← Back to all briefings
Compliance 5 min read Published Updated Credibility 85/100

China Data Security Law

China’s Data Security Law entered into force on 1 September 2021, requiring data classification, critical data inventories, and security assessments for cross-border transfers.

Accuracy-reviewed by the editorial team

Compliance pillar illustration for Zeph Tech briefings
Compliance controls, audit, and evidence briefings

The Data Security Law of the People's Republic of China became effective on 1 September 2021. Teams handling data in China must classify datasets, protect "important" and "core" data, and perform security assessments when providing data abroad. This landmark legislation represents China's full approach to data governance and creates significant compliance obligations for both domestic and foreign enterprises operating within Chinese jurisdiction.

Key Compliance Checkpoints Under the Data Security Law

The Data Security Law sets up a hierarchical data classification system that requires organizations to inventory their data assets and apply appropriate protections based on sensitivity and national security implications. Understanding these classification requirements is essential for developing compliant data governance programs.

  • Data classification. Establish tiered management distinguishing general, important, and core data with corresponding security controls. Important data refers to information that, if leaked or tampered with, could harm national security, economic operations, or social stability. Core data receives the highest protection level due to its potential impact on national security.
  • Critical infrastructure obligations. Operators of critical information infrastructure must store important data domestically and undergo security assessments for exports. These requirements build upon the Cybersecurity Law and create additional compliance layers for organizations in sensitive sectors.
  • Incident response. Implement reporting workflows for data security incidents and cooperate with state security authorities during investigations. Failure to report incidents promptly can result in significant penalties and regulatory scrutiny.

Operational Priorities for Multinational Organizations

Organizations with operations spanning multiple jurisdictions face particular challenges in harmonizing China's data localization requirements with global data governance practices. Developing clear policies and technical controls for cross-border data flows is essential for continued business operations.

  • Cross-border governance. Map outbound data flows, confirm legal bases, and prepare for CAC-led security assessments. The security assessment process requires detailed documentation of data types, purposes, recipients, and security measures, with reviews potentially taking several months to complete.
  • Vendor oversight. Evaluate third parties processing Chinese data to ensure contractual obligations and localization controls align with the law. Vendor agreements should include specific provisions addressing data classification, security requirements, and audit rights.
  • Internal controls. Update policies, access management, and monitoring around data lifecycle operations, including retention and destruction. Role-based access controls should reflect data classification levels, with stricter requirements for important and core data access.

Enablement Moves for Compliance Teams

  • Deploy data discovery and classification tooling covering China-hosted systems. Automated discovery helps maintain accurate data inventories as systems and data volumes evolve.
  • Stand up bilingual incident response playbooks referencing mandatory reporting timelines. Chinese regulatory communications require Mandarin documentation, so maintaining bilingual procedures ensures rapid response capability.
  • Create cross-functional committees to track implementing regulations from the Cyberspace Administration of China. The regulatory environment continues evolving as the CAC issues additional guidance on specific industries and data types.

The Data Security Law operates alongside the Cybersecurity Law (effective June 2017) and Personal Information Protection Law (effective November 2021) to form China's full data governance framework. Organizations must consider all three laws when designing compliance programs, as requirements may overlap or create additive obligations for certain data types.

The Cybersecurity Law addresses network security and critical information infrastructure protection, while PIPL focuses specifically on personal information processing. The Data Security Law takes a broader scope, covering all data regardless of whether it is personal information. This layered approach means organizations may need separate compliance tracks for different data categories while maintaining consistent underlying security controls.

Enforcement and Penalty Considerations

The Data Security Law establishes significant penalties for non-compliance, including fines up to 10 million RMB for serious violations, potential business license revocation, and personal liability for responsible individuals. Regulatory enforcement has increased since the law's setup, with particular focus on cross-border data transfer compliance and data localization requirements. If you are affected, focus on compliance investments based on risk exposure and regulatory attention patterns in their specific industries.

Continue in the Compliance pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

Coverage intelligence

Published
Coverage pillar
Compliance
Source credibility
85/100 — high confidence
Topics
China Data Security Law · Data localization · Cross-border data transfer · CAC supervision
Sources cited
3 sources (npc.gov.cn, cac.gov.cn, iso.org)
Reading time
5 min

Further reading

  1. Data Security Law of the People’s Republic of China — National People’s Congress
  2. CAC notice on implementing the Data Security Law — Cyberspace Administration of China
  3. ISO 37301:2021 — Compliance Management Systems — International Organization for Standardization
  • China Data Security Law
  • Data localization
  • Cross-border data transfer
  • CAC supervision
Back to curated briefings

Comments

Community

We publish only high-quality, respectful contributions. Every submission is reviewed for clarity, sourcing, and safety before it appears here.

    Share your perspective

    Submissions showing "Awaiting moderation" are in review. Spam, low-effort posts, or unverifiable claims will be rejected. We verify submissions with the email you provide, and we never publish or sell that address.

    Verification

    Complete the CAPTCHA to submit.