

-
-
>News
-
>Company News
How should companies comply with Measures for the Security Assessment of Outbound Data Transfer?
Editor’s note:
On 7 July 2022, the Cyberspace Administration of China issued the Measures for the Security Assessment of Outbound Data Transfer (hereinafter referred to as the "Measures"), which comprehensively and systematically set out the specific requirements for China's outbound data transfer security checks and marked the formal implementation of the outbound data transfer assessment system mentioned by the Cybersecurity Law of China.
Companies, as the main bodies of data transfer activities, often engage in cross-border data transfer activities during cross-border management, cross-border services, cross-border trade and overseas listing, etc. Especially for multinational companies, data transfer between headquarters and branches, between organs in different countries have become more often.
In this article, we will analyze how to conduct a self-assessment on cross-border data transfer and how to comply with the Measures for enterprises that have transferred or will transfer their data outbound.
How to conduct a self-assessment on cross-border data transfer?
The self-assessment can be carried out by the data processor itself or by a third-party organization, resulting in a self-assessment report. The report shall include:
4.conclusion.
For a better understanding of the respective focusandrelationship between self-assessment and official assessment, we have compared the assessment elements between the two, as shown in the following chart:
Number | Elements of self-assessment | Elements of official assessment | Difference |
1 | The legality, legitimacy, and necessity of the outbound data transfer and the data processing by the overseas recipient in terms of the purpose, scope, method, etc. | The legality, legitimacy, and necessity of the cross-border data transfer in terms of the purpose, scope, method. | The former involves consideration of the overseas recipient. |
2 | The quantity, scope, type, and sensitivity of the outbound data, and the risks that may be brought about by the outbound data transfer to national security, public interests, or the lawful rights and interests of individuals or organizations; the risk of the outbound data being tampered with, damaged, leaked, lost, relocated or illegally acquired or used during and after the outbound data transfer. | The quantity, scope, type, and sensitivity of the outbound data, and the risks that may be brought about by the outbound data transfer to national security, public interests, or the lawful rights and interests of individuals or organizations. | The former considers more about national security, public interests, and the legitimate rights and interests of individuals or organizations. |
3 | Whether the responsibilities and obligations undertaken by the overseas recipient and the management and technical measures and capabilities of the overseas recipient to perform such responsibilities and obligations can ensure the security of the outbound data. | The impact of the data security protection policies and legislation and cybersecurity environment of the country or region where the overseas recipient is located on the security of the outbound data; whether the data protection level of the overseas recipient meets the requirements of laws and administrative regulations and the mandatory national standards of the People's Republic of China. | The former focuses on the management and technical capacity of the recipient, while the latter focuses on the legal environment of the recipient. |
4 | Whether the channels for individuals to safeguard their personal information rights and interests are unobstructed. | Whether data security and personal information rights and interests can be sufficiently and effectively ensured. | The latter also considers data security, and the scope of protection of the rights and interests of personal data is larger. |
5 | Whether data security protection responsibilities and obligations are sufficiently stipulated in the Legal Document executed between the data processor and the overseas recipient; | Whether data security protection responsibilities and obligations are sufficiently stipulated in the Legal Document executed between the data processor and the overseas recipient. | The same. |
6 | / | The compliance with China's laws, administrative regulations and departmental rule. | The latter considers more. |
7 | Other matters that may affect the security of the outbound data transfer. | Other matters to be assessed as deemed by the national cyberspace administration authority. | Almost the same. |
How should companies comply with the Measures
According to the Measures, companies still have a six-month transition period f to rectify their outbound data transfer activities (i.e. to complete their rectification by March 1, 2023). To address the potential compliance challenges, we suggest that companies should sort out their internal exit data as soon as possible and determine whether they need to declare an outbound data transfer security assessment.
If companies confirm that their data transfer activities are applicable to the Measures, they should carry out self-assessment and prepare declaration materials for the official assessment to avoid negative impacts on their business or breaching of laws and regulations. Companies may store data generated within the territory of China on a system or cloud service platform in order to prevent the negative consequences of a failed declaration.
5. Pay close attention to the following-up guidelines on cross-border data transfer assessment and relative FAQs.Prepare different operational plans regarding different assessment results. For example, if the assessment is not passed, companies may need to seek alternative plans such as cooperating with local service providers or transferring their offshore system operations and maintenance team back to China.
Conclusion
Sinobravo will keep monitoring the policy trends and management measures on cybersecurity and data security, study the risk points of various cross-border data transfer scenarios, and unleash companies’ business power through our analysis.