Veeam Completes Acquisition of Securiti AI to Create the Industry’s First Trusted Data Platform for Accelerating Safe AI at Scale

View

What is China’s Data Security Law?

Contributors

Anas Baig

Product Marketing Manager at Securiti

Muhammad Faisal Sattar

Director of Product Legal & Global Data Compliance

FIP, CIPT, CIPM, CIPP/Asia

Published August 9, 2021 / Updated June 26, 2025

Listen to the content

In China, the following are three main laws that cover the data privacy and data security regime:

The focus of this article is on the DSL that was promulgated to standardize data processing activities, ensure data security, promote data development and utilization, and protect the legitimate rights and interests of individuals and organizations.

Scope of Application and Extraterritorial Effect of DSL:

The DSL applies to and regulates data processing activities by organizations and individuals, and security supervision of such activities within the territory of China. The DSL also regulates data processing activities conducted outside of China that harm China’s national security or the public interest, or the legal interests of citizens and organizations in China. It would be right to state that DSL has extensive and extra-territorial application. It imposes a number of obligations on organizations and individuals even those that are not based in China regarding data categorization and classification, data risk controls and risk assessments, cross-border data transfers, and data export controls.

The DSL applies to data recorded in electronic and other forms including digital and cyber information, and information recorded in other forms such as paper records. Data processing activities regulated by DSL include, without limitation, the collection, storage, use, processing, transmission, provision, or disclosure of data.

Organizations and individuals need to understand and fulfill the following requirements of the DSL in order to avoid unnecessary compliance risks and penalties:

1. Data Categorization and Classification Under DSL:

The DSL categorizes data into two main classes: National Core Data, and Important Data. The DSL prescribes stricter regulation and protection of the “National Core Data” that covers data related to national security, the lifeline of the national economy, and people’s livelihoods and that is important to major public interests.There is no clarity on  which category of the data will fall under the important data under the DSL at the moment. The Chinese government will set official criteria for the industry specific important data rather than allow business operators to decide the scope of important data at their discretion. However, under the CAC Draft Data Security Administration Guidelines published in May 2019, important data refers to data that, if leaked, may directly affect national security, economic security, social stability, public health, and safety.

As described under Article 21 of the DSL, the government of China will establish a hierarchical data classification management and data protection system focused on the importance of different types of data to the national economy, national security, and public interest. The relevant departments which shall be responsible for the development of the hierarchical categorization and multilevel data security schemes are as follows:

  1. The national data security coordination mechanism will coordinate with the relevant departments to formulate an important data catalogue at the national level.
  2. Different administrative regions and regulatory authorities of different industrial sectors (the relevant departments) will formulate their own specific important data catalogues with protection requirements.This process involves relevant departments formulating data classification standards and detailed rules for important data identification and declaration within their specific industries and fields, like the "Industrial Field Important Data Identification Guide" or the "Telecommunications Field Important Data Identification Guide."

This will affect how organizations structure their own data classification programs regarding important data and multilevel data protection schemes to protect certain categories of information.

2. Cross Border Data Transfers and Data Localization:

Critical Information Infrastructure (the “CII”) refers to information infrastructure in important industries and sectors (such as information service, public service, and e-government) and other information infrastructure that, if leaked, may severely threaten the national security, national economy, people’s livelihood, and public interests.

The DSL has different cross-border data transfer requirements for the CII operators from those of non-CII operators. Article 31 of the DSL provides that CII operators must comply with data localization and cross-border data transfer measures prescribed under the CSL and subsequent measures. Under the CSL, CII operators are required to ensure that important data, collected or generated in China, is stored within China. CIIs operators can only transfer data out of China when:

  1. There is a genuine business necessity;
  2. The network operator conducts a security assessment in accordance with the measures jointly defined by China’s Cyberspace Administration (the “CAC”) bodies and the relevant departments under the State Council; and
  3. The CII obtains the consent of the concerned individual to transfer personal information outside of China (unless such consent is implied because the individual is the one sending such information).

Whereas all non-CII operators transferring "important data" outside of China will  be required to comply with the rules to be formulated by the CAC and authorities under the State Council.Moreover, once data is identified as "important," an exit security assessment must be declared within two months and its results must be complied with to ensure secure cross-border data flow. This assessment ensures the data transfer will not compromise national security or public interests.

Most importantly, the DSL explicitly prohibits organizations and individuals from providing any data stored in China to foreign law enforcement authorities or other foreign judicial departments without obtaining prior approval from the Chinese government. Organizations need to understand this obligation would significantly impact their cross-border data transfers for the purposes of legal proceedings.

3. Data Security Management System:

The DSL requires that organizations must adopt technical, organizational, and other data security measures to safeguard the protected data categories. Organizations must establish and complete a data security management system. The DSL also imposes obligations on organizations to deploy data security training and organizations are required to designate individuals and departments responsible for data security.

As per Article 29 of the DSL, organizations should also strengthen their risk monitoring measures and take timely remedial measures in the event any security flaw, vulnerability, or other risk is discovered.

Furthermore, under the DSL, organizations that are processing data through the internet are required to comply with the Multi-level Protection Scheme ("MLPS"), a classification system for companies physically located in China and adopted under the CSL. Under MLPS, organizations should:

  1. Ensure their networks are protected against interference, damage, or unauthorized access, and
  2. Classify their infrastructure and application systems in five separate protection levels and fulfill protection obligations as described under Article 27 of the CSL.

4. Risk Assessments:

Under the DSL, China will establish a uniform, authoritative system for data security risk assessment reporting. Article 30 of the DSL imposes an obligation on all organizations to periodically carry out risk assessments of their data handling activities and practices for the handling of "important data". Organizations are also required to send these risk assessments to the relevant regulatory departments. Organizations should include the following information in such risk assessment reports:

  1. The categories and quantities of important data processed;
  2. How the data processing activities are carried out; and
  3. Relevant data security risks and response mechanisms.

5. Data Incident Response and Notifications:

Similar to data incident response obligations under the CSL, the DSL also requires organizations to have incident contingency planning. As per Article 29 of the DSL, organizations have the obligation to immediately remediate the incident, promptly notify relevant individuals, and report such data security incidents to the regulatory department(s). As required under Article 23 of the DSL, a national data security emergency response mechanism will be established by the Chinese government requiring regulatory departments to initiate emergency response plans in the event of a data security incident.

6. Data Trading Intermediary Services Obligations:

The DSL requires that organizations engaged in data trading intermediary services shall require the data provider to fulfill the following requirements:

  1. Explain the source of the data;
  2. Examine the identity of both parties to the transaction; and
  3. Keep audit and transaction records when providing services.

7. Other General Obligations:

  • Organizations and individuals are required to adopt a legal and legitimate way to collect data, and should not steal or obtain data in other illegal ways.
  • Where laws and administrative regulations contain provisions on the purposes and scope of data collection and use, organizations must collect and use data within the purposes and scope prescribed by laws and administrative regulations.

Penalties for Non-Compliance:

Chapter VI of the DSL provides that organizations and individuals who fail to comply with DSL requirements may face enforcement notices/warnings and fines up to RMB 1 million in severe cases, as well as sanctions with very significant operational consequences such as suspension of business, etc.

Individuals and organizations that fail to meet data security protection obligations of the DSL may be subject to an order to correct, a warning, and/or a fine of not less than RMB50,000 but not more than RMB500,000. Furthermore, criminal liability may be imposed if a violation of the DSL amounts to a criminal offense; such criminal liability may extend to individuals or directors of organizations.

The DSL also provides individuals a right to complain and bring civil claims against any non-compliance with the DSL.

How Securiti Can Help

Global privacy regulations are encouraging organizations to be responsible custodians of their consumers' data and automate privacy and security operations. In order to operationalize  compliance, organizations need to incorporate robotic automation in order to keep up with the current digital landscape. Several organizations offer software that helps companies comply with global privacy regulations, but these solutions have been restricted to mainly process-driven tasks or rudimentary data-driven functions.

Securiti combines reliability, intelligence, and simplicity, working on the PrivacyOps framework to allow end-to-end automation for organizations. Securiti can help you stay compliant with China’s Data Security Law, as well as other privacy and security regulations all over the world. See how it works. Request a demo today.

Frequently Asked Questions (FAQs)

The Data Security Law in China governs the creation, use, storage, transfer of data in China. More specifically, it is focused on protecting national security and public interest. It also sets requirements for data processing and cross-border data transfers.

The Chinese cybersecurity law includes various regulations aimed at safeguarding China's cyberspace and network security. The Data Security Law is a component of this broader framework, focusing specifically on data protection and security measures.

China has implemented a comprehensive system of internet censorship and content control called the Golden Shield Project and colloquially referred to as the "Great Firewall of China." This system restricts access to certain websites and platforms and monitors online content for compliance with government guidelines. It also includes restrictions on virtual private networks (VPNs) and other tools used to bypass internet censorship.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox



More Stories that May Interest You

Take a
Product Tour

See how easy it is to manage privacy compliance with robotic automation.

Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Latest
View More
DataAI Security: Why Healthcare Organizations Choose Securiti
Discover why healthcare organizations trust Securiti for Data & AI Security. Learn key blockers, five proven advantages, and what safe data innovation makes possible.
View More
The Anthropic Exploit: Welcome to the Era of AI Agent Attacks
Explore the first AI agent attack, why it changes everything, and how DataAI Security pillars like Intelligence, CommandGraph, and Firewalls protect sensitive data.
HIPAA PHI Explained: Identifiers, De-identification & Compliance Checklist View More
HIPAA PHI Explained: Identifiers, De-identification & Compliance Checklist
Discover what PHI is under HIPAA. Understand what is considered PHI as per HIPAA Rules, the list of 18 identifiers, and what happens to...
Red Teaming View More
What is AI Red Teaming? Complete Guide
AI red teaming tests AI systems for security, safety, and misuse risks. Learn how it works, common techniques, real-world use cases, and why it...
View More
Australia’s Privacy Overhaul: Landmark Reforms in Privacy, Cyber Security & Online Safety
Access the whitepaper and gain insights into Australia’s Privacy Law landscape, CSLP, Social Media Minimum Age Act, and how Securiti helps ensure swift compliance.
View More
CNIL’s €475 Million Cookie Consent Enforcement: Key Lessons for Organizations
Download the whitepaper to learn about CNIL’s €475 million cookie consent enforcement fine. Discover key lessons for organizations and how to automate compliance.
View More
Solution Brief: Microsoft Purview + Securiti
Extend Microsoft Purview with Securiti to discover, classify, and reduce data & AI risk across hybrid environments with continuous monitoring and automated remediation. Learn...
Top 7 Data & AI Security Trends 2026 View More
Top 7 Data & AI Security Trends 2026
Discover the top 7 Data & AI security trends for 2026. Learn how to secure AI agents, govern data, manage risk, and scale AI...
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
The DSPM Architect’s Handbook View More
The DSPM Architect’s Handbook: Building an Enterprise-Ready Data+AI Security Program
Get certified in DSPM. Learn to architect a DSPM solution, operationalize data and AI security, apply enterprise best practices, and enable secure AI adoption...
What's
New