← Back to all briefings
Compliance 5 min read Published Updated Credibility 85/100

Compliance Briefing — September 1, 2021

China’s Data Security Law entered into force on 1 September 2021, requiring data classification, critical data inventories, and security assessments for cross-border transfers.

Timeline plotting source publication cadence sized by credibility.
2 publication timestamps supporting this briefing. Source data (JSON)

Executive briefing: The Data Security Law of the People’s Republic of China became effective on 1 September 2021. Organisations handling data in China must classify datasets, protect “important” and “core” data, and perform security assessments when providing data abroad.

Key compliance checkpoints

  • Data classification. Establish tiered management distinguishing general, important, and core data with corresponding security controls.
  • Critical infrastructure obligations. Operators of critical information infrastructure must store important data domestically and undergo security assessments for exports.
  • Incident response. Implement reporting workflows for data security incidents and cooperate with state security authorities during investigations.

Operational priorities

  • Cross-border governance. Map outbound data flows, confirm legal bases, and prepare for CAC-led security assessments.
  • Vendor oversight. Evaluate third parties processing Chinese data to ensure contractual obligations and localization controls align with the law.
  • Internal controls. Update policies, access management, and monitoring around data lifecycle operations, including retention and destruction.

Enablement moves

  • Deploy data discovery and classification tooling covering China-hosted systems.
  • Stand up bilingual incident response playbooks referencing mandatory reporting timelines.
  • Create cross-functional committees to track implementing regulations from the Cyberspace Administration of China.

Sources

Zeph Tech supports China-focused compliance programs with data classification frameworks, localization controls, and cross-border assessment tooling aligned to the Data Security Law.

Timeline plotting source publication cadence sized by credibility.
2 publication timestamps supporting this briefing. Source data (JSON)
Horizontal bar chart of credibility scores per cited source.
Credibility scores for every source cited in this briefing. Source data (JSON)

Continue in the Compliance pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

  • China Data Security Law
  • Data localization
  • Cross-border data transfer
  • CAC supervision
Back to curated briefings