November 20, 2017

November 17, 2017

Subscribe to Latest Legal News and Analysis

People's Republic of China Cybersecurity Law: A Preliminary Overview for Western Companies

On June 1, 2017, China debuted its first comprehensive cybersecurity law (the “PRC Cybersecurity Law”).1 This Law effectively consolidates and expands many of China’s existing laws and regulations that touch on cyber activities, with a stated goal of safeguarding Chinese “cyberspace sovereignty.” Notably, the PRC Cybersecurity Law may also reach the informational and security practices of many multinational corporations, to unexpected result. For example, multinationals that currently avoid storing data in China may now have to seriously consider paying for cloud-sharing and other services within the country in order to avoid the stiff penalties for noncompliance.  

Notably, a recent report by the consulting firm Consilio found that among 118 legal technology professionals surveyed, only 25% claimed familiarity with the PRC Cybersecurity Law. It is therefore critical for multinational companies to begin to understand their potential liability under this framework and its immediate practical effect. This article provides a brief overview of the PRC Cybersecurity Law and highlights some of the key requirements that foreign companies doing business in China should be considering.  

Brief Overview

The PRC Cybersecurity Law is one of a series of laws and regulations published in an effort to establish and protect China’s sovereignty over cyberspace. It aims to protect the rights and interests of citizens, safeguard national security, and promote economic development through heightened network security.

To achieve network security, the Law requires computer network owners, managers, and service providers (“Network Operators”) to adopt certain data security measures, such as computer virus prevention and security incident recording. Any company that operates a network related to services needed for public communication, utilities, and finance, as well as any infrastructure that would endanger national security if compromised (“Critical Information Infrastructure Operators” or “CII Operators”) must adhere to an additional set of stringent requirements, such as setting up specialized security management bodies and conducting disaster recovery backups. Additionally, companies providing network products and services in China must comply with relevant national security maintenance requirements.

Companies that fail to comply with the PRC Cybersecurity Law can be subject to fines up to RMB 1,000,000 ($146,923 USD), suspension of operations, or cancellation of business licenses.

The Law, as it was approved in November 2016, “left many of the details regarding rules and implementation to regulators like the Cyber Administration of China,” tasked with the formulation and timely revision of relevant national and industry standards for network security.2

Types of Foreign Companies That Might be Impacted

Any company that maintains a computer network in China, that uses a network in China, that has collected or stored data in China, or provides network services and products to China should give serious attention to the requirements of the PRC Cybersecurity Law.3 If a company has conducted a business transaction in China, it is likely that they will be subject to at least some requirements under the Law. For multinational companies, the Law makes cross-border data transfers more burdensome, as the Chinese government has aimed to ensure that a company’s network is adequately secure before allowing it transfer data outside of China.

As the Law imposes different sets of requirements for three categories of companies, the first question a foreign company should ask is “Are we a Network Operator, a CII Operator, or a Network Product & Service Provider?” Much will depend on how precisely the Chinese government defines these terms and conducts enforcement actions.  

Thus, if the Chinese government takes a a broad definition of “Network Operator,” then this PRC Cybersecurity Law “could theoretically cover every organization or business with a linked computer system.”4  Currently, the government has broad discretion over what may endanger national security or public interest, so it is possible that even companies with the slightest ties to public infrastructure will fall into the category of CII Operators and will be subject to additional requirements. Implementing rules regarding CII Operators have not yet been released. Even if a company is not a Network or CII Operator, the Law also sets out cybersecurity requirements that apply to other types of entities, including suppliers of network products and services.5

Requirements Under the Law 

Network Operators: Basic cybersecurity measures, such as implementing security management systems and monitoring operational statuses, and that companies make public their rules for collection of personal data collected and inform users of any leak or loss of personal information.

CII Operators: All of the basic cybersecurity measures taken by network operators plus specialized security protections.6 Most notably, Article 37 requires CII operators to store personal information collected in China on servers physically located within mainland China. In response to fierce lobbying efforts, the Cyberspace Administration of China has delayed implementation of regulations governing cross-border data flow until the end of 2018.7

Network Product & Service Providers: Security management duties and safety certification or inspection by a qualified establishment before network security products can be sold in China.

Potential Next Steps for Risk Management

Until the scope of the PRC Cybersecurity Law becomes clear through enforcement and additional guidance, non-Chinese companies may want to avoid data collection, storage, and transfers beyond what is necessary to conduct business. In addition to minimizing data transfers to and from China, companies can take the following steps to manage the risk of liability under this new Law:

  • Employ secure file transfer practices, such as encryption and data loss prevention.

  • Adopt measures to prevent viruses and to record network security incidents.

  • Create a plan for how to respond to a security breach.

  • Ensure that their rules for collecting, storing, and using personal information are publicly available and that they obtain consent from individuals providing such information.

We note that many US and EU companies, for example, have implemented policies and practices that address these matters. They should vet these policies and practices to ensure that the policies reflect the new requirements.

Conclusion

The PRC Cybersecurity Law maintains the trend from elective regimes toward mandatory cybersecurity standards and requirements. As seen in the EU, with the recently adopted General Data Protection Regulation framework, and in the US, with proposed federal regulations of financial institutions to address the risk of “cyber contagion,” global actors are flexing their regulatory and national security powers to address the threat of cyber-attacks in an increasingly interconnected world. While the PRC Cybersecurity Law has yet to take shape, navigating its potential liabilities now, rather than later, could relieve the regulatory burden of complying with similar mandates that could soon find international support. 


1. Current PRC Cybersecurity Law only provides very general provisions. As usual, China probably will issue some subsequent detailed implementations with respect to the Cybersecurity Law as well as other relevant supporting rules, judicial explanations, which will provide detailed provisions and guidance in relation to the implementation of the Cybersecurity Law. Andrews Kurth Kenyon may keep an eye on this and may provide updates with the assistance of our Beijing office.

2. Sherisse Pham, China’s New Cyber Law Just Kicked in and Nobody’s Sure How it Works, CNN Tech (June 1, 2017).

3. Article 2 states that the PRC Cybersecurity Law applies “with respect to the construction, operation, maintenance and usage of networks.” (emphasis added). Additionally, “Network Operators” could mean “any company who operates any type of network – even a small office LAN.” John Carl Villanueva, How Does China’s Cybersecurity Law Impact Data Transfers?, Jscape: Managed File Transfer and Network Solutions (May 29, 2017, 8:59 AM). 

4. Ron Cheng, China Passes Long-Awaited Cyber Security Law, Forbes (Nov. 9, 2016).

5. Id.

6. The special protections include, but are not limited to, requiring a yearly inspection of network security and a security review when CII Operators want to purchase network products or services that may impact national security. See Morgan Chalfant, New Cyber Law in China Stirs Alarm, The Hill (June 1, 2017).

7. Sui-Lee Wee, China’s New Cybersecurity Law Leaves Foreign Firms Guessing, NY Times (May 31, 2017).

© 2017 Andrews Kurth Kenyon LLP

TRENDING LEGAL ANALYSIS


About this Author

Jeff C. Dodd, Andrews Kurth Law Firm, Securities Attorney
Partner

Corporate, Securities and Corporate Finance: experience in diverse domestic and international corporate transactions, including representing issuers and underwriters (and investment bankers) in connection with public and private securities offerings (including IPOs and secondary offerings); representing venture capital and other investment groups or funds, as well as portfolio companies, in private debt and equity financing transactions; representing various participants (buyers, sellers, financing sources) in merger and acquisition and change of control transactions, public...

713-220-4736
Jerry Jie Li, Energy Attorney, Andrews Kurth Law Firm
Partner

For 11 years Jerry handled, managed and supervised certain of legal affairs of China’s largest national oil and gas company. His experience involves international business development primarily in the oil and gas industry. He has worked in 17 countries and has been involved in more than 600 oil and gas projects located in over 50 countries. His experience includes M&A, E&P investment, drilling, seismic, technical service, surface facilities engineering service, offshore operations, EPCC turnkey and trading aspects of the oil and gas industry. Jerry received his Juris Master Degree from Tsinghua University School of Law and his B.A., with honors, from Zhengzhou University. He is also a bearer of the US PMP credential.

+86.10.8486.2696
Dora Luo, Andrews Kurth Law Firm, Beijung, Cybersecurity Attorney
Counsel

The Beijing office of Andrews Kurth, established in 2005, provides counsel and representation on the acquisition and disposition of oil and gas interests, infrastructure development projects and financing, and international intellectual property transactions and protection. Our clients include a number of significant Chinese companies and banks conducting business in China and throughout Asia, as well as Chinese companies and banks that seek to establish and grow their presence internationally.

8610-8486-2699
Ross Campbell Corporate and Financial Restructuring specialist, Andrews Kurth law firm, mergers acquisitions lawyers, asset securitizations attorney
Associate

Ross is active in the firm’s Corporate and Financial Restructuring practice groups. He regularly advises clients on the negotiation and execution of complex business transactions, bankruptcy and financial restructurings, as well as corporate governance and securities matters.

Ross has also written extensively on the subjects of cybersecurity and emerging technologies, and his articles have been featured in Bloomberg Big Law BusinessLaw360 and the National Law Review, among other publications.

Earlier in...

212-850-281