Legal Updates from some of our members
Revised Measures Released to Strengthen Cybersecurity Review in China
The revised Cybersecurity Review Measures has been promulgated on December 28, 2021 and is to become effective on February 15, 2022.
- Cybersecurity Review Measures to Implement Laws
The State Security Law, effective on July 1, 2015, for the first time vowed to establish a review and regulation system and mechanism for State security and to carry out security review against foreign investment, key technologies, and network information technology products and services that affect or may affect State security (Article 59 of the State Security Law). As part of the efforts to safeguard State security in cyberspace, the Cybersecurity Law, effective on June 1, 2017, requires security review by Cyberspace Administration of China (“CAC”) and other competent authorities of any purchase of network products and services by critical information infrastructure operators that may affect State security (Article 35 of the Cybersecurity Law). The Data Security Law, effective on September 1, 2021, plans to establish a data security review system to review data processing activities that affect or may affect State security and further provides that a security review decision is final and unappealable.
CAC has enacted the Cybersecurity Review Measures and its Revisions to implement the above laws.
- Security Review Targets Purchase of Network Products and Services and Data Processing Activities
Briefly, any purchase of network products and services by critical information infrastructure operators and data processing activities by data processors that affect or may affect State security require cybersecurity review (critical information infrastructure operators and data processors, collectively the “Operators”).
Critical information infrastructure: under the Security Protection Regulations for Critical Information Infrastructure, critical information infrastructure is designated by industrial information infrastructure protection regulators. Regulators will inform operators of the designated infrastructure and will fill the infrastructure with the State Council.
Network products and services: mainly core network equipment, important communication products, high-performance computers and servers, mass storage devices, large databases and application software, cybersecurity equipment, cloud computing services, and other network products and services that have a significant impact on the security of critical information infrastructures.
Data processing: the Data Security Law defines data processing broadly, involving collection, storage, use, processing, transmission, provision and disclosure of data.
State security: according to the State Security Law, State security refers to the condition in which the state power, sovereignty, unity and territorial integrity, people’s welfare, sustainable economic and social development, and other vital interests of the State shall relatively face no danger or encounter no internal and external threats, as well as the capability to safeguard sustainable safety condition. Vagueness and broadness of the above definition largely increase the difficulty in understanding the criteria of security review which is “affect or may affect State security”, especially considering that Operators concerned are required to prejudge whether their purchase of network products and services would affect or may affect State security and, if yes, are obligated to apply for security review. Thankfully, the Cybersecurity Review Measures and its Revision shed certain light on how to assess the potential State security concern (please refer to Section 5 for details).
There is also a catch-all clause for the discretion of the government: where member authorities of cybersecurity review working mechanism deem that network products and services, data processing activities or overseas IPOs affect or may affect State Security, the Office of Cybersecurity Review under CAC may initiate security review after receiving approval from the Central Cyberspace Affairs Commission (“CCAC”).
- Revised Measures Stresses Overseas IPOs
The Revised Measures add an Article 7, which expand the reporting and application obligation to include any Operator concerned who possesses the personal information of more than one million users and goes public abroad.
The investigation over the IPO of DiDi has illustrated that regulators in China are seeking to curb overseas IPOs of domestic enterprises potentially exposed to State security risks. The Article 7 adopts a higher standard for IPO enterprises, as qualified overseas IPOs are linked to cybersecurity reviews without exception. This reflects the view of regulators in China that enterprises holding large scales of personal information are almost invariably linked to national and cybersecurity risks.
Notably, the Revised Measures used “become listed in other countries” throughout instead of the more common expressions such as “listed on foreign exchanges”. This way of expression seems to imply that enterprises to be listed on the Stock Exchange of Hong Kong will not be subject to cybersecurity review under the new Article 7. This could be interpreted as a concession to allow domestic enterprises to achieve their fund-raising targets through IPOs on a foreign market, while maintaining the risk of data exposure at an acceptable level.
- Revisions in Response to the Data Security Law
The Revised Measures provides that data processors and data processing as subjects of cybersecurity reviews alongside critical information infrastructure operators and purchasing activities respectively. In Article 10, the Revised Measures quote the classification of core data and important data from the Data Security Law for assessing the risks from the potential purchase of network products and services and data processing. This means that cybersecurity reviews conducted under the Revised Measures will also cover all types of data processors and processing activities as defined in the Data Security Law.
- Risk Factors to be Considered in Cybersecurity Reviews
CAC will consider the following main risk factors when conducting cybersecurity review:
- Risks of illegal control, interference or destruction of critical information infrastructure resulting from the use of network products and services;
- Harms caused by supply interruption of network products and services to the business continuity of critical information infrastructure;
- Security, openness, transparency and diversity of sources of network products and services, reliability of supply channels, and risks of supply interruption due to political, diplomatic, trade or other factors;
- Information on compliance with Chinese laws, administrative regulations and departmental rules by network product and service providers;
- Risks of theft, leakage, damage, illegal use or cross-border transfer of core data, important data or large quantity of personal information;
- Risks of influence, control or malicious use of critical information infrastructure, core data, important data or large quantity of personal information by foreign governments after overseas listing; and
- Other factors that may endanger critical information infrastructure security and national data security.
- Procedures of the Cybersecurity Review
The current Cybersecurity Review Measures requires special review process to be completed within 45 working days, which can be “appropriately extended” for complicated cases. The Revised Measures extended this limit to 90 working days, and allows it to be simply “extended” for complicated cases. The actual review will be conducted by China Cybersecurity Review Technology and Certification Center.
To briefly summarize the procedures, the Office of Cybersecurity Review under CAC is generally responsible for conducting review with assistance from member authorities of cybersecurity review working mechanism. The Office of Cybersecurity Review will decide whether a review is needed, conduct preliminary review, solicit member authorities on the preliminary review conclusions, conduct special review if needed, and liaise with Operators throughout the process. In the case of a special review, the Office of Cybersecurity Review will report to CCAC for approval before making the final conclusion.
The following flow chart represents the process prescribed in the Revised Measures.
For Chinese enterprises currently listed or seeking IPOs on exchanges in other countries, it is advisable to follow closely on this recent legislation, and prepare to meet the more stringent compliance standard for data protection.
This Newsletter is only offered for the purpose of sharing information. It discusses legal developments and should not be regarded as legal advice for specific situations. If you wish to obtain more information, please contact us at .
blogWe are pleased to announce that Sanjanthi Sajan, Managing Partner at Indian member firm Poovayya & Co., will take over as the new LFN Asia-Pacific Regional Director.Sanjanthi has over two decades of experience spanning diverse areas of the law ranging from...
blogWe are glad to announce that Chilean member firm Bertrand-Galindo Barrueto Barroilhet will be hosting Santiago Courreges, senior lawyer at Barreiro. Oliva. De Luca. Jaca. Nicastro (Argentina) for six weeks, as part of The Law Firm Network's Lawyers Secondment...
blogMilan, 17 January 2024 - COCUZZA opens 2024 with a new brand identity and a new managing partner.In 2023 COCUZZA celebrated its 30-year anniversary. On the occasion of such an important jubilee the Firm has taken forward a branding project that included...
blogWe are glad to announce that Gonzalo Oliva Beltrán, partner at Argentinian member firm Barreiro · Oliva · De Luca · Jaca · Nicastro, has been appointed the new Regional Director for the Americas region by the steering committee in its December 6 meeting.With an...
blogThe award was delivered during The Law Firm Network’s Annual Conference which took place in the city of New York in the month of April.NYC Urban Debate League provides academic debate opportunities to students in underserved NYC communities, with a focus on...
blogThis spring, The Law Firm Network offers its members two new webinars.The first one: 'What does it mean to become a partner in a Law Firm ?’ ► 20 June 2023 Will help young lawyers to learn more about the path to become a partner, the responsibilities and benefits...
blogWatch the recap of The Law Firm Network’s Annual Conference New York 2023 hosted by US member firm Brown Rudnick.The event took place in late April and gathered members and guest speakers from all across the globe who enjoyed an outstanding professional and...
Rafael Truan Blanco, Executive Director of The Law Firm Network, speaks to The Legal 500 about the future of law networks
blogHow has the pandemic and the flexi-working revolution affected the network model? It is widely known that the pandemic has accelerated the adoption of digital technologies and that, in general, there has been a greater uptake of remote working in law firms....
blogGerman member firm HAVER & MAILÄNDER has welcomed Giorgia Innamorato, from Italian member firm Cocuzza & Associati , as part of The Law Firm Network Young Lawyers Secondment Program that promotes the exchange of young lawyers between member firms.The initiative...
blogOur Executive Director Rafael Truan Blanco has been recently visiting member firms from Portugal: AMSA, Ireland: BHSM and UK: Blandy & Blandy, to meet partners and associates, and explain the LFN activities developed in the course of the last two years.Rafael...
The Law Firm Network is a network of independent law firms originated in 1989. Our members are not affiliated in the joint practice of law; each member firm is an independent law firm and renders professional services on an individual and separate basis.