{"id":21998,"date":"2023-12-15T15:00:00","date_gmt":"2023-12-15T14:00:00","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=21998"},"modified":"2023-12-20T15:06:54","modified_gmt":"2023-12-20T14:06:54","slug":"impact-of-pipl-evolution-on-your-privacy-compliance-strategy","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/","title":{"rendered":"Impact of PIPL evolution on your privacy compliance strategy"},"content":{"rendered":"\n<h3 style=\"text-align: center;\"><span style=\"color: #6c1ea8;\">China may soon ease PIPL cross-border data transfer requirements, but your privacy compliance strategy should focus on the long term.<\/span><\/h3>\n<p style=\"text-align: justify;\">Your company operates in China. You compile personal data relating to your Chinese employees and transfer them to your headquarters for HR purposes. You also collect personal information on Chinese customers buying products on your website and make it accessible to global departments outside of China. Since the coming into effect of <strong>China\u2019s Personal Information Protection Law (PIPL)<\/strong> in November 2021, you may constantly have been wondering if your cross-border data transfers comply to China\u2019s data privacy regulations.<\/p>\n<p>\u00a0<\/p>\n<h2 style=\"text-align: left;\">A complex and uncertain system of laws governing data transfers outside of China<\/h2>\n<p style=\"text-align: justify;\">In fact, PIPL is only one of many Chinese data protection laws. \u00a0It builds on top of both\u00a0<strong>China&#8217;s Cybersecurity Law<\/strong>\u00a0(CSL, 2017) and\u00a0<strong>China&#8217;s Data Security Law\u00a0<\/strong>(DSL, 2021). It applies to any organization processing personally identifiable information from China in China and abroad. Under PIPL, international data transfers are possible following an approval from the Cyberspace Administration of China (CAC). The article 38 of PIPL offers four ways of getting this approval, some of them subsequently completed by <strong>five additional measures and guidelines<\/strong> (2022-2023)<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a> detailing how to comply and who is concerned.<\/p>\n<p style=\"text-align: justify;\">In a nutshell, if you\u00a0engage in the cross-border data\u00a0transfer of a <strong>relatively small volume<\/strong> of personal information, you have two options: get certified by a designated institution in accordance with the regulations of the CAC, or sign a contract with the overseas recipient of the data in line with the standard contract formulated by the CAC.<\/p>\n<p style=\"text-align: justify;\">In other cases, you need to pass a <strong>security assessment<\/strong> organized by the CAC. This is the highest bar of compliance and applies to companies who are critical information infrastructure operators (CIIO), handle personal information of more than one million people, export personal information of 100,000 people or \u201csensitive\u201d personal information of 10,000 people, or export \u201cimportant\u201d data. This gives the CAC <strong>room for interpretation<\/strong>, possibly qualifying any data as \u201cimportant\u201d. Furthermore, in all the above-mentioned cases, the CAC reserves the <strong>right to overview<\/strong> all cross-border data transfers and stop them based on a large spectrum of justifications.<\/p>\n<p style=\"text-align: justify;\">Besides a complex and constantly evolving regulatory landscape leaving China\u2019s authorities with many options to oppose a data transfer, you are burdened with two additional facts on your way to compliance. First, the procedures for getting approval from the CAC may be <strong>time-consuming<\/strong>, in particular the rigorous security assessment by the CAC. Second, even if you manage to get the CAC\u2019s approval for a data transfer, you still need to <strong>obtain consent<\/strong> from the people whose data are being transferred as well (article 39 of PIPL).<\/p>\n<p style=\"text-align: justify;\">With all this information, you may have been confused when drafting your PIPL compliance strategy. To this day, you may not be sure if your data transfers comply, and even if compliance is possible at all.<\/p>\n<p>\u00a0<\/p>\n<h2 style=\"text-align: left;\">An upcoming easing of cross-border data transfer requirements<\/h2>\n<p style=\"text-align: justify;\">Interestingly, Chinese authorities have recently recognized the challenges faced when exporting data from China. China\u2019s State Council has officially identified cross-border data transfers as one of 24 areas to improve in order to attract foreign investment to China<a href=\"#_ftn2\" name=\"_ftnref2\">[2]<\/a>. Therefore, in September 2023, the CAC issued a <strong>draft proposition of exemptions<\/strong> from the cross-border data transfer mechanism<a href=\"#_ftn3\" name=\"_ftnref3\">[3]<\/a>.<\/p>\n<p style=\"text-align: justify;\">You could be freed from the above-mentioned article 38 procedures (security assessment, certification, or specific contract) in the following cases, which were under public discussion until mid-October:<\/p>\n<ul style=\"text-align: justify;\">\n<li>You could transfer employee data from China if this was necessary for human resources management in accordance with law and lawfully formulated collective contracts<\/li>\n<li>You could transfer customer data from China for the purpose of entering into and performing a contract to which the customer is a party, such as cross-border e-commerce, cross-border remittance, air ticket booking and visa processing<\/li>\n<li>You could transfer personal information from China in order to protect the life, health and property safety of people in emergencies<\/li>\n<li>You would only need to do a CAC security assessment for\n<ul>\n<li>transfers of data for more than one million people, likely beyond the cases mentioned above<\/li>\n<li>\u201cimportant\u201d data transfers, where data are not considered \u201cimportant\u201d unless you have officially been notified of the contrary<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">This is great news. It means that in many cases, you could continue transferring personal information from China without administrative burden and without risking non-compliance and associated fines.<\/p>\n<p style=\"text-align: justify;\">However, it is currently unclear when these exceptions would be enacted, if at all, and what the final list could look like. Besides, the CAC highlighted two issues that you would still be confronted to. First, <strong>specific consent<\/strong> from people whose data are being transferred internationally would still be required under PIPL if consent is the legal basis for the data processing \u2013 which may be the case for most processing cases outside of the execution of a contract. Second, and more importantly, the CAC would keep the <strong>right to overview<\/strong> all cross-border data transfers, investigate high-risk transfers and even stop them altogether.<\/p>\n<p style=\"text-align: justify;\">So if you think that you may soon once again be able to transfer a good part of your China-generated personal information abroad without constraints, you may not be right. \u00a0<\/p>\n<p>\u00a0<\/p>\n<h2 style=\"text-align: left;\">Keeping data in China, the safest long-term compliance strategy<\/h2>\n<p style=\"text-align: justify;\">Working with all this information, how to prepare a <strong>good compliance strategy<\/strong> related to China\u2019s personal information protection laws?<\/p>\n<p style=\"text-align: justify;\">On the <strong>legal side<\/strong>, you face laws that are complex to understand, constantly evolving, and subject to interpretation by the authorities. Unlike with the GDPR, you can\u2019t tell if you are compliant as of now, and even less in the coming months and years.<\/p>\n<p style=\"text-align: justify;\">Add to this the <strong>technical side<\/strong>: in global companies, information circulates. Data reside in both universal platforms for global operations, including HR and customer management, and interconnected local systems. It will be a challenge just to identify all personal information and figure out associated data flows before any specific protection measures can be discussed.<\/p>\n<p style=\"text-align: justify;\">Besides, let\u2019s not forget that the <strong>stakes are high<\/strong>: in case of non-compliance, the CAC can restrict your data transfers, fine your company and executives, and even force your business to close in China.<\/p>\n<p style=\"text-align: justify;\">You should take advantage of the fact that the CAC currently focuses on adapting rather than enforcing its personal information protection laws and consider a more <strong>long-term compliance strategy<\/strong>. This strategy may consist in ensuring that data actually stay in China instead of being systematically transferred to your headquarters.<\/p>\n<p style=\"text-align: justify;\">In the long term, China undeniably aims for <strong>digital sovereignty<\/strong>. Among the <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/09\/cyber-regulatory-landscape-challenges-and-prospects\/\">many laws<\/a> published by countries to regulate cyber space and protect personal data, PIPL is unique in that it significantly challenges the information system model of global companies, which consists in a centralized IT concentrating information from all locations. But in a world where geopolitical tensions intensify, we can expect <strong>even more calls<\/strong> for IT protectionism.<\/p>\n<p style=\"text-align: justify;\">Therefore, you should see your PIPL compliance strategy reflections as a case study for <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/pipl-is-information-system-decoupling-necessary-to-comply-with-protectionist-local-laws\/\">decoupling of your information system<\/a>, which you may soon be confronted to at a bigger scale.<\/p>\n<p style=\"text-align: left;\">\u00a0<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> 2022: <a href=\"http:\/\/www.cac.gov.cn\/2022-07\/07\/c_1658811536396503.htm\">Measures of Security Assessment for Data Export<\/a><\/p>\n<p style=\"text-align: justify;\">2022: <a href=\"https:\/\/www.tc260.org.cn\/upload\/2022-12-16\/1671179931039025340.pdf\">Practice Guide for Cybersecurity Standards \u2013 Outbound Transfer Certification Specification V2.0 for Cross-border Processing of Personal Information (Exposure Draft)<\/a><\/p>\n<p style=\"text-align: justify;\">2023: <a href=\"https:\/\/www.tc260.org.cn\/front\/bzzqyjDetail.html?id=20230316143506&amp;norm_id=20221102152946&amp;recode_id=50381\">Information Security Technology \u2013 Certification Requirements for Cross-border Transmission of Personal Information (Exposure Draft)<\/a>\u00a0<\/p>\n<p style=\"text-align: justify;\">2023: <a href=\"http:\/\/www.cac.gov.cn\/2023-02\/24\/c_1678884830036813.htm\">Measures on the Standard Contract for Outbound Transfer of Personal Information<\/a><\/p>\n<p style=\"text-align: justify;\">2023: <a href=\"http:\/\/www.cac.gov.cn\/2023-05\/30\/c_1687090906222927.htm\">Guidelines for Filing of Standard Contract for Outbound Transfer of Personal Information (First Edition)<\/a><\/p>\n<p style=\"text-align: justify;\">2023: <a href=\"http:\/\/www.cac.gov.cn\/2023-09\/28\/c_1697558914242877.htm\">Regulations on Standardizing and Promoting Cross-Border Data Flows<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> \u00a0<a href=\"https:\/\/www.gov.cn\/zhengce\/content\/202308\/content_6898048.htm\">\u56fd\u52a1\u9662\u5173\u4e8e\u8fdb\u4e00\u6b65\u4f18\u5316\u5916\u5546\u6295\u8d44\u73af\u5883\u52a0\u5927\u5438\u5f15\u5916\u5546\u6295\u8d44\u529b\u5ea6\u7684\u610f\u89c1<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref3\" name=\"_ftn3\">[3]<\/a> <a href=\"http:\/\/www.cac.gov.cn\/2023-09\/28\/c_1697558914242877.htm\">Provisions on Standardizing and Promoting Cross-Border Data Flows (Draft for Comment)\u00a0<\/a><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>China may soon ease PIPL cross-border data transfer requirements, but your privacy compliance strategy should focus on the long term. Your company operates in China. You compile personal data relating to your Chinese employees and transfer them to your headquarters&#8230;<\/p>\n","protected":false},"author":1484,"featured_media":22013,"comment_status":"open","ping_status":"closed","sticky":true,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3271,3977],"tags":[4323,2817,4321,4322,3150],"coauthors":[4320,4200],"class_list":["post-21998","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-compliance-en","category-focus","tag-china","tag-data-protection","tag-data-transfer","tag-pipl-law","tag-privacy-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Impact of PIPL evolution on your privacy compliance strategy - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Impact of PIPL evolution on your privacy compliance strategy - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"China may soon ease PIPL cross-border data transfer requirements, but your privacy compliance strategy should focus on the long term. Your company operates in China. You compile personal data relating to your Chinese employees and transfer them to your headquarters...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-15T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-20T14:06:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/dimpexaels-jeshootscom-442584.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"787\" \/>\n\t<meta property=\"og:image:height\" content=\"443\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hana Pospisilikova, R\u00e9mi Bossuet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hana Pospisilikova, R\u00e9mi Bossuet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/\"},\"author\":{\"name\":\"Hana Pospisilikova\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/747d22638454bb51576585103cce931d\"},\"headline\":\"Impact of PIPL evolution on your privacy compliance strategy\",\"datePublished\":\"2023-12-15T14:00:00+00:00\",\"dateModified\":\"2023-12-20T14:06:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/\"},\"wordCount\":1257,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/dimpexaels-jeshootscom-442584.jpg\",\"keywords\":[\"China\",\"data protection\",\"data transfer\",\"PIPL law\",\"privacy\"],\"articleSection\":[\"Digital Compliance\",\"Focus\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/\",\"name\":\"Impact of PIPL evolution on your privacy compliance strategy - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/dimpexaels-jeshootscom-442584.jpg\",\"datePublished\":\"2023-12-15T14:00:00+00:00\",\"dateModified\":\"2023-12-20T14:06:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/dimpexaels-jeshootscom-442584.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/dimpexaels-jeshootscom-442584.jpg\",\"width\":787,\"height\":443},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Impact of PIPL evolution on your privacy compliance strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/747d22638454bb51576585103cce931d\",\"name\":\"Hana Pospisilikova\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/hana-pospisilikova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Impact of PIPL evolution on your privacy compliance strategy - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/","og_locale":"en_US","og_type":"article","og_title":"Impact of PIPL evolution on your privacy compliance strategy - RiskInsight","og_description":"China may soon ease PIPL cross-border data transfer requirements, but your privacy compliance strategy should focus on the long term. Your company operates in China. You compile personal data relating to your Chinese employees and transfer them to your headquarters...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/","og_site_name":"RiskInsight","article_published_time":"2023-12-15T14:00:00+00:00","article_modified_time":"2023-12-20T14:06:54+00:00","og_image":[{"width":787,"height":443,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/dimpexaels-jeshootscom-442584.jpg","type":"image\/jpeg"}],"author":"Hana Pospisilikova, R\u00e9mi Bossuet","twitter_misc":{"Written by":"Hana Pospisilikova, R\u00e9mi Bossuet","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/"},"author":{"name":"Hana Pospisilikova","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/747d22638454bb51576585103cce931d"},"headline":"Impact of PIPL evolution on your privacy compliance strategy","datePublished":"2023-12-15T14:00:00+00:00","dateModified":"2023-12-20T14:06:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/"},"wordCount":1257,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/dimpexaels-jeshootscom-442584.jpg","keywords":["China","data protection","data transfer","PIPL law","privacy"],"articleSection":["Digital Compliance","Focus"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/","name":"Impact of PIPL evolution on your privacy compliance strategy - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/dimpexaels-jeshootscom-442584.jpg","datePublished":"2023-12-15T14:00:00+00:00","dateModified":"2023-12-20T14:06:54+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/dimpexaels-jeshootscom-442584.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/12\/dimpexaels-jeshootscom-442584.jpg","width":787,"height":443},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/12\/impact-of-pipl-evolution-on-your-privacy-compliance-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Impact of PIPL evolution on your privacy compliance strategy"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/747d22638454bb51576585103cce931d","name":"Hana Pospisilikova","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/hana-pospisilikova\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/21998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=21998"}],"version-history":[{"count":9,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/21998\/revisions"}],"predecessor-version":[{"id":22100,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/21998\/revisions\/22100"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/22013"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=21998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=21998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=21998"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=21998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}