← Back to all briefings
Data Strategy 5 min read Published Updated Credibility 76/100

China data transfers

China's CAC standard contract measures for cross-border data transfers provided a mechanism for lawful transfers outside China. Companies transferring data from China needed to evaluate which mechanism applied to their situation.

Reviewed for accuracy by Kodi C.

Data strategy pillar illustration for Zeph Tech briefings
Data strategy, stewardship, and privacy briefings

The Cyberspace Administration of China (CAC) issued the Measures on the Standard Contract for Outbound Transfer of Personal Information on (CAC release). Effective , the Measures allow personal information processors that fall below specified thresholds to transfer data overseas using a CAC standard contract instead of the more onerous security assessment. Teams must perform personal information protection impact assessments (PIAs), sign the standard clauses with foreign recipients, and file the contract and assessment with provincial CAC offices within 10 working days. Existing transfers must regularise within six months of the effective date.

Applicability thresholds and exclusions

Article 4 limits eligibility to processors that (1) are not critical information infrastructure operators (CIIOs); (2) process personal information of fewer than one million individuals; (3) have exported personal information of fewer than 100,000 individuals since the previous year; and (4) have exported sensitive personal information of fewer than 10,000 individuals since the previous year.

Processors exceeding these thresholds must pursue the CAC security assessment or other lawful transfer mechanisms (for example, certification). The Measures apply to both controller-to-controller and controller-to-processor transfers, covering employee data, customer information, and other personal data collected in China.

Personal information protection impact assessments

Before signing the standard contract, processors must complete a PIA evaluating legality, necessity, scale, recipient safeguards, and potential risks. Article 5 requires documentation of the personal information categories, quantity, processing purposes, overseas storage location, foreign legal environment, and risk mitigation measures. The PIA must also analyze the impact on the rights and interests of data subjects and confirm that overseas recipients meet PIPL-level protection standards. PIAs must be retained for at least three years and updated when transfer conditions change.

Contract obligations and supplementary clauses

The Annex provides mandatory clauses that cannot be altered. Key requirements include obligations for the overseas recipient to apply security measures, limit onward transfers, cooperate with CAC supervision, and notify processors of incidents. Processors must inform data subjects of transfer details and secure separate consent for sensitive personal information. Teams may add supplemental clauses addressing audit rights, encryption, localization of logs, incident response timeframes, and termination triggers, provided they do not conflict with the standard text. Contracts must be executed in Chinese; bilingual versions are recommended for foreign counterparties.

Filing workflow and timelines

Within 10 working days of contract execution, processors must submit a filing package to the provincial CAC office that includes the signed contract, PIA report, and other supporting materials (for example, proof of legal personality, data governance policies). The CAC has 15 working days to review completeness and may request supplements. Any material change—such as altered processing purposes, data categories, retention periods, or overseas recipient circumstances—requires a fresh PIA and refiling. Existing transfers predating June 2023 must complete filing by .

Implementation roadmap for multinational teams

  1. Data mapping: Inventory China-origin personal information, categorising volumes, sensitivity, and destination countries. Align data inventories with PIPL classifications and identify transfers that exceed CAC thresholds.
  2. Eligibility confirmation: Evaluate whether business units qualify for the standard contract mechanism. For transfers exceeding thresholds, prepare for the security assessment or certification pathways.
  3. PIA development: Build templates aligned with Article 5 requirements. Incorporate legal analysis of recipient jurisdictions (for example, GDPR adequacy, CLOUD Act exposure) and describe technical safeguards such as encryption, access controls, and zero trust architectures.
  4. Contract localization: Draft bilingual playbooks that incorporate Annex clauses verbatim, define roles (controller vs. processor), and add supplementary provisions covering audit rights, incident cooperation, and subcontractor controls.
  5. Filing governance: Establish RACI matrices assigning responsibility for provincial filings, supporting evidence collection, and response to CAC inquiries. Implement workflow tools to track deadlines and status.

Responsible governance and ongoing compliance

Boards and privacy committees should oversee cross-border data strategies, reviewing metrics on PIA completion, filing timelines, and incident reports. Maintain records of data subject consent, contract versions, and overseas recipient audits. Coordinate with cybersecurity teams to ensure technical safeguards (encryption, data minimization, DLP) align with PIPL requirements. Implement data subject rights processes that support cross-border access, correction, and deletion requests within statutory timeframes.

Considerations by sector

Technology and SaaS providers: Map cloud hosting arrangements, support localization options, and ensure subcontractors (for example, customer support centers) sign onward transfer clauses. Document encryption key management practices to show control.
Healthcare and life sciences: Address sensitive health data thresholds; implement de-identification or anonymization where feasible. Coordinate with ethics committees on cross-border clinical research data flows.
Financial services: Align with People’s Bank of China guidelines on personal financial information and confirm that overseas risk analytics adhere to PIPL and Anti-Money Laundering data-sharing rules.
Manufacturing and automotive: Evaluate industrial IoT data containing employee or driver telematics; integrate CAC requirements with data localization obligations under the Automotive Data Security Regulations.

Monitoring regulatory developments

The CAC Q&A clarifies that processors must refile when the overseas recipient is subject to foreign legal demands that could undermine protection levels. Teams should monitor additional guidance from provincial CAC offices, potential updates to PIPL implementing rules, and emerging sector regulations (for example, financial data export rules). Track enforcement actions to understand inspection focus areas, such as inadequate consent or insufficient technical safeguards. International businesses should coordinate with global privacy programs to maintain consistency with GDPR Standard Contractual Clauses, acknowledging differences in Chinese requirements.

Measurement and reporting

Establish KPIs covering the number of transfers under standard contracts, PIA completion rates, filing status, and outstanding remediation items. Monitor audit findings, data breach incidents, and regulator inquiries. Maintain dashboards that calculate personal information export volumes relative to thresholds, generating alerts when approaching caps. Include compliance status in executive risk reports and ESG disclosures, highlighting privacy and data governance performance.

References

This brief supports China-facing teams with CAC standard contract setup, including PIAs, bilingual contracting, and provincial filing governance.

Data Management Implementation

Data management teams should assess how this development affects data collection, processing, storage, and sharing practices. Policy updates should address any new requirements for data handling, consent management, or purpose limitations. Technical setups should align with documented policies and support audit evidence collection demonstrating compliance with data management requirements.

Ongoing monitoring should verify that data processing activities continue to align with documented purposes and comply with applicable requirements as practices evolve.

Continue in the Data Strategy pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

Coverage intelligence

Published
Coverage pillar
Data Strategy
Source credibility
76/100 — medium confidence
Topics
China data transfers · Privacy compliance · Cross-border governance · Personal information protection
Sources cited
4 sources (cac.gov.cn, digichina.stanford.edu, hitecase.com)
Reading time
5 min

References

  1. CAC — Measures on the Standard Contract for Outbound Transfer of Personal Information — Cyberspace Administration of China
  2. CAC Q&A on Implementing the Standard Contract Measures — Cyberspace Administration of China
  3. DigiChina translation of CAC Standard Contract Measures — Stanford DigiChina
  4. China issues standard contract for personal information exports — White & Case
  • China data transfers
  • Privacy compliance
  • Cross-border governance
  • Personal information protection
Back to curated briefings

Comments

Community

We publish only high-quality, respectful contributions. Every submission is reviewed for clarity, sourcing, and safety before it appears here.

    Share your perspective

    Submissions showing "Awaiting moderation" are in review. Spam, low-effort posts, or unverifiable claims will be rejected. We verify submissions with the email you provide, and we never publish or sell that address.

    Verification

    Complete the CAPTCHA to submit.