<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>China - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/china/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/china/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 10 Jan 2024 13:28:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>China - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/china/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>PIPL: is information system decoupling necessary to comply with protectionist local laws?</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/12/pipl-is-information-system-decoupling-necessary-to-comply-with-protectionist-local-laws/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/12/pipl-is-information-system-decoupling-necessary-to-comply-with-protectionist-local-laws/#respond</comments>
		
		<dc:creator><![CDATA[Rémi Bossuet]]></dc:creator>
		<pubDate>Wed, 20 Dec 2023 14:03:37 +0000</pubDate>
				<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cyber strategy]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[decoupling]]></category>
		<category><![CDATA[PIPL]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=22056</guid>

					<description><![CDATA[<p>The PIPL (Personal Information Protection Law) has emerged as an unprecedented first example of highly protective regulation of personal data, establishing an uncertain framework that reinforces China&#8217;s control. Despite recent clarifications from China’s authorities, the centralisation of information systems continues...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/12/pipl-is-information-system-decoupling-necessary-to-comply-with-protectionist-local-laws/">PIPL: is information system decoupling necessary to comply with protectionist local laws?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">The PIPL (Personal Information Protection Law) has emerged as an unprecedented first example of highly protective regulation of personal data, establishing an uncertain framework that reinforces China&#8217;s control. <a href="https://www.riskinsight-wavestone.com/en/2023/12/impact-of-pipl-evolution-on-your-privacy-compliance-strategy/">Despite recent clarifications</a> from China’s authorities, the centralisation of information systems continues to be called into question.</p>
<p style="text-align: justify;">This regulatory challenge extends well beyond China&#8217;s borders, raising fundamental questions about <span style="color: #8d2dad;"><strong>how to comply with divergent local regulations in the context of centralised global information systems</strong></span>.</p>
<p style="text-align: justify;">In this article, we explore technological measures to address the concerns of many CIOs about the PIPL law.</p>
<h2 style="text-align: left;"><strong>1/ PIPL raises broader risks than just compliance risks, highlighting a trend towards decoupling operations</strong></h2>
<p style="text-align: justify;">The PIPL is part of China&#8217;s digital sovereignty strategy and raises cross-functional issues that go far beyond IT and cyber security. We note that <em>&#8220;80% of French companies operating in China have had to adapt their global operations by decoupling certain processes in China<a href="#_ftn1" name="_ftnref1"><strong>[1]</strong></a>&#8220;</em>. At the root of this trend are risks such as <span style="color: #8d2dad;"><strong>espionage</strong>, <strong>compromise of intellectual property</strong> or <strong>regulatory non-compliance</strong></span>.</p>
<p style="text-align: justify;">A decoupled business process must be accompanied by IT decoupling. IT decoupling is the act of separating a part of an IS to make it more flexible and modular. This allows the decoupled components to operate independently of the central system.</p>
<p style="text-align: justify;">Before starting work to comply with the PIPL law, companies need to ask themselves 3 essential questions:</p>
<ul style="text-align: justify;">
<li><span style="color: #8d2dad;"><strong>Should we maintain a presence in China?</strong></span> A decision at Executive Committee level needs to be made in the light of a strategic analysis assessing the cost/benefit ratio in relation to the current risks. For example, some suppliers refuse to expand their activities in China to avoid losing control of their source code.</li>
<li><span style="color: #8d2dad;"><strong>If so, should I decouple my IT architecture to mitigate the risks? </strong></span>It is essential to highlight this study in relation to potential changes in the regulatory landscape to ensure long-term compliance.</li>
<li><span style="color: #8d2dad;"><strong>How do I operate and secure a decentralised system?</strong> </span>IT and cyber restructuring should be planned according to the different architectural choices made: how should IAM be managed? How can SOC supervision be set up on a decentralised system?</li>
</ul>
<p style="text-align: justify;"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-22052" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/12/Picture1.jpg" alt="" width="498" height="345" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/12/Picture1.jpg 498w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/12/Picture1-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/12/Picture1-56x39.jpg 56w" sizes="(max-width: 498px) 100vw, 498px" /></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>2/ Putting in place a &#8220;privacy-by-design&#8221; IS architecture</strong></h2>
<p style="text-align: justify;">The varied nature of the rules governing the storage and processing of personal data raises a question: <span style="color: #8d2dad;"><strong>is it possible to adapt an IS to facilitate compliance work? Is a &#8220;privacy-by-design&#8221; architecture realistic?</strong></span></p>
<p style="text-align: justify;">There are 3 possible scenarios, depending on the company&#8217;s risk appetite and strategic positioning:</p>
<ul style="text-align: justify;">
<li>First, we have our <span style="color: #8d2dad;"><strong>centralised IS</strong></span> (the one we all know). By pooling resources, we can deliver the same service on the same scale and achieve economies of scale. However, Chinese data must be subject to a specific transfer, <a href="https://www.riskinsight-wavestone.com/en/2023/12/impact-of-pipl-evolution-on-your-privacy-compliance-strategy/">approved by the CAC</a> (Cyberspace Administration of China). To control and monitor this transfer, <strong>all data flows in and out of China could pass through a single gateway </strong>(also facilitating emergency isolation, such as Red Buttons). The risk of regulatory non-compliance is controlled at the time of implementation, but <strong>can easily drift over time</strong> (operational change, application change, new Chinese amendment, etc.).</li>
<li>Then we have a <span style="color: #8d2dad;"><strong>partially decentralised IS</strong> </span>(where the Chinese application instance is decoupled). Data is stored and processed in China using a specific Cloud tenant or an on-premise infrastructure. <strong>Application links persist </strong>between China and the rest of the world, and data may be transferred from time to time (depending on the regulatory constraints in force). Chinese data is kept separate from the rest, making it easier to ensure the security and confidentiality of personal data.</li>
<li>Finally, we have a <span style="color: #8d2dad;"><strong>decoupled IS</strong></span>, with an independent local authority. This option is certainly the most advanced, <strong>ensuring the highest level of compliance</strong>. However, it drastically increases operating costs (local teams, local infrastructure, etc.): this position is difficult to maintain if the company is committed to reducing IT and/or cyber costs. This architecture also provides significant resilience in the event of geopolitical crises, making it easier to execute an <strong>exit plan</strong>. Recent examples of geopolitical tensions include the Russian<a href="#_ftn2" name="_ftnref2">[2]</a> <a href="#_ftn3" name="_ftnref3">[3]</a> subsidiaries Carlsberg and Danone, which were nationalised by Russia, and the war in Ukraine, which led to numerous carve-outs, such as that of Heineken<a href="#_ftn4" name="_ftnref4">[4]</a>.</li>
</ul>
<p style="text-align: justify;"><img decoding="async" class="aligncenter size-full wp-image-22054" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/12/Picture2.jpg" alt="" width="945" height="262" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/12/Picture2.jpg 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/12/Picture2-437x121.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/12/Picture2-71x20.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/12/Picture2-768x213.jpg 768w" sizes="(max-width: 945px) 100vw, 945px" /></p>
<p> </p>
<h3 style="text-align: justify;"><span style="color: #778aa8;"><strong><em>Should I choose a Cloud Service Provider (CSP) in China?</em></strong></span></h3>
<p style="text-align: justify;">Alibaba Cloud has long been the preferred Cloud Provider because of the variety of services it offers compared with non-Chinese CSPs. Although this difference between Chinese and non-Chinese CSPs is tending to disappear, <strong>Alibaba Cloud could remain the preferred choice</strong>: as a Chinese provider, this CSP would be well advised to adapt quickly to any new Chinese regulatory requirements.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><span style="color: #778aa8;"><strong><em>How should data transfer be managed? </em></strong></span></h3>
<p style="text-align: justify;">In a centralised and partially decentralised architecture, data continues to be transferred. Depending on the sensitivity of the data transferred, we can implement data <strong>anonymisation</strong> or use <a href="https://www.riskinsight-wavestone.com/en/2022/12/confidential-computing-revolution-or-new-mirage/">confidential computing</a>, an increasingly mature technology that guarantees data confidentiality during processing.</p>
<p style="text-align: justify;">However, some cases do not necessarily require data to be transferred. This is the case with certain decentralised <strong>learning methods for AI</strong> that are &#8220;privacy-by-design&#8221; (e.g. bagging, federated learning, etc.): the systems are trained locally, and only the learning is transferred.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>3/ What can we do in this climate of uncertainty, both in the short and long term?</strong></h2>
<h3 style="text-align: justify;"><span style="color: #778aa8;"><strong><em>Short term: a pragmatic risk-based approach  </em></strong></span></h3>
<p style="text-align: justify;">The compliance strategy must be the result of a pragmatic, risk-based approach, in order to minimise the impact on operations. The main steps are as follows:</p>
<ol style="text-align: justify;">
<li><strong>Make an inventory of all the data affected: </strong>what data and how is it used? How is the data stored, transferred, and processed? How are data access rights managed? Are there any external dependencies with suppliers?</li>
<li><strong>Assess the risks</strong> associated with the data and its use. The format and content of the study must comply with CAC standards.</li>
<li><strong>Arbitrate a compliance strategy:</strong> draw up a compliance strategy based on the 3 scenarios detailed in the previous sections, depending on the sensitivity and criticality of the application data in question.</li>
<li><strong>Implement technical measures:</strong> implement security and confidentiality measures (decoupling, encryption, pseudonymisation, anonymisation, access controls, etc.).</li>
<li><strong>Monitor and maintain compliance: </strong>establish a regular monitoring process to maintain compliance with the PIPL.</li>
</ol>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><span style="color: #778aa8;"><strong><em>Long term: should I be preparing to decouple my IS in China?</em></strong></span></h3>
<p style="text-align: justify;">PIPL compliance strategy should consider long-term trends, current geopolitical tensions and China’s increasing emphasis on data protection and sovereignty (and uncertainty of current laws).</p>
<p style="text-align: justify;">The cybersecurity <a href="https://www.riskinsight-wavestone.com/en/2023/09/cyber-regulatory-landscape-challenges-and-prospects/">regulatory landscape</a> has become denser and more complex in recent years, recalling one of the futures envisaged by the Cyber Campus<a href="#_ftn5" name="_ftnref5">[5]</a>. <strong>Ultra-regulation</strong>, linked to the tightening of regulations with the aim of restoring digital confidence, could lead to regulatory incompatibilities and numerous non-compliances or fines.</p>
<p style="text-align: justify;">Fortunately, we are not yet at this stage. However, we must anticipate this trend: <strong>PIPL compliance must be a case study forming part of an in-depth reflection on decoupling </strong>(with varying levels of separation depending on the situation). This trend towards decoupling could become essential on a wider scale in the next ten years.</p>
<p> </p>
<p style="text-align: left;"><a href="#_ftnref1" name="_ftn1">[1]</a> <u>CCI France CHINE : Enquête sur les entreprises en Chine, Printemps 2022 </u><a href="https://www.ccifrance-international.org/le-kiosque/n/enquete-sur-les-entreprises-francaises-en-chine-printemps-2022.html#:~:text=Enqu%C3%AAte%20sur%20les%20entreprises%20fran%C3%A7aises%20en%20Chine%20%2D%20Printemps%202022,-25%20mai%202022&amp;text=Avec%20plus%20de%202%20100,de%20ces%20entreprises%20depuis%201992">https://www.ccifrance-international.org/le-kiosque/n/enquete-sur-les-entreprises-francaises-en-chine-printemps-2022.html#:~:text=Enqu%C3%AAte%20sur%20les%20entreprises%20fran%C3%A7aises%20en%20Chine%20%2D%20Printemps%202022,-25%20mai%202022&amp;text=Avec%20p</a><u>.</u></p>
<p style="text-align: left;"><a href="#_ftnref2" name="_ftn2">[2]</a> Le Monde, 26/07/2023, <em>« Danone : comment le piège russe s’est refermé sur le géant français des produits laitiers » </em><a href="https://www.lemonde.fr/economie/article/2023/07/26/danone-comment-le-piege-russe-s-est-referme-sur-le-geant-francais-des-produits-laitiers_6183438_3234.html">https://www.lemonde.fr/economie/article/2023/07/26/danone-comment-le-piege-russe-s-est-referme-sur-le-geant-francais-des-produits-laitiers_6183438_3234.html</a></p>
<p style="text-align: left;"><a href="#_ftnref3" name="_ftn3">[3]</a> Le Temps, 19 juillet 2023, <em>«</em> <em>Après Danone et Carlsberg, la Russie se dirige vers la nationalisation d&#8217;autres filiales de groupes étrangers » </em><a href="https://www.letemps.ch/economie/apres-danone-et-carlsberg-la-russie-se-dirige-vers-la-nationalisation-d-autres-filiales-de-groupes-etrangers">https://www.letemps.ch/economie/apres-danone-et-carlsberg-la-russie-se-dirige-vers-la-nationalisation-d-autres-filiales-de-groupes-etrangers</a></p>
<p style="text-align: left;"><a href="#_ftnref4" name="_ftn4">[4]</a> Les Echos, 25 août 2023, <em>« Heineken se retire définitivement de Russie » </em><a href="https://www.lesechos.fr/industrie-services/conso-distribution/heineken-se-retire-definitivement-de-russie-1972549">https://www.lesechos.fr/industrie-services/conso-distribution/heineken-se-retire-definitivement-de-russie-1972549</a></p>
<p style="text-align: left;"><a href="#_ftnref5" name="_ftn5">[5]</a> Horizon Cyber 2030 : perspectives et défis, Campus Cyber <a href="https://campuscyber.fr/resources/anticipation-des-evolutions-de-la-menace-a-venir/">https://campuscyber.fr/resources/anticipation-des-evolutions-de-la-menace-a-venir/</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/12/pipl-is-information-system-decoupling-necessary-to-comply-with-protectionist-local-laws/">PIPL: is information system decoupling necessary to comply with protectionist local laws?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/12/pipl-is-information-system-decoupling-necessary-to-comply-with-protectionist-local-laws/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Impact of PIPL evolution on your privacy compliance strategy</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/12/impact-of-pipl-evolution-on-your-privacy-compliance-strategy/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/12/impact-of-pipl-evolution-on-your-privacy-compliance-strategy/#respond</comments>
		
		<dc:creator><![CDATA[Hana Pospisilikova]]></dc:creator>
		<pubDate>Fri, 15 Dec 2023 14:00:00 +0000</pubDate>
				<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[data transfer]]></category>
		<category><![CDATA[PIPL law]]></category>
		<category><![CDATA[privacy]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=21998</guid>

					<description><![CDATA[<p>China may soon ease PIPL cross-border data transfer requirements, but your privacy compliance strategy should focus on the long term. Your company operates in China. You compile personal data relating to your Chinese employees and transfer them to your headquarters...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/12/impact-of-pipl-evolution-on-your-privacy-compliance-strategy/">Impact of PIPL evolution on your privacy compliance strategy</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 style="text-align: center;"><span style="color: #6c1ea8;">China may soon ease PIPL cross-border data transfer requirements, but your privacy compliance strategy should focus on the long term.</span></h3>
<p style="text-align: justify;">Your company operates in China. You compile personal data relating to your Chinese employees and transfer them to your headquarters for HR purposes. You also collect personal information on Chinese customers buying products on your website and make it accessible to global departments outside of China. Since the coming into effect of <strong>China’s Personal Information Protection Law (PIPL)</strong> in November 2021, you may constantly have been wondering if your cross-border data transfers comply to China’s data privacy regulations.</p>
<p> </p>
<h2 style="text-align: left;">A complex and uncertain system of laws governing data transfers outside of China</h2>
<p style="text-align: justify;">In fact, PIPL is only one of many Chinese data protection laws.  It builds on top of both <strong>China&#8217;s Cybersecurity Law</strong> (CSL, 2017) and <strong>China&#8217;s Data Security Law </strong>(DSL, 2021). It applies to any organization processing personally identifiable information from China in China and abroad. Under PIPL, international data transfers are possible following an approval from the Cyberspace Administration of China (CAC). The article 38 of PIPL offers four ways of getting this approval, some of them subsequently completed by <strong>five additional measures and guidelines</strong> (2022-2023)<a href="#_ftn1" name="_ftnref1">[1]</a> detailing how to comply and who is concerned.</p>
<p style="text-align: justify;">In a nutshell, if you engage in the cross-border data transfer of a <strong>relatively small volume</strong> of personal information, you have two options: get certified by a designated institution in accordance with the regulations of the CAC, or sign a contract with the overseas recipient of the data in line with the standard contract formulated by the CAC.</p>
<p style="text-align: justify;">In other cases, you need to pass a <strong>security assessment</strong> organized by the CAC. This is the highest bar of compliance and applies to companies who are critical information infrastructure operators (CIIO), handle personal information of more than one million people, export personal information of 100,000 people or “sensitive” personal information of 10,000 people, or export “important” data. This gives the CAC <strong>room for interpretation</strong>, possibly qualifying any data as “important”. Furthermore, in all the above-mentioned cases, the CAC reserves the <strong>right to overview</strong> all cross-border data transfers and stop them based on a large spectrum of justifications.</p>
<p style="text-align: justify;">Besides a complex and constantly evolving regulatory landscape leaving China’s authorities with many options to oppose a data transfer, you are burdened with two additional facts on your way to compliance. First, the procedures for getting approval from the CAC may be <strong>time-consuming</strong>, in particular the rigorous security assessment by the CAC. Second, even if you manage to get the CAC’s approval for a data transfer, you still need to <strong>obtain consent</strong> from the people whose data are being transferred as well (article 39 of PIPL).</p>
<p style="text-align: justify;">With all this information, you may have been confused when drafting your PIPL compliance strategy. To this day, you may not be sure if your data transfers comply, and even if compliance is possible at all.</p>
<p> </p>
<h2 style="text-align: left;">An upcoming easing of cross-border data transfer requirements</h2>
<p style="text-align: justify;">Interestingly, Chinese authorities have recently recognized the challenges faced when exporting data from China. China’s State Council has officially identified cross-border data transfers as one of 24 areas to improve in order to attract foreign investment to China<a href="#_ftn2" name="_ftnref2">[2]</a>. Therefore, in September 2023, the CAC issued a <strong>draft proposition of exemptions</strong> from the cross-border data transfer mechanism<a href="#_ftn3" name="_ftnref3">[3]</a>.</p>
<p style="text-align: justify;">You could be freed from the above-mentioned article 38 procedures (security assessment, certification, or specific contract) in the following cases, which were under public discussion until mid-October:</p>
<ul style="text-align: justify;">
<li>You could transfer employee data from China if this was necessary for human resources management in accordance with law and lawfully formulated collective contracts</li>
<li>You could transfer customer data from China for the purpose of entering into and performing a contract to which the customer is a party, such as cross-border e-commerce, cross-border remittance, air ticket booking and visa processing</li>
<li>You could transfer personal information from China in order to protect the life, health and property safety of people in emergencies</li>
<li>You would only need to do a CAC security assessment for
<ul>
<li>transfers of data for more than one million people, likely beyond the cases mentioned above</li>
<li>“important” data transfers, where data are not considered “important” unless you have officially been notified of the contrary</li>
</ul>
</li>
</ul>
<p style="text-align: justify;">This is great news. It means that in many cases, you could continue transferring personal information from China without administrative burden and without risking non-compliance and associated fines.</p>
<p style="text-align: justify;">However, it is currently unclear when these exceptions would be enacted, if at all, and what the final list could look like. Besides, the CAC highlighted two issues that you would still be confronted to. First, <strong>specific consent</strong> from people whose data are being transferred internationally would still be required under PIPL if consent is the legal basis for the data processing – which may be the case for most processing cases outside of the execution of a contract. Second, and more importantly, the CAC would keep the <strong>right to overview</strong> all cross-border data transfers, investigate high-risk transfers and even stop them altogether.</p>
<p style="text-align: justify;">So if you think that you may soon once again be able to transfer a good part of your China-generated personal information abroad without constraints, you may not be right.  </p>
<p> </p>
<h2 style="text-align: left;">Keeping data in China, the safest long-term compliance strategy</h2>
<p style="text-align: justify;">Working with all this information, how to prepare a <strong>good compliance strategy</strong> related to China’s personal information protection laws?</p>
<p style="text-align: justify;">On the <strong>legal side</strong>, you face laws that are complex to understand, constantly evolving, and subject to interpretation by the authorities. Unlike with the GDPR, you can’t tell if you are compliant as of now, and even less in the coming months and years.</p>
<p style="text-align: justify;">Add to this the <strong>technical side</strong>: in global companies, information circulates. Data reside in both universal platforms for global operations, including HR and customer management, and interconnected local systems. It will be a challenge just to identify all personal information and figure out associated data flows before any specific protection measures can be discussed.</p>
<p style="text-align: justify;">Besides, let’s not forget that the <strong>stakes are high</strong>: in case of non-compliance, the CAC can restrict your data transfers, fine your company and executives, and even force your business to close in China.</p>
<p style="text-align: justify;">You should take advantage of the fact that the CAC currently focuses on adapting rather than enforcing its personal information protection laws and consider a more <strong>long-term compliance strategy</strong>. This strategy may consist in ensuring that data actually stay in China instead of being systematically transferred to your headquarters.</p>
<p style="text-align: justify;">In the long term, China undeniably aims for <strong>digital sovereignty</strong>. Among the <a href="https://www.riskinsight-wavestone.com/en/2023/09/cyber-regulatory-landscape-challenges-and-prospects/">many laws</a> published by countries to regulate cyber space and protect personal data, PIPL is unique in that it significantly challenges the information system model of global companies, which consists in a centralized IT concentrating information from all locations. But in a world where geopolitical tensions intensify, we can expect <strong>even more calls</strong> for IT protectionism.</p>
<p style="text-align: justify;">Therefore, you should see your PIPL compliance strategy reflections as a case study for <a href="https://www.riskinsight-wavestone.com/en/2023/12/pipl-is-information-system-decoupling-necessary-to-comply-with-protectionist-local-laws/">decoupling of your information system</a>, which you may soon be confronted to at a bigger scale.</p>
<p style="text-align: left;"> </p>
<p style="text-align: justify;"><a href="#_ftnref1" name="_ftn1">[1]</a> 2022: <a href="http://www.cac.gov.cn/2022-07/07/c_1658811536396503.htm">Measures of Security Assessment for Data Export</a></p>
<p style="text-align: justify;">2022: <a href="https://www.tc260.org.cn/upload/2022-12-16/1671179931039025340.pdf">Practice Guide for Cybersecurity Standards – Outbound Transfer Certification Specification V2.0 for Cross-border Processing of Personal Information (Exposure Draft)</a></p>
<p style="text-align: justify;">2023: <a href="https://www.tc260.org.cn/front/bzzqyjDetail.html?id=20230316143506&amp;norm_id=20221102152946&amp;recode_id=50381">Information Security Technology – Certification Requirements for Cross-border Transmission of Personal Information (Exposure Draft)</a> </p>
<p style="text-align: justify;">2023: <a href="http://www.cac.gov.cn/2023-02/24/c_1678884830036813.htm">Measures on the Standard Contract for Outbound Transfer of Personal Information</a></p>
<p style="text-align: justify;">2023: <a href="http://www.cac.gov.cn/2023-05/30/c_1687090906222927.htm">Guidelines for Filing of Standard Contract for Outbound Transfer of Personal Information (First Edition)</a></p>
<p style="text-align: justify;">2023: <a href="http://www.cac.gov.cn/2023-09/28/c_1697558914242877.htm">Regulations on Standardizing and Promoting Cross-Border Data Flows</a></p>
<p style="text-align: justify;"><a href="#_ftnref2" name="_ftn2">[2]</a>  <a href="https://www.gov.cn/zhengce/content/202308/content_6898048.htm">国务院关于进一步优化外商投资环境加大吸引外商投资力度的意见</a></p>
<p style="text-align: justify;"><a href="#_ftnref3" name="_ftn3">[3]</a> <a href="http://www.cac.gov.cn/2023-09/28/c_1697558914242877.htm">Provisions on Standardizing and Promoting Cross-Border Data Flows (Draft for Comment) </a></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/12/impact-of-pipl-evolution-on-your-privacy-compliance-strategy/">Impact of PIPL evolution on your privacy compliance strategy</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/12/impact-of-pipl-evolution-on-your-privacy-compliance-strategy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
