immediate” remediation actions and notify the relevant agencies and affected individuals. You should have a clear security breach response plan and tools in place to ensure compliance with the breach notifications.

7. Assess the need to conduct a Personal Information Impact Assessment:

Your organization must conduct a Personal Information Impact Assessment if you are conducting processing in one of the following scenarios:

  • Processing sensitive personal information; or
  • Using personal information to conduct automated decision-making; or
  • Entrusting personal information processing, or providing personal information to other data controllers, or disclosing personal information; or
  • Providing personal information abroad; or
  • Other personal information processing activities with a major impact on individuals.

8. Implement data classifications and management mechanisms:

Under the PIPL, organizations are required to formulate internal management structures and operating rules and implement data classification and management mechanisms. This requirement aligns with the new data classification obligations under China’s Data Security Law. Therefore, your organization should have data classification and management mechanisms in place in accordance with categories of personal information that you process.

9. Fulfill cross border data transfer obligations:

If your organization is involved in cross-border data transfers with China, you must oblige with these strict requirements. You must provide notices to individuals explaining the details of the transfer, and obtain their specific consent for the transfer of their personal information. You must also meet one of the following conditions:

  1. Pass a security assessment organized by the State cybersecurity and informatization department (related to operators of Critical Information Infrastructure and organizations that transfer a large volume of personal information);
  2. Undergo a personal information protection certification conducted by a specialized body according to provisions by the State cybersecurity and informatization department;
  3. Conclude a contract with the foreign receiving side in accordance with a standard contract formulated by the cyberspace and informatization department, agreeing upon the rights and responsibilities of both sides;
  4. Other conditions are provided in laws or administrative regulations or by the State cybersecurity and informatization department.

If you process a large volume of personal information or categorize yourself as a critical information infrastructure operator, then you must fulfill the data localization requirements of the PIPL.

10. Conclude data processing agreements with third parties processors:

If you are engaging third parties for your processing activities, you must ensure that you conclude an agreement with the third parties on the purpose for processing, the time limit, the processing method, categories of personal information, protection measures, as well as the rights and duties of both sides, etc., and conduct supervision of the personal information processing activities of the third parties.

Securiti helps organizations automate their privacy management operations using artificial intelligence and robotic automation. Request a demo and start your PIPL compliance process today.


Frequently Asked Questions (FAQs)

The Personal Information Protection Law (PIPL) in China requires organizations to obtain consent for data processing, implement security measures, appoint a Data Protection Officer (DPO), and follow specific rules for cross-border data transfers, among other compliance requirements.

PIPL and GDPR are data protection regulations, but they differ in scope, definitions, and specific requirements. For example, PIPL applies to the processing of personal information in China, while GDPR covers the European Union.

Personal information under PIPL includes names, identification numbers, contact information, biometric data, health information, and any data that can be used to identify an individual.

Yes, the PIPL requires certain organizations to appoint a Data Protection Officer (DPO) responsible for overseeing data protection compliance and acting as a point of contact for data subjects and authorities.

Personal information refers to various information related to an identified or identifiable natural person recorded electronically or by other means, but does not include anonymized information.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share

More Stories that May Interest You

Take a
Product Tour

See how easy it is to manage privacy compliance with robotic automation.

Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Spotlight 13:32
Ensuring Solid Governance Is Like Squeezing Jello
Watch Now View
Latest
Navigating the Data Minefield: Essential Executive Recommendations for M&A and Divestitures View More
Navigating the Data Minefield: Essential Executive Recommendations for M&A and Divestitures
The U.S. M&A landscape is back in full swing. May witnessed a significant rebound in deal activity, especially for transactions exceeding $100 million, signaling...
Simplifying Global Direct Marketing Compliance with Securiti’s Rules Matrix View More
Simplifying Global Direct Marketing Compliance with Securiti’s Rules Matrix
The Challenge of Navigating Global Data Privacy Laws In today’s privacy-first world, navigating data protection laws and direct marketing compliance requirements is no easy...
View More
What is IAM (Identity and Access Management)?
Gain insights into Identity and Access Management (IAM), what it is, challenges, core components, and how organizations can leverage it.
AI Data Mapping View More
AI Data Mapping: The Pathway to Intelligent Data Insights
Discover how AI data mapping revolutionizes data utilization. Harness the power of AI for smarter decision-making, data utilization, and ensuring regulatory compliance.
View More
Is Your Business Ready for the EU AI Act August 2025 Deadline?
Download the whitepaper to learn where your business is ready for the EU AI Act. Discover who is impacted, prepare for compliance, and learn...
View More
Getting Ready for the EU AI Act: What You Should Know For Effective Compliance
Securiti's whitepaper provides a detailed overview of the three-phased approach to AI Act compliance, making it essential reading for businesses operating with AI.
August 2, 2025 - A Critical Date in the EU AI Act Enforcement Timeline View More
August 2, 2025 – A Critical Date in the EU AI Act Enforcement Timeline
Securiti’s latest infographic explains the obligations and requirements coming into effect for different entities as the AI Act’s August 2 deadline approaches.
LGPD & Consent: Clear Compliance Guide for Enterprise Executives View More
LGPD & Consent: Clear Compliance Guide for Enterprise Executives
Download the infographic to learn about LGPD and consent. Get a clear compliance guide for enterprise executives. Ensure swift compliance with Securiti.
Gencore AI and Amazon Bedrock View More
Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock
Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...
DSPM Vendor Due Diligence View More
DSPM Vendor Due Diligence
DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...
What's
New