quora
Read More about fast-id page

Shufti globally launches webinr-icon - a new kind of identity solution!

Shufti globally launches - a new kind of identity solution!

Read more

China’s New Data Security and Personal Information Protection Laws [2022 Update]

b-img-china

For the purpose of identification, interdiction, and prevention, many governments, regulators, and businesses are collaborating to draw a distinction between fraud and financial crime. However, the boundaries are blurring, since the cyber threats are on the continuous rise, which is uncovering the extent to which online criminal activities have become interrelated and more complex. Due to this, a large number of well-established businesses are under the stress of cybercrimes, particularly, data breaches. 

Like other countries across the world, China is also experiencing digitization. However, with the advent of digital file transfer and cloud storage by industries, data breaches, and identity theft crimes are occurring at a fairly high rate. Thus, there was a total of $6 trillion loss in cybercrimes globally in 2021. Thus, the government of China has come up with two new laws associated with data security and personal information protection which was legislated in the fall of 2021, aimed to provide a comprehensive approach to enhance data security, cybersecurity, and individual privacy.

Insights into Cyber Security and Data Protection laws in China

In recent years, China’s data protection and customer privacy regulation regime has been enhanced periodically to eliminate the risk of data breaches and identity theft. The Personal Information Protection Law (PIPL) became part of the ever-evolving regime on 1 November 2021 and is considered the country’s first comprehensive data protection law. The rule regulates the use of Personally Identifiable Information (PII) by individuals as well as businesses within the China boundaries. In addition to this, two other laws, regarding cybersecurity and data protection compliance, Cybersecurity Law (CSL) and Data Security Law (DSL) respectively.

Other than these laws, The Civil Code of the People’s Republic of China (The Civil Code) was also legislated in the first half of 2021 that provided the true rights of personal information protection and privacy. It was also made mandatory for every business to streamline its operation with these laws. However, under the Civil Code, a completely new era of data protection and privacy started. Meanwhile, the same patterns of amendments and emergence of new cybersecurity guidelines are also expected in 2022. Moreover, there are also specific standards and guidelines for industries such as finance, healthcare, and so on.

b-img-breach

New China’s Data Security and Personal Information Laws

In accordance with the Data Security Law (DSL), a rigid framework is developed that classifies PII gathered and stored in China, based on its potential impact on the country’s national security. It also governs the storage and transfer depending on the classification level. However, this law is legislated as a response to the US Clarifying Lawful Overseas Use of Data Act (CLOUD Act). 

Categories of Data

“Core data” under this law is comprehensively defined as any kind of data that can impact Chinese national and economic security, public welfare, or interest requires a maximum degree of guidelines and protection. “Important data” is the next highly sensitive level of data, but its scope is left undefined, as the national, regional, and designated authorities are expected to issue their own catalogs regarding important data.

Thus, data security laws imply that all the businesses operating in China need to collect and process and store customer data.

Localization and Transfer of Data

The DSL widens and clarifies data localization and transfer standards for “core” and “important” data yet for certain types of businesses that handle sensitive data. For instance, critical information infrastructure operators (CIIOs), that oversee the data dealing with infrastructure, informational networks, and natural resources must assure that data was generated and stored within China. Moreover, a rigid set of security self-assessment checks needs to be conducted before sending data out of the country. In addition to this, the DSL also directs some additional standards and regulations that must be developed for non-CIIOs.

Downstream Data Handlers

The DSL also expands the scope of regulation, like initial data collectors, downstream  “intermediary service” that uses sensitive data for commercial purposes also need to be governed strictly. Thus, these downstream data handlers are obliged to verify the true identities of the parties before a data transaction is made, along with managing the transaction records. Therefore, in case data handlers fail to comply with DSL may face a regulatory fine of RMB 2 million, cancellation of business licenses, and an immediate shutdown of operations.

Data Security

The DSL mandates the businesses and financial institutions that are operating in China to establish and enhance the data security systems. On another hand, in case the shortcomings in the system are detected, instant remedial measures need to be taken along with notifying the customers, as well as regulatory bodies regarding the data breaches if it happens. However, if the companies handing information of at least “important data” are obliged to onboard security officers that would be responsible for securing data and submitting the risk assessment reports to the PRC authorities.

An institution that fails to meet the regulatory obligation and to secure customer data may face a hefty fine up to RMB 500,000, and if companies fail to improve their systems that resulted in data leaks may face fines up to RMB 2 million.

The Personal Information Protection Law

The personal information protection law (PIPL) is considered China’s first detailed law that governs PII protection and is developed after the EU has come up with General Data Protection Regulation.

“Personal Information” is broadly defined to cover “any information related to identified or identifiable natural persons stored in electronic or any other format.” So long as the information is “related to identified or identifiable natural persons,” even if there is not sufficient data for identification, the PIPL still applies.

The law is applicable to all types of data activities, for instance, storage, gathering, deletion, processing, etc.) involving the PII subjects in China along with the activities that are happening outside the country, yet aimed to provide services to the Chinese public. Non-compliant with the PIPL regulations could face a fine of RMB 50 million, 5% of the business’s yearly revenue, and all illegal gains would be seized.

Consent Requirements

Before gathering or handling PII, a data handle needs to get clear consent from the person whose information is to be obtained. Data handles that are collecting sensitive personal information – a data category that includes data subject, biometrics, religious beliefs, finances, location, and children’s details along with the purpose of data collection, aim to fulfill the PIPL requirements.

Data Localization and Data Deletion Requirements

In case, if the volume of PII collected or handled by the respective handler exceeds the certain described thresholds, data localization requirements could be triggered, and the data handle will additionally be required to onboard an information protection officer to oversee the whole handling and protection procedure. Other than this, they are also required to delete the collected information, once the purpose is fulfilled. When the data no longer serves its purpose, the retention period automatically expires. Thus, data must be deleted, before it gets into the wrong hands.

Restrictions on Transfer of Personal Information to Third Parties and Overseas

Before transferring the personal information to the third parties, either within China or across the border, the data subject’s detailed consent must be obtained and the recipient should ensure that the PII is used as per the terms and conditions of the consent.

For international transfers, the data handler needs to be utmost assured that the recipient has a rigid data protection system in places where their operations are aligned with the PIPL regulations. However, depending upon the classification of the data additional requirements may also apply.

General Compliance Requirements

To fulfill PIPL requirements, companies need to conduct regular self-assessments and audits in order to determine the information security risk and take necessary steps to enhance control systems. However, if the company qualifies as a  “major internet service platform”  more strict rules may be applied. In addition to this, companies that are using algorithms and automated decision-making functions to analyze personal information must abide by the transparency principle as per PIPL laws.

How Shufti Can Help

Shufti’s state-of-the-art identity verification services are embedded with all the features that can help data handlers to stay put with the regulatory obligations while ensuring that the customer’s data remain un-breachable. Businesses opting for robust identity verification solutions can overcome sanctions and fines for being non-compliant.

Following are the key benefits of Shufti’s ID verification services;

  1. Determines the real identity of the customers in less than a second
  2. Generate results with 98.76% accuracy
  3. Screenings the customers against 1700+ global watch lists
  4. Helps to stay put with the regulatory obligations and secures businesses from sanctions

Want to learn more about ID verification services for businesses?

Related Posts

Blog

The Importance of Online Address Verification in E-Commerce

The rise of digitisation has given hackers more means to surpass security systems and conduct hig...

The Importance of Online Address Verification in E-Commerce Explore More

Blog

Top 5 Cybersecurity Trends to Look Out for in 2022

With 2022 just around the corner, new developments in cybersecurity are already beginning to take...

Top 5 Cybersecurity Trends to Look Out for in 2022 Explore More

Anti Money Laundering, Blog, Business Technology, Identity & KYC

Customer Due Diligence: From KYC to KYB

Why CDD is significant for both Know Your Customer and Know your Business verification? Banking i...

Customer Due Diligence: From KYC to KYB Explore More

Blog

Shufti’s Bug Bounty Programme: Strengthening Security Via Ethical Hacking

With the avalanche of security vulnerabilities in the verification industry, Shufti is launch...

Shufti’s Bug Bounty Programme: Strengthening Security Via Ethical Hacking Explore More

Blog

An Insight into AML Compliance in the Financial Sector [2022 Update]

The increasing global attention towards anti-money laundering (AML) and countering the financing ...

An Insight into AML Compliance in the Financial Sector [2022 Update] Explore More

Blog

Understanding eKYC | The Benefits, Processes & 2024 Forecast

Governments worldwide require firms, such as financial institutions, to know who their customers ...

Understanding eKYC | The Benefits, Processes & 2024 Forecast Explore More

Blog

Protecting eCommerce Platforms and Mitigating Crime Risks with Shufti’s IDV Solution

The term e-commerce was tossed back in the 1960s, with the rise of electronic commerce in which t...

Protecting eCommerce Platforms and Mitigating Crime Risks with Shufti’s IDV Solution Explore More

Blog

Transforming the KYC Experience Using Automated Document Verification Checks

In 2021, reported fraud losses were $5.8 billion, a more than 70% rise in a single year. As ident...

Transforming the KYC Experience Using Automated Document Verification Checks Explore More

Blog, Reg Tech

Here’s How Compliance to KYC and AML Regulations May Help Crypto Rebound

Cryptocurrency was the talk of the day in the months and even years leading up to the present wee...

Here’s How Compliance to KYC and AML Regulations May Help Crypto Rebound Explore More

Blog, Business Technology, Financial Crime / AML, Identity & KYC, Online Marketplace

Know Your Business: The Next Step in Identity Verification

The complex regulatory environment and increased exposure to illegal activities indicate that bus...

Know Your Business: The Next Step in Identity Verification Explore More

Blog

New Money Laundering Patterns to Look Out for in 2022 – Do Social Media Platforms Need AML Screening?

With digitization, the use of the internet and easy access to smart gadgets has increased the num...

New Money Laundering Patterns to Look Out for in 2022 – Do Social Media Platforms Need AML Screening? Explore More

Blog

Singapore’s Digital Payment Token and AML Regulations [2022 Updates]

Financial crimes are an ever-increasing threat to the global economic climate. As a financial hub...

Singapore’s Digital Payment Token and AML Regulations [2022 Updates] Explore More

Blog

40 recommendations of FATF – Shaping the future of your business

Financial Action Task Force or simply FATF is an active global authority that never fails in surp...

40 recommendations of FATF – Shaping the future of your business Explore More

Blog

NFT Trading and Money Laundering – How Shufti’s AML Screening Helps Combat Financial Crimes

With revolutionary technologies and growing digitization, the digital version of artworks known a...

NFT Trading and Money Laundering – How Shufti’s AML Screening Helps Combat Financial Crimes Explore More

Blog

AML/KYC 2020 – how 2019 changed the landscape of global regimes?

Copy pasting your 2019 AML/KYC compliance strategy to 2020 plan will not do the job. Businesses n...

AML/KYC 2020 – how 2019 changed the landscape of global regimes? Explore More

Blog

Insights Into Austria’s Biometric KYC Onboarding [2022 Updates]

Biometric authentication is considered a convenient approach for onboarding online customers that...

Insights Into Austria’s Biometric KYC Onboarding [2022 Updates] Explore More

Blog

Ensure Digital Security with e-KYC Solutions

In today’s world where the distances have been reduced considerably with the advancement of techn...

Ensure Digital Security with e-KYC Solutions Explore More

Blog

Safeguarding Telecommunication Industry with Robust ID Verification Solutions – What Shufti Offers

Technology transformation, growing transactions and global digitisation are increasing the potent...

Safeguarding  Telecommunication Industry with Robust ID Verification Solutions – What Shufti Offers Explore More

Blog

Crypto as a Virtual Safe Haven for Russians Amid Sanctions

The Russia-Ukraine conflict has had some serious effects on the global financial landscape. While...

Crypto as a Virtual Safe Haven for Russians Amid Sanctions Explore More

Blog

Cannabis Industry – Risks, Predictions, Fraud & KYC/AML Obligations

The ever-growing industries across the world are opening gates for numerous opportunities to gree...

Cannabis Industry – Risks, Predictions, Fraud & KYC/AML Obligations Explore More

Blog, Identity & KYC

KYC and AML Compliance can help cryptocurrencies to earn legitimacy

Cryptocurrencies are currently limited in use by virtual currency enthusiasts or by lottery bidde...

KYC and AML Compliance can help cryptocurrencies to earn legitimacy Explore More

Blog

Which KYC Solution is Right for Your Business?

KYC solutions are vital for assessing consumer risk and a legal necessity for complying with Anti...

Which KYC Solution is Right for Your Business? Explore More

Blog

7 Fascinating Facts about Face Verification Technology

Technology is a fundamental part of our day-to-day lives, from checking the weather and connectin...

7 Fascinating Facts about Face Verification Technology Explore More

Blog, Fraud Prevention

6 Steps of Online Fraud Prevention for Businesses

With the rapid development in the online retail industry and banking industry, there is an increa...

6 Steps of Online Fraud Prevention for Businesses Explore More

Blog, Identity & KYC

User as Owner: Why KYC Software Needs to Respect Privacy Laws?

User as Owner is a simplistic concept that stipulates that all the data of any user collected by ...

User as Owner: Why KYC Software Needs to Respect Privacy Laws? Explore More

Blog

The Top 6 Holiday Season Scams to Avoid in 2023

As we move further into digitisation, our methods of giving gifts have changed drastically. In to...

The Top 6 Holiday Season Scams to Avoid in 2023 Explore More

Blog

Online Identity Verification – How to Secure Online Gaming & Gambling Platforms

Online gambling is the way to go for betting enthusiasts nowadays and brings both convenience and...

Online Identity Verification – How to Secure Online Gaming & Gambling Platforms Explore More

Blog

Securing Business Operations with Risk Assessment

The increasing connectivity and dependence of the world on technology have led to a rise in sophi...

Securing Business Operations with Risk Assessment Explore More

Blog

AML/CFT Regulations of Hong Kong: Paper Over Cracks?

On September 15, 2021, Hong Kong’s Securities and Futures Commission issued consultation conclusi...

AML/CFT Regulations of Hong Kong: Paper Over Cracks? Explore More

Blog, Financial Crime / AML, Identity & KYC

5AMLD: Implications for Cryptocurrency

What is 5AMLD? As part of the Action Plan against terrorism, the 5th Anti-Money Laundering Direct...

5AMLD: Implications for Cryptocurrency Explore More

Blog

Romance Scams: Protect Your Heart and Wallet with Identity Verification

People searching for love online sometimes meet the unfortunate fate of a broken heart and someti...

Romance Scams: Protect Your Heart and Wallet with Identity Verification Explore More

Blog

Top 10 Real-World Scenarios Where Shufti’s IDV Can Help

Whether you’re an e-commerce store that needs to verify delivery addresses or a bank that has to ...

Top 10 Real-World Scenarios Where Shufti’s IDV Can Help Explore More

Blog

Fighting ID Fraud in the Healthcare Industry With Online ID Verification

While the coronavirus outbreak has emerged with a lot of challenges for the healthcare industry, ...

Fighting ID Fraud in the Healthcare Industry With Online ID Verification Explore More

Blog

Liveness Detection and IDV: An Overview of Biometric Facial Recognition

Identity fraud and cybercrime have significantly surged in the past few years. Deepfake technolog...

Liveness Detection and IDV: An Overview of Biometric Facial Recognition Explore More

Blog, Identity & KYC, Online Marketplace

Importance of Identity Proofing for Facebook & Social Media

For years, social media has been used as a tool for increased connectivity. Both businesses, as w...

Importance of Identity Proofing for Facebook & Social Media Explore More

Blog

Working from Home Spikes Demand for Digital Identity Verification

Due to the Coronavirus Pandemic, many businesses are grounded or are enforced to work from home. ...

Working from Home Spikes Demand for Digital Identity Verification Explore More

Blog

Fintech Compliance – Boogeyman for Trillion Dollar Industry?

Fintech industry is flexing its muscle by bringing onboard more and more customers and innovating...

Fintech Compliance – Boogeyman for Trillion Dollar Industry? Explore More

Blog

Need for Identity Verification in Real Estate and Its Real-World Use Cases

The real estate industry is in dire need of identity verification processes. The reason being, th...

Need for Identity Verification in Real Estate and Its Real-World Use Cases Explore More

Blog

Industries that Need Digital Identity Verification and Why?

With continuous improvements in technology, different industries of the world are streamlining th...

Industries that Need Digital Identity Verification and Why? Explore More

Anti Money Laundering, Blog, Reg Tech

RegTech facilitates effortless AML Compliance

  The latest report by Research and Markets states that RegTech industry is expected to grow...

RegTech facilitates effortless AML Compliance Explore More

Blog

Integrated Compliance Management – Mitigating the Regulatory Risks

Businesses operating in the financial sector often face organizational and compliance challenges....

Integrated Compliance Management – Mitigating the Regulatory Risks Explore More

Blog

AML Screening – Identifying and Overcoming Challenger Banks’ Weaknesses

There are approximately 77 challenger banks in Europe alone, the best range amongst the other reg...

AML Screening – Identifying and Overcoming Challenger Banks’ Weaknesses Explore More

Blog

The Digital Black Market for Identity Data

The collection, purchase, or trade of customer data is big business. Unless organizations and ind...

The Digital Black Market for Identity Data Explore More

Biometric Technology, Blog

4 Reasons why Facial Recognition is Better at Biometric Verification than Fingerprint Scans

Biometric verification is smartphones was introduced nearly five years ago when iPhone launched i...

4 Reasons why Facial Recognition is Better at Biometric Verification than Fingerprint Scans Explore More

Blog

Shufti Celebrates 5 Years of Innovation in the IDV Industry

October 2022 marks Shufti’s 5th anniversary – five successful years of building trust globall...

Shufti Celebrates 5 Years of Innovation in the IDV Industry Explore More

Blog

The 5 Pillars of Anti-money Laundering Compliance

Imposters often “launder” money acquired through illegal activities, like drug trafficking, so th...

The 5 Pillars of Anti-money Laundering Compliance Explore More

Blog

AI-Powered OCR to Combat Challenges During Manual Data Processing

Every industry has to deal with tons of customer data on a daily basis. Receiving information, ex...

AI-Powered OCR to Combat Challenges During Manual Data Processing Explore More

Blog

Impact of COVID-19 on disruptive Fintech industry

The economy and society worldwide are affected by the corona crisis. The effects of COVID-19 on b...

Impact of COVID-19 on disruptive Fintech industry Explore More

Blog

California Privacy Rights Act – What Businesses Must Do to Comply

The California Privacy Rights Act (CPRA), also known as Proposition 24, was approved on November ...

California Privacy Rights Act – What Businesses Must Do to Comply Explore More

Blog

FATF’s High-Risk Jurisdictions [2022 Update] – How Business Can Comply

Paris-based global watchdog FATF (Financial Action Task Force) maintains lists of countries that ...

FATF’s High-Risk Jurisdictions [2022 Update] – How Business Can Comply Explore More

Blog

Why online alcohol industry needs robust age verification solutions?

“Can I see some ID?” The question brick and mortar booze stores ask or at least should ask to ver...

Why online alcohol industry needs robust age verification solutions? Explore More

Blog, Online Marketplace

7 Identity theft protection practices for Business and Recuriters

Identity theft is now no more a cause of concern for the individual users only as corporations an...

7 Identity theft protection practices for Business and Recuriters Explore More

Anti Money Laundering, Blog, Financial Crime / AML, Reg Tech

EU’s Sixth Anti-Money Laundering Directive (AMLD6)

Summary: Sixth Anti-Money Laundering Directive (AMLD6) highlights a stringent framework to combat...

EU’s Sixth Anti-Money Laundering Directive (AMLD6) Explore More

Blog

Digital Currency – Replacing Fiat Money in the Modern World

Technological advancements are leading to better transaction systems in different states. Cryptoc...

Digital Currency – Replacing Fiat Money in the Modern World Explore More

Blog

Top Cryptocurrency Trends to Look Out for in 2022

2021 has been a remarkable year for cryptocurrency as because of COVID-19 outbreak crypto industr...

Top Cryptocurrency Trends to Look Out for in 2022 Explore More

Blog

Shufti Celebrates 5 Years of Innovation in the IDV Industry

October 2022 marks Shufti’s 5th anniversary – five successful years of building trust globall...

Shufti Celebrates 5 Years of Innovation in the IDV Industry Explore More

Blog

The Growing Risk of Wash Trading and Money Laundering – How Shufti Can Help

The Non-Fungible Token (NFTs) market exploded last year and became one of the most popular buzzwo...

The Growing Risk of Wash Trading and Money Laundering – How Shufti Can Help Explore More

Blog

Healthcare is Under Attack: Strengthening Security with Biometric Verification

Healthcare scams cost our economy tens of billions of dollars every year and the lowest value of ...

Healthcare is Under Attack: Strengthening Security with Biometric Verification Explore More

Blog

Know Your Patient (KYP) – Effective Way to Prevent Identity Fraud and Safeguard Health Care Services

Like other industries, the medicare industry is also experiencing digitization. However, the heal...

Know Your Patient (KYP) – Effective Way to Prevent Identity Fraud and Safeguard Health Care Services Explore More

Blog

How Online ID Verification Supports Age-restricted Sellers?

The online stores selling age-restricted products like gaming services, medicine or drugs are in ...

How Online ID Verification Supports Age-restricted Sellers? Explore More

Blog

UAE Government Stepping Up Against Prevalent Crimes

The UAE is known for being home to flourishing businesses and providing a significant level of fi...

UAE Government Stepping Up Against Prevalent Crimes Explore More

Blog

A Guide to Understanding KYC in Banking

2022 has witnessed a rise in the number of fraudulent cases by 18% compared to 2021, damaging bus...

A Guide to Understanding KYC in Banking Explore More

Blog

Understanding False Positives in AML Transaction Monitoring

Financial institutions such as banks, neo-banks, insurance companies, investment companies, finte...

Understanding False Positives in AML Transaction Monitoring Explore More

Blog

Uncovering 5 Holiday Season Scams and How to Avoid them this Year

‘Tis the season when the best deals of the year are attracting customers towards online shopping ...

Uncovering 5 Holiday Season Scams and How to Avoid them this Year Explore More

Blog

AML Compliance – Global Watchlists that Businesses Need to Consider

Coordinated sanctions after the Russian invasion of Ukraine have made the headlines due to their ...

AML Compliance – Global Watchlists that Businesses Need to Consider Explore More

Blog

Why Do Freelancing Platforms Need KYC?

Technological advancements came with several betterments for humans. Where every industry is bene...

Why Do Freelancing Platforms Need KYC? Explore More

Blog

Prevailing Crimes in Identity Verification – How Shufti’s Forensic Document Verification Can Help

Identity fraud has become quite prevalent in digital businesses which is not only affecting opera...

Prevailing Crimes in Identity Verification – How Shufti’s Forensic Document Verification Can Help Explore More

Blog

Overcoming the Challenges of Proliferation Financing with AML Screening Solutions

On September 23rd, the 2021 UK NRA (National Risk Assessment) was published as part of the govern...

Overcoming the Challenges of Proliferation Financing with AML Screening Solutions Explore More

Blog

A Basic Guide to Smurfing and the Role of AML in Combating It

Scammers employ various strategies to conceal illegally acquired funds, and one increasingly prev...

A Basic Guide to Smurfing and the Role of AML in Combating It Explore More

Blog

Age Gating VS Age Verification | Enhancing Security for Minors

Age gating was once employed to stop minors from accessing age-restricted content. However, the a...

Age Gating VS Age Verification | Enhancing Security for Minors Explore More

Blog

Prevailing Crimes in Metaverse – How Shufti’s IDV Solution Can Help

Metaverse is a virtual space where people belonging to the same or different physical regions can...

Prevailing Crimes in Metaverse – How Shufti’s IDV Solution Can Help Explore More

Blog

KYC Checklist: A Comprehensive Guide for Businesses and Financial Institutions

In the ever-evolving landscape of finance, having a solid defence against financial crime is cruc...

KYC Checklist: A Comprehensive Guide for Businesses and Financial Institutions Explore More

Take the next steps to better security.

Contact us

Get in touch with our experts. We'll help you find the perfect solution for your compliance and security needs.

Contact us

Request demo

Get free access to our platform and try our products today.

Get started