The Top 10  Most Difficult Countries for Identity Verification

The Top 10  Most Difficult Countries for Identity Verification

Download Report

China’s New Data Security and Personal Information Protection Laws [2022 Update]

b-img-china

For the purpose of identification, interdiction, and prevention, many governments, regulators, and businesses are collaborating to draw a distinction between fraud and financial crime. However, the boundaries are blurring, since the cyber threats are on the continuous rise, which is uncovering the extent to which online criminal activities have become interrelated and more complex. Due to this, a large number of well-established businesses are under the stress of cybercrimes, particularly, data breaches. 

Like other countries across the world, China is also experiencing digitization. However, with the advent of digital file transfer and cloud storage by industries, data breaches, and identity theft crimes are occurring at a fairly high rate. Thus, there was a total of $6 trillion loss in cybercrimes globally in 2021. Thus, the government of China has come up with two new laws associated with data security and personal information protection which was legislated in the fall of 2021, aimed to provide a comprehensive approach to enhance data security, cybersecurity, and individual privacy.

Insights into Cyber Security and Data Protection laws in China

In recent years, China’s data protection and customer privacy regulation regime has been enhanced periodically to eliminate the risk of data breaches and identity theft. The Personal Information Protection Law (PIPL) became part of the ever-evolving regime on 1 November 2021 and is considered the country’s first comprehensive data protection law. The rule regulates the use of Personally Identifiable Information (PII) by individuals as well as businesses within the China boundaries. In addition to this, two other laws, regarding cybersecurity and data protection compliance, Cybersecurity Law (CSL) and Data Security Law (DSL) respectively.

Other than these laws, The Civil Code of the People’s Republic of China (The Civil Code) was also legislated in the first half of 2021 that provided the true rights of personal information protection and privacy. It was also made mandatory for every business to streamline its operation with these laws. However, under the Civil Code, a completely new era of data protection and privacy started. Meanwhile, the same patterns of amendments and emergence of new cybersecurity guidelines are also expected in 2022. Moreover, there are also specific standards and guidelines for industries such as finance, healthcare, and so on.

b-img-breach

New China’s Data Security and Personal Information Laws

In accordance with the Data Security Law (DSL), a rigid framework is developed that classifies PII gathered and stored in China, based on its potential impact on the country’s national security. It also governs the storage and transfer depending on the classification level. However, this law is legislated as a response to the US Clarifying Lawful Overseas Use of Data Act (CLOUD Act). 

Categories of Data

“Core data” under this law is comprehensively defined as any kind of data that can impact Chinese national and economic security, public welfare, or interest requires a maximum degree of guidelines and protection. “Important data” is the next highly sensitive level of data, but its scope is left undefined, as the national, regional, and designated authorities are expected to issue their own catalogs regarding important data.

Thus, data security laws imply that all the businesses operating in China need to collect and process and store customer data.

Localization and Transfer of Data

The DSL widens and clarifies data localization and transfer standards for “core” and “important” data yet for certain types of businesses that handle sensitive data. For instance, critical information infrastructure operators (CIIOs), that oversee the data dealing with infrastructure, informational networks, and natural resources must assure that data was generated and stored within China. Moreover, a rigid set of security self-assessment checks needs to be conducted before sending data out of the country. In addition to this, the DSL also directs some additional standards and regulations that must be developed for non-CIIOs.

Downstream Data Handlers

The DSL also expands the scope of regulation, like initial data collectors, downstream  “intermediary service” that uses sensitive data for commercial purposes also need to be governed strictly. Thus, these downstream data handlers are obliged to verify the true identities of the parties before a data transaction is made, along with managing the transaction records. Therefore, in case data handlers fail to comply with DSL may face a regulatory fine of RMB 2 million, cancellation of business licenses, and an immediate shutdown of operations.

Data Security

The DSL mandates the businesses and financial institutions that are operating in China to establish and enhance the data security systems. On another hand, in case the shortcomings in the system are detected, instant remedial measures need to be taken along with notifying the customers, as well as regulatory bodies regarding the data breaches if it happens. However, if the companies handing information of at least “important data” are obliged to onboard security officers that would be responsible for securing data and submitting the risk assessment reports to the PRC authorities.

An institution that fails to meet the regulatory obligation and to secure customer data may face a hefty fine up to RMB 500,000, and if companies fail to improve their systems that resulted in data leaks may face fines up to RMB 2 million.

The Personal Information Protection Law

The personal information protection law (PIPL) is considered China’s first detailed law that governs PII protection and is developed after the EU has come up with General Data Protection Regulation.

“Personal Information” is broadly defined to cover “any information related to identified or identifiable natural persons stored in electronic or any other format.” So long as the information is “related to identified or identifiable natural persons,” even if there is not sufficient data for identification, the PIPL still applies.

The law is applicable to all types of data activities, for instance, storage, gathering, deletion, processing, etc.) involving the PII subjects in China along with the activities that are happening outside the country, yet aimed to provide services to the Chinese public. Non-compliant with the PIPL regulations could face a fine of RMB 50 million, 5% of the business’s yearly revenue, and all illegal gains would be seized.

Consent Requirements

Before gathering or handling PII, a data handle needs to get clear consent from the person whose information is to be obtained. Data handles that are collecting sensitive personal information – a data category that includes data subject, biometrics, religious beliefs, finances, location, and children’s details along with the purpose of data collection, aim to fulfill the PIPL requirements.

Data Localization and Data Deletion Requirements

In case, if the volume of PII collected or handled by the respective handler exceeds the certain described thresholds, data localization requirements could be triggered, and the data handle will additionally be required to onboard an information protection officer to oversee the whole handling and protection procedure. Other than this, they are also required to delete the collected information, once the purpose is fulfilled. When the data no longer serves its purpose, the retention period automatically expires. Thus, data must be deleted, before it gets into the wrong hands.

Restrictions on Transfer of Personal Information to Third Parties and Overseas

Before transferring the personal information to the third parties, either within China or across the border, the data subject’s detailed consent must be obtained and the recipient should ensure that the PII is used as per the terms and conditions of the consent.

For international transfers, the data handler needs to be utmost assured that the recipient has a rigid data protection system in places where their operations are aligned with the PIPL regulations. However, depending upon the classification of the data additional requirements may also apply.

General Compliance Requirements

To fulfill PIPL requirements, companies need to conduct regular self-assessments and audits in order to determine the information security risk and take necessary steps to enhance control systems. However, if the company qualifies as a  “major internet service platform”  more strict rules may be applied. In addition to this, companies that are using algorithms and automated decision-making functions to analyze personal information must abide by the transparency principle as per PIPL laws.

How Shufti Can Help

Shufti’s state-of-the-art identity verification services are embedded with all the features that can help data handlers to stay put with the regulatory obligations while ensuring that the customer’s data remain un-breachable. Businesses opting for robust identity verification solutions can overcome sanctions and fines for being non-compliant.

Following are the key benefits of Shufti’s ID verification services;

  1. Determines the real identity of the customers in less than a second
  2. Generate results with 98.76% accuracy
  3. Screenings the customers against 1700+ global watch lists
  4. Helps to stay put with the regulatory obligations and secures businesses from sanctions

Want to learn more about ID verification services for businesses?

Related Posts

Blog

Stronger Global Identity Coverage… Where it Counts

In today’s globalized economy, businesses are striving to expand their footprint across borders. ...

Stronger Global Identity Coverage… Where it Counts Explore More

Blog

Transaction Monitoring: Going Beyond AML Screening

Whether you are an accountant in Wall Street or a developer for Google, money laundering will not...

Transaction Monitoring: Going Beyond AML Screening Explore More

Blog

Facial Verification – Curing Fraud in the Healthcare Sector

Healthcare professionals continue to be hot targets of bad actors and cybercriminals, with attack...

Facial Verification – Curing Fraud in the Healthcare Sector Explore More

Blog

An Insight into Global Regulations for the Cryptocurrency Sector [2022 Update]

With emerging technologies continuing to proliferate faster and rapid digitization all around us,...

An Insight into Global Regulations for the Cryptocurrency Sector [2022 Update] Explore More

Blog

De-Risking and Anti-Money Laundering Screening – How Shufti Can Help FIs

Every firm providing financial services must stay put with the existing compliance and follow new...

De-Risking and Anti-Money Laundering Screening – How Shufti Can Help FIs Explore More

Blog

Top 5 Reasons Why Businesses Need Transaction Monitoring Solution

Companies are moving towards digitisation, meanwhile, cybercriminals are mastering the art of exp...

Top 5 Reasons Why Businesses Need Transaction Monitoring Solution Explore More

Blog

Know Your Patient – Curbing Healthcare Fraud through Identity Verification

With global digitization and emerging technologies, the healthcare sector has adopted a variety o...

Know Your Patient – Curbing Healthcare Fraud through Identity Verification Explore More

Blog

The Changing Landscape of KYC/AML Regulations in 2021

Know Your Customer (KYC) and Anti-Money Laundering (AML) regulations have been evolving over time...

The Changing Landscape of KYC/AML Regulations in 2021 Explore More

Blog

5-Steps to Improve Customer Due Diligence Process

The digital age has witnessed a new wave of financial fraud. It is estimated that $4.7 trillion o...

5-Steps to Improve Customer Due Diligence Process Explore More

Blog

Securing Gig Economy Operations and Contributing to the Growth with KYC Solutions

Startups, SMEs, and the gig industry have seen unprecedented growth. Not to mention, COVID-19 was...

Securing Gig Economy Operations and Contributing to the Growth with KYC Solutions Explore More

Blog

Overcoming the Challenges of Proliferation Financing with AML Screening Solutions

On September 23rd, the 2021 UK NRA (National Risk Assessment) was published as part of the govern...

Overcoming the Challenges of Proliferation Financing with AML Screening Solutions Explore More

Blog

Identity Fraud on Social Media Platforms – How Shufti Keeps Fraudsters at Bay

With almost 70% of the world’s population interacting through social media platforms, businesses ...

Identity Fraud on Social Media Platforms – How Shufti Keeps Fraudsters at Bay Explore More

Blog

5 Technology Trends To Disrupt Banking in 2020

Living in the digital era, technology is driving major changes in almost every industry. Whether ...

5 Technology Trends To Disrupt Banking in 2020 Explore More

Blog

Top 7 Gambling Trends to Look Out for in 2023

Going from a few billion dollars to over $81 bn in a matter of a decade is astronomical for any i...

Top 7 Gambling Trends to Look Out for in 2023 Explore More

Blog, Financial Crime / AML

Impact of Regulatory Scrutiny & AML Compliance in Real Estate

Anti Money Laundering (AML): Criminals around the globe are targeting real estate to launder the ...

Impact of Regulatory Scrutiny & AML Compliance in Real Estate Explore More

Blog

Top Cryptocurrency Trends to Look Out for in 2022

2021 has been a remarkable year for cryptocurrency as because of COVID-19 outbreak crypto industr...

Top Cryptocurrency Trends to Look Out for in 2022 Explore More

Blog

KYC, KYB & KYT Tying the Loops for Identity Verification

Digital fraudulent activities are rising with every passing day, businesses are adopting reactive...

KYC, KYB & KYT Tying the Loops for Identity Verification Explore More

Blog

Gaming Industry Crimes and KYC/AML Solutions – What Shufti Can Offer

From the world’s glitziest gaming development to betting shops on the high streets, the global ga...

Gaming Industry Crimes and KYC/AML Solutions – What Shufti Can Offer Explore More

Blog

Securing Investment Industry with Shufti’s Investor Verification Solution

In this tech-driven world, perpetrators and organized crime groups are adopting sophisticated met...

Securing Investment Industry with Shufti’s Investor Verification Solution Explore More

Blog

Addressing the Challenge of Money Laundering Risks for Payment Service Providers (PSPs)

During the last few decades, the financial industry has altogether revolutionized, and digital tr...

Addressing the Challenge of Money Laundering Risks for Payment Service Providers (PSPs) Explore More

Blog

AI-Powered OCR to replace data entry in 2020 – A detailed insight

Living in the data-driven world, there is a huge demand for storing data from printed or handwrit...

AI-Powered OCR to replace data entry in 2020 – A detailed insight Explore More

Blog, Business Technology

Business Verification – Foolproof Ways to Secure Happy Customers

Creating a winning customer experience can make for a significant competitive advantage for busin...

Business Verification – Foolproof Ways to Secure Happy Customers Explore More

Blog, Online Marketplace

Verify ID For a Secure Travel Experience

Since we are using the Internet for a great many things including shopping to online booking of f...

Verify ID For a Secure Travel Experience Explore More

Blog, Identity & KYC

GDPR versus Identity Verification – Are you Ready?

If you are an organisation that is based in the EU or are doing business with companies in the EU...

GDPR versus Identity Verification – Are you Ready? Explore More

Blog, Identity & KYC

Digital KYC Streamlines Customer On-boarding Process

Shufti brings forth digital KYC verification services to perform identity verification proces...

Digital KYC Streamlines Customer On-boarding Process Explore More

Blog

Anti Money Laundering – What is AML compliance and why is it important?

Anti-money laundering compliance is vital for obliged entities and being conversant with AML comp...

Anti Money Laundering – What is AML compliance and why is it important? Explore More

Blog

Facial Recognition | The Principles of Responsible Use and the Legal Landscape

One of the most popular uses of AI nowadays is facial recognition. In all likelihood, it’s ...

Facial Recognition | The Principles of Responsible Use and the Legal Landscape Explore More

Blog

The Crucial Role of Know Your Customer (KYC) in Gaming

The gaming sector has grown exponentially since the first arcade games of the 70s. Surpassing mus...

The Crucial Role of Know Your Customer (KYC) in Gaming Explore More

Anti Money Laundering, Blog, Financial Crime / AML

US Treasury opposes European Commission AML Country List

The European Commission has adopted a new list of 23 countries which lack appropriate framework f...

US Treasury opposes European Commission AML Country List Explore More

Blog

Fintech 2021 – A Brief Insight of Global KYC Regulations

Financial services are among the most heavily regulated sectors in the world, and the number one ...

Fintech 2021 – A Brief Insight of Global KYC Regulations Explore More

Blog

KYC Compliance – Identity Verification for Brokerage Companies & Trading Platforms

Online trading platforms provide businesses with the convenience to keep an eye on financial mark...

KYC Compliance – Identity Verification for Brokerage Companies & Trading Platforms Explore More

Blog, Financial Crime / AML

FSA demands greater AML Compliance from Japanese Crypto Exchanges

In a recent move, Financial Services Agency (FSA), the Japanese Financial regulator, has demanded...

FSA demands greater AML Compliance from Japanese Crypto Exchanges Explore More

Blog

Facial Recognition Kiosks: A Modern Innovation in the Food Industry?

Background of Technological Advancement Technology is regarded as a new way of thinking or doing ...

Facial Recognition Kiosks: A Modern Innovation in the Food Industry? Explore More

Blog

5 Ways Banks Can Minimize Risks In Light of KYC/AML

If you’re dealing with customers across borders, how can you safeguard your bank by ensuring that...

5 Ways Banks Can Minimize Risks In Light of KYC/AML Explore More

Blog

Major Fines in the Gaming and Gambling Industry and the Role of e-IDV

The outbreak of Covid-19 has changed how we do business. Many firms that used to operate physical...

Major Fines in the Gaming and Gambling Industry and the Role of e-IDV Explore More

Blog

Customer Identification Programme (CIP) vs Know Your Customer (KYC) | What’s the Difference?

 Often, people confuse CIP and KYC and think both are the same. Customer Identification ...

Customer Identification Programme (CIP) vs Know Your Customer (KYC) | What’s the Difference? Explore More

Blog

The Future of Customer Onboarding Post-COVID-19 Pandemic

The COVID-19 pandemic has changed our lives to the fullest and businesses have suffered a lot as ...

The Future of Customer Onboarding Post-COVID-19 Pandemic Explore More

Blog

Digital COVID Certificate Verification: Prevalent Problems and Viable Solutions

Following the rollout of viable vaccines to combat COVID-19, the prospects of normalcy are on the...

Digital COVID Certificate Verification: Prevalent Problems and Viable Solutions Explore More

Blog

Effective Sanctions Screening | A Guide for Compliance Professionals

Sanctions are crucial in combating financial crimes and maintaining national and international se...

Effective Sanctions Screening | A Guide for Compliance Professionals Explore More

Blog, Business Technology, Online Marketplace

Asian Banks push for greater Fintech to cut down AML Compliance cost

Asian Banks are now asking their regional and national regulators to allow more fintech in order ...

Asian Banks push for greater Fintech to cut down AML Compliance cost Explore More

Blog

AI face recognition for total automation

Face recognition is everywhere but still we’re unable to say goodbye to document, maybe because w...

AI face recognition for total automation Explore More

Blog

Video KYC – Ultimate Solution for Financial Institutions

With social distancing becoming the necessity during the pandemic, more and more companies began ...

Video KYC – Ultimate Solution for Financial Institutions Explore More

Blog

Contact-free ID authentication – combating fraud during COVID-19 outbreak

Coronavirus outbreak, which was initially thought of as some sort of common flu in the Chinese ci...

Contact-free ID authentication – combating fraud during COVID-19 outbreak Explore More

Blog

Know Your Customer (KYC) vs Customer Due Diligence (CDD): What’s the Difference?

 Ensuring robust identity verification processes is necessary with the ever-increasing n...

Know Your Customer (KYC) vs Customer Due Diligence (CDD): What’s the Difference? Explore More

Blog

A Quantitative Insight into the Global Gaming and Gambling Industry

The gaming and gambling industry has demonstrated exponential growth in the past decades and is e...

A Quantitative Insight into the Global Gaming and Gambling Industry Explore More

Blog, Fraud Prevention

Account Takeover Frauds – Impact, Causes, and Prevention

Living in the era of technology, the world is rapidly moving towards digitization. From banking i...

Account Takeover Frauds –  Impact, Causes, and Prevention Explore More

Blog

Reshaping the Travel Industry with NFC Verification – How Shufti Can Help

With emerging technologies and the increasing use of digital services, the travel industry has be...

Reshaping the Travel Industry with NFC Verification – How Shufti Can Help Explore More

Blog

Enhancing the Effectiveness of KYC Checks with Shufti’s Forensic Document Verification

With emerging technologies and rapid digitization, identity fraud has become quite common, raisin...

Enhancing the Effectiveness of KYC Checks with Shufti’s Forensic Document Verification Explore More

Blog, Identity & KYC, Reg Tech

RegTech: The Case for Financial Inclusion

The FinTech industry has grown tremendously in recent years, introducing both scale and efficienc...

RegTech: The Case for Financial Inclusion Explore More

Blog

Customer Due Diligence – Risk Scoring of Fraudsters to Prevent Crimes

As per the research of The Journal of Accountancy, fraudsters carry out crimes for two reasons: n...

Customer Due Diligence – Risk Scoring of Fraudsters to Prevent Crimes Explore More

Blog

How Will Simplified Due Diligence SDD Help Industries in 2024?

For businesses, the due diligence process is an integral part of the Know Your Customer programme...

How Will Simplified Due Diligence SDD Help Industries in 2024? Explore More

Blog, Financial Crime / AML

“Brexit” Greasing the Wheel of Money Laundering

Brexit is in the global news for many years. The reason is that several countries have their stak...

“Brexit” Greasing the Wheel of Money Laundering Explore More

Blog

A Brief Overview of the RegTech Industry [2022 Update]

The rising financial crimes have raised concerns of global regulatory watchdogs giving rise to Re...

A Brief Overview of the RegTech Industry [2022 Update] Explore More

Blog

Know Your Business (KYB) | Ensuring Financial Security

The Know Your Business solution standard verifies a company’s legal standing and confirms i...

Know Your Business (KYB) | Ensuring Financial Security Explore More

Blog

Six Ways to Protect Your Business from Christmas Scams

Christmas is around the corner and all of you must be very excited to decorate christmas trees, e...

Six Ways to Protect Your Business from Christmas Scams Explore More

Anti Money Laundering, Blog, Business Technology, Financial Crime / AML, Fraud Prevention, Identity & KYC

Initial CCPA Compliance Costs Could Hit $55 Billion: Report

According to an economic impact assessment prepared for the state attorney general’s office by an...

Initial CCPA Compliance Costs Could Hit $55 Billion: Report Explore More

Blog, Fraud Prevention

Data Breaches in 2019 – A Year in Review

Stepping into 2020, the year 2019 has been on the rollercoaster in terms of security breaches. Da...

Data Breaches in 2019 – A Year in Review Explore More

Blog

Liveness Detection and IDV: An Overview of Biometric Facial Recognition

Identity fraud and cybercrime have significantly surged in the past few years. Deepfake technolog...

Liveness Detection and IDV: An Overview of Biometric Facial Recognition Explore More

Blog

Enhancing the Effectiveness of KYC Checks with Shufti’s Forensic Document Verification

With emerging technologies and rapid digitization, identity fraud has become quite common, raisin...

Enhancing the Effectiveness of KYC Checks with Shufti’s Forensic Document Verification Explore More

Blog

Forex Market – Are there Enough KYC/AML Regulations to Keep Perpetrators at Bay?

Regulatory pressure, hefty penalties and increasing criminal instances are some risks associated ...

Forex Market – Are there Enough KYC/AML Regulations to Keep Perpetrators at Bay? Explore More

Blog

Here’s to 2021 – NFTs Conquering the Crypto Market

From DeFi’s in 2020 to NFTs in 2021, a lot has changed in the crypto market. Since the beginning ...

Here’s to 2021 – NFTs Conquering the Crypto Market Explore More

Blog

UK’s On-Demand Culture – Building Trust & Security with Digital ID Verification

People across the world are spending more time on the internet ever since the pandemic struck the...

UK’s On-Demand Culture – Building Trust & Security with Digital ID Verification Explore More

Blog

Liveness Detection | An Extra Layer of Protection Against Spoofing and Fraud

The consumer demand for biometric and facial authentication technologies is rising, with the mark...

Liveness Detection | An Extra Layer of Protection Against Spoofing and Fraud Explore More

Blog

Top 7 Trends Shaping the Future of Gambling Industry in 2023

Amidst technological advancement and the changing regulatory landscape, the gaming sector demonst...

Top 7 Trends Shaping the Future of Gambling Industry in 2023 Explore More

Blog

Navigating the New Era of Customer Identity: Strategies for Compliance Professionals

Introduction The identity verification and authentication landscape is undergoing a rapid transfo...

Navigating the New Era of Customer Identity: Strategies for Compliance Professionals Explore More

Blog, Online Marketplace

Secure Online Gambling through Identity and Age Verification

Gambling is a very profitable business for big players and owners alike. According to research, t...

Secure Online Gambling through Identity and Age Verification Explore More

Blog

5 Ways Face Recognition Will Become More Prevalent in 2023 and Beyond

During the covid pandemic, many businesses updated their access control systems to facial recogni...

5 Ways Face Recognition Will Become More Prevalent in 2023 and Beyond Explore More

Blog, Online Marketplace

Nordic Banks brace for Digital KYC with centralized Database

Five major Nordic banks have formed a partnership to establish a company that will compile a cent...

Nordic Banks brace for Digital KYC with centralized Database Explore More

Blog

KYC Compliance for DeFi Platforms – Finding the Balance for a Secure Future

The rise of decentralized services in the form of digital asset trading platforms and DeFi consta...

KYC Compliance for DeFi Platforms – Finding the Balance for a Secure Future Explore More

Blog

Know Your Investor | Sophisticated Investor Verification in Real-Time

In today’s data-driven digital world, organized crime groups and fraudsters have developed more s...

Know Your Investor |  Sophisticated Investor Verification in Real-Time Explore More

Blog, Business Technology, Fraud Prevention, Identity & KYC

Face Verification – One Solution for Several Identity Frauds

Biometrics is the technology that verifies the unique personality traits of a person to identify ...

Face Verification –  One Solution for Several Identity Frauds Explore More

Blog, Financial Crime / AML, Fraud Prevention, Identity & KYC

The FinTech Industry: A Snapshot

What is FinTech? Financial technology, known more commonly as FinTech, is a term that refers to t...

The FinTech Industry: A Snapshot Explore More

Take the next steps to better security.

Contact us

Get in touch with our experts. We'll help you find the perfect solution for your compliance and security needs.

Contact us

Request demo

Get free access to our platform and try our products today.

Get started