国产视频

In Short

Five Big Questions Raised by China’s New Draft Cross-Border Data Rules

A two-year-old draft abandoned, and regulations with broader scope than in the Cybersecurity Law

Data transfer visualization
Connect world / Shutterstock

The Cyberspace Administration of China today released a draft regulation governing the transfer of personal information out of China. DigiChina has translated the draft in full. At first glance, it appears to have fairly simple goals鈥攖o ensure that data protection objectives are upheld and people whose data is transferred abroad have their interests protected. As the scholar and government advisor Dr. Hong Yanqing in a WeChat post, the intent of the regulation is to protect the 鈥渓egitimate rights and interests of individuals if [their] data is separated from the original data controller and travels outside of the country.鈥

But a closer look raises several questions that may have implications for how the Chinese government is responding to long-standing industry concerns and lobbying. Two years after China鈥檚 Cybersecurity Law went into effect鈥攐n June 1, 2017鈥攖he Chinese government has recently released a string of new draft regulations (see list at bottom) providing details for how major aspects of the Cybersecurity Law regime is to operate. The policy area covered by today鈥檚 draft鈥攃ross-border data transfer鈥攈ad already been addressed in long-languishing draft measures that never took effect.

Today鈥檚 draft 鈥Personal Information Outbound Transfer Security Assessment Measures,鈥 which have been released for a month-long public comment period, raise several questions that have broad implications for the evolution of China鈥檚 digital economy regulatory regime. Here are a few.

Question 1: Have these draft rules quietly replaced a long-languishing draft on security assessments for cross-border data transfer, as well as the controversy around it?

In April 2017, Chinese authorities released on 鈥減ersonal information and important data outbound transfer security assessment鈥 that were designed to implement a requirement in the Cybersecurity Law. Article 37 of the law requires that 鈥減ersonal information and important data鈥 gathered or produced in China by 鈥渃ritical information infrastructure [CII] operators鈥 be stored in China, amounting to a sweeping but vague requirement for data localization.

The law also says, however, that if it is 鈥渢ruly necessary鈥 for CII operators to provide this data outside China, they may do so in accordance with measures formulated by cyberspace and other authorities. In the Chinese legal system, authoritative laws often consign the specifics of a given regulatory area to documents issued by government authorities that are more detailed and easier to revise.

So it made sense that, weeks before the Cybersecurity Law was to go into effect, authorities issued draft measures on security assessments that would be required before outbound transfer of personal information or important data was allowed.

The April 2017 draft, however, was never finalized, despite significant controversy and word that two later drafts, in May and August 2017, were quietly circulated among stakeholders. This week鈥檚 measures overlap with their contents, and it seems likely that the old draft is dead鈥攖hough the release of the new draft did not specify that is the case.

This creates uncertainty about the relationship between the two documents. If these draft rules do indeed replace the 2017 rules, then we would expect a separate directive to come out soon focused on transferring 鈥渋mportant data鈥 out of China, since this was included before and not now (see Question 4 below). But if these draft rules do not replace the 2017 ones, then there now exist two overlapping sets of rules that, in some areas, are not totally consistent (see Question 2).

Question 2: Why do these rules apply to 鈥渘etwork operators,鈥 when the Cybersecurity Law鈥檚 rules on data localization apply to the presumably more narrow category of 鈥渃ritical information infrastructure operators鈥?

Both the new draft measures and the April 2017 draft explicitly draw their legal authority from the Cybersecurity Law (though the 2017 version also cited the National Security Law). The Cybersecurity Law specifies two categories of regulated entities鈥攏etwork operators, and CII operators. When the law addresses data localization requirements and calls for rules governing transfer of data outside of China, it prescribes responsibilities for CII operators and does not mention network operators. Why, then, do both drafts address security assessments for network operators rather than the CII operators named in the law?

This discrepancy between the text of the law and the scope of the measures supposedly designed to implement it caused controversy from the beginning. The shift from regulating CII operators to network operators mattered to businesses, because network operators is a much broader category. 鈥淣etwork operator鈥 is defined as 鈥渘etwork owners and managers, and network service providers,鈥 a definition that can be read so broadly as to include any person or company with a network of any kind. (It is worth noting that to this day, neither category is rigorously defined in an authoritative way, leaving significant room for discretion in enforcement.)

Question 3: Did Chinese authorities hear foreign concerns and then dismiss them?

Feedback from foreign and domestic interests was swift in 2017. Industry groups expressed concern that obligations were too broad. The U.S. government officially raised concerns about China鈥檚 proposed cross-border data transfer rules at the World Trade Organization, arguing that 鈥渢he impact of the measures would fall disproportionately on foreign service suppliers operating in China, as these suppliers must routinely transfer data back to headquarters and other affiliates.鈥 The WTO filing specifically requested that the Chinese government delay finalization and implementation of the April 2017 draft. Whether or not in response to the U.S. request, that delay seems to have taken place.

It appears likely, however, the same concerns will be revived with this new draft. In October 2017, we assessed prospects based on conversations with people knowledgeable about contacts between Chinese officials and various interest groups and a public by a Ministry of Public Security research institute noting that a draft of a related document 鈥渦nderwent revision, adjustment, and improvement鈥esponding in part to the main concerns of domestic and foreign enterprises鈥 and that 鈥渢he controversy and compromise has not yet been resolved.鈥 With co-author Paul Triolo, we wrote that 鈥渢he eventual regulatory environment may not be as bleak as worst-case assessments would suggest.鈥

At that time, it appeared that the CAC had been receptive to industry feedback and may have walked back the scope of security assessment requirements to cover CII operators only, rather than the broader network operator category. But now under the latest draft Measures, network operators remains the scope, and there is no mention of CII operators. If this replaces the 2017 draft Measures, then the scope of what kind of data will be subject to review is now more far-reaching than that in the Cybersecurity Law鈥攁nd a core lobbying point has not been incorporated.

Question 4: What happened to 鈥榠mportant data鈥?

The two categories 鈥減ersonal information鈥 and 鈥渋mportant data鈥 appeared together in the Cybersecurity Law and in the 2017 draft measures. But, as Hong , 鈥淥ne of the biggest changes in the [new] 鈥楳easures鈥 compared with the previous 鈥極utbound Transfer Security Assessment Measures鈥 is to treat security assessment of personal information and important data separately,鈥 an approach Hong writes that he favored from the beginning at the working level.

Separating the two makes sense, given that 鈥渋mportant data鈥 has gradually been clarified to refer to national security concerns. A definition of in May 2019 draft Data Security Management Measures (in Article 28) defines the category broadly as:

鈥渄ata that, if divulged, may directly affect national security, economic security, social stability, or public health and safety, such as undisclosed government information or large-scale data on the population, genetic health, geography, mineral resources, etc. Important data generally does not include enterprises鈥 production, operations, and internal management information, personal information, etc.鈥

Thus it would be reasonable to expect separate rules governing the outbound transfer of 鈥渋mportant data鈥 as defined here, versus personal information as understood in China鈥檚 broader data governance regime.

This split will culminate when the two distinct laws (the Personal Information Protection Law and Data Security Law鈥攏ow in ) are finalized.

Question 5: Will these regulations, and the others rapidly emerging, be finalized and implemented quickly, or are we in for another prolonged waiting game?

After long waits in several cases, China鈥檚 government has recently published several draft regulatory documents, including these translated by DigiChina:

More regulatory documents and draft laws are expected this year.

It appears possible that these rules may finally be ready for implementation, though they each raise points of concern and lobbying from various interests. How quickly Chinese authorities move to finalize and implement these rules that undergird supposedly already-effective provisions of the Cybersecurity Law will affect regulatory uncertainty in China鈥檚 digital economy.

[This post has been updated to replace a broken link with a now-active one in the first paragraph. 鈥揈d. 2019.06.15]

More 国产视频 the Authors

Samm Sacks
IMG-1387.jpeg
Samm Sacks

Senior Fellow, Future Security

Graham Webster
Graham Webster1
Graham Webster

Research Scholar, Program on Geopolitics, Technology, and Governance, Stanford University

Programs/Projects/Initiatives

Topics

Five Big Questions Raised by China’s New Draft Cross-Border Data Rules