Legal Updates from some of our members
Revised Measures Released to Strengthen Cybersecurity Review in China
The revised Cybersecurity Review Measures has been promulgated on December 28, 2021 and is to become effective on February 15, 2022.
- Cybersecurity Review Measures to Implement Laws
The State Security Law, effective on July 1, 2015, for the first time vowed to establish a review and regulation system and mechanism for State security and to carry out security review against foreign investment, key technologies, and network information technology products and services that affect or may affect State security (Article 59 of the State Security Law). As part of the efforts to safeguard State security in cyberspace, the Cybersecurity Law, effective on June 1, 2017, requires security review by Cyberspace Administration of China (“CAC”) and other competent authorities of any purchase of network products and services by critical information infrastructure operators that may affect State security (Article 35 of the Cybersecurity Law). The Data Security Law, effective on September 1, 2021, plans to establish a data security review system to review data processing activities that affect or may affect State security and further provides that a security review decision is final and unappealable.
CAC has enacted the Cybersecurity Review Measures and its Revisions to implement the above laws.
- Security Review Targets Purchase of Network Products and Services and Data Processing Activities
Briefly, any purchase of network products and services by critical information infrastructure operators and data processing activities by data processors that affect or may affect State security require cybersecurity review (critical information infrastructure operators and data processors, collectively the “Operators”).
Critical information infrastructure: under the Security Protection Regulations for Critical Information Infrastructure, critical information infrastructure is designated by industrial information infrastructure protection regulators. Regulators will inform operators of the designated infrastructure and will fill the infrastructure with the State Council.
Network products and services: mainly core network equipment, important communication products, high-performance computers and servers, mass storage devices, large databases and application software, cybersecurity equipment, cloud computing services, and other network products and services that have a significant impact on the security of critical information infrastructures.
Data processing: the Data Security Law defines data processing broadly, involving collection, storage, use, processing, transmission, provision and disclosure of data.
State security: according to the State Security Law, State security refers to the condition in which the state power, sovereignty, unity and territorial integrity, people’s welfare, sustainable economic and social development, and other vital interests of the State shall relatively face no danger or encounter no internal and external threats, as well as the capability to safeguard sustainable safety condition. Vagueness and broadness of the above definition largely increase the difficulty in understanding the criteria of security review which is “affect or may affect State security”, especially considering that Operators concerned are required to prejudge whether their purchase of network products and services would affect or may affect State security and, if yes, are obligated to apply for security review. Thankfully, the Cybersecurity Review Measures and its Revision shed certain light on how to assess the potential State security concern (please refer to Section 5 for details).
There is also a catch-all clause for the discretion of the government: where member authorities of cybersecurity review working mechanism deem that network products and services, data processing activities or overseas IPOs affect or may affect State Security, the Office of Cybersecurity Review under CAC may initiate security review after receiving approval from the Central Cyberspace Affairs Commission (“CCAC”).
- Revised Measures Stresses Overseas IPOs
The Revised Measures add an Article 7, which expand the reporting and application obligation to include any Operator concerned who possesses the personal information of more than one million users and goes public abroad.
The investigation over the IPO of DiDi has illustrated that regulators in China are seeking to curb overseas IPOs of domestic enterprises potentially exposed to State security risks. The Article 7 adopts a higher standard for IPO enterprises, as qualified overseas IPOs are linked to cybersecurity reviews without exception. This reflects the view of regulators in China that enterprises holding large scales of personal information are almost invariably linked to national and cybersecurity risks.
Notably, the Revised Measures used “become listed in other countries” throughout instead of the more common expressions such as “listed on foreign exchanges”. This way of expression seems to imply that enterprises to be listed on the Stock Exchange of Hong Kong will not be subject to cybersecurity review under the new Article 7. This could be interpreted as a concession to allow domestic enterprises to achieve their fund-raising targets through IPOs on a foreign market, while maintaining the risk of data exposure at an acceptable level.
- Revisions in Response to the Data Security Law
The Revised Measures provides that data processors and data processing as subjects of cybersecurity reviews alongside critical information infrastructure operators and purchasing activities respectively. In Article 10, the Revised Measures quote the classification of core data and important data from the Data Security Law for assessing the risks from the potential purchase of network products and services and data processing. This means that cybersecurity reviews conducted under the Revised Measures will also cover all types of data processors and processing activities as defined in the Data Security Law.
- Risk Factors to be Considered in Cybersecurity Reviews
CAC will consider the following main risk factors when conducting cybersecurity review:
- Risks of illegal control, interference or destruction of critical information infrastructure resulting from the use of network products and services;
- Harms caused by supply interruption of network products and services to the business continuity of critical information infrastructure;
- Security, openness, transparency and diversity of sources of network products and services, reliability of supply channels, and risks of supply interruption due to political, diplomatic, trade or other factors;
- Information on compliance with Chinese laws, administrative regulations and departmental rules by network product and service providers;
- Risks of theft, leakage, damage, illegal use or cross-border transfer of core data, important data or large quantity of personal information;
- Risks of influence, control or malicious use of critical information infrastructure, core data, important data or large quantity of personal information by foreign governments after overseas listing; and
- Other factors that may endanger critical information infrastructure security and national data security.
- Procedures of the Cybersecurity Review
The current Cybersecurity Review Measures requires special review process to be completed within 45 working days, which can be “appropriately extended” for complicated cases. The Revised Measures extended this limit to 90 working days, and allows it to be simply “extended” for complicated cases. The actual review will be conducted by China Cybersecurity Review Technology and Certification Center.
To briefly summarize the procedures, the Office of Cybersecurity Review under CAC is generally responsible for conducting review with assistance from member authorities of cybersecurity review working mechanism. The Office of Cybersecurity Review will decide whether a review is needed, conduct preliminary review, solicit member authorities on the preliminary review conclusions, conduct special review if needed, and liaise with Operators throughout the process. In the case of a special review, the Office of Cybersecurity Review will report to CCAC for approval before making the final conclusion.
The following flow chart represents the process prescribed in the Revised Measures.
For Chinese enterprises currently listed or seeking IPOs on exchanges in other countries, it is advisable to follow closely on this recent legislation, and prepare to meet the more stringent compliance standard for data protection.
This Newsletter is only offered for the purpose of sharing information. It discusses legal developments and should not be regarded as legal advice for specific situations. If you wish to obtain more information, please contact us at .
Other Articles
The Law Firm Network grants The 2023 LFN Award to the New York City Urban Debate League
blogThe award was delivered during The Law Firm Network’s Annual Conference which took place in the city of New York in the month of April.NYC Urban Debate League provides academic debate opportunities to students in underserved NYC communities, with a focus on...
The Law Firm Network organises two new webinars
blogThis spring, The Law Firm Network offers its members two new webinars.The first one: 'What does it mean to become a partner in a Law Firm ?’ ► 20 June 2023 Will help young lawyers to learn more about the path to become a partner, the responsibilities and benefits...
Annual Conference 2023 New York Recap
blogWatch the recap of The Law Firm Network’s Annual Conference New York 2023 hosted by US member firm Brown Rudnick.The event took place in late April and gathered members and guest speakers from all across the globe who enjoyed an outstanding professional and...
Rafael Truan Blanco, Executive Director of The Law Firm Network, speaks to The Legal 500 about the future of law networks
blogHow has the pandemic and the flexi-working revolution affected the network model? It is widely known that the pandemic has accelerated the adoption of digital technologies and that, in general, there has been a greater uptake of remote working in law firms....
New young lawyer exchange between German and Italian LFN member firms
blogGerman member firm HAVER & MAILÄNDER has welcomed Giorgia Innamorato, from Italian member firm Cocuzza & Associati , as part of The Law Firm Network Young Lawyers Secondment Program that promotes the exchange of young lawyers between member firms.The initiative...
Executive Director Rafael Truan visits member firms
blogOur Executive Director Rafael Truan Blanco has been recently visiting member firms from Portugal: AMSA, Ireland: BHSM and UK: Blandy & Blandy, to meet partners and associates, and explain the LFN activities developed in the course of the last two years.Rafael...
The LFN Lawyers Exchange Program is kicking off once again!
blogThe Law Firm Network has put in place its 'Lawyers Exchange Programa program', an initiative that, every year, promotes the exchange of young lawyers between member firms, making a monetary contribution to support the lawyer’s expenses. The Program aims to...
Irene Afxentiou, Associate Lawyer at Cypriot member firm LLPO, wins the LFN Young Lawyers Essay Award 2023
blogWe are glad to announce that Irene Afxentiou, Associate Lawyer at Cypriot member firm LLPO, is the winner of the LFN Young Lawyers Essay Award 2023 for her paper ‘Human Trafficking and its unwavering Existence’. The jury, formed by, Valérie Nicod Nicod (Partner at...
LFN Year in Review 2022
YearbookEDITOR'S NOTEWith this publication, 2022 Year in Review, The Law Firm Network aims to give a quick overview of what this year has been like for our organisation. This brochure is also useful for potential new members when considering joining our organisation....
Annual Conference 2022 Video Summary
blog Watch the video summary of The Law Firm Network's Annual Conference, Budapest 2022, where members lawyers from across the globe gathered together to network, exchange knowledge, and discuss a variety of interesting topics about the legal profession.Other Articles...
Site map
The Law Firm Network is a network of independent law firms originated in 1989. Our members are not affiliated in the joint practice of law; each member firm is an independent law firm and renders professional services on an individual and separate basis.