<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>data privacy Archives - China Collaborative Group</title>
	<atom:link href="https://www.theccgway.com/zh-hans/tag/data-privacy-zh-hans/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.theccgway.com/zh-hans/tag/data-privacy-zh-hans/</link>
	<description>Cross-border business solutions for global decision makers</description>
	<lastBuildDate>Thu, 05 Jan 2023 12:41:08 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.1</generator>

<image>
	<url>https://www.theccgway.com/wp-content/uploads/2021/04/favicon-100x100.png</url>
	<title>data privacy Archives - China Collaborative Group</title>
	<link>https://www.theccgway.com/zh-hans/tag/data-privacy-zh-hans/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>2022 China Employment</title>
		<link>https://www.theccgway.com/zh-hans/2022/03/02/4524/</link>
		
		<dc:creator><![CDATA[CCG]]></dc:creator>
		<pubDate>Wed, 02 Mar 2022 07:41:19 +0000</pubDate>
				<category><![CDATA[中国]]></category>
		<category><![CDATA[法律]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Employment]]></category>
		<category><![CDATA[Horizons Corporate Advisory]]></category>
		<category><![CDATA[labour]]></category>
		<guid isPermaLink="false">https://www.theccgway.com/2022/03/02/4524/</guid>

					<description><![CDATA[<p>Getting right personal informa...</p>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/zh-hans/2022/03/02/4524/">2022 China Employment</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com/zh-hans/">China Collaborative Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="entry-content clearfix">
<p><strong>Getting right personal information protection and maternity leave</strong></p>
<p>Currently, companies worldwide are called by both domestic and international regulations to become corporate citizens rather than merely profitable entities. In China, 2021, domestic legislation focused on data and cyber protection and introduced measures to support the third-child policy. Namely, Personal Information Protection Law (“PIPL”), effective from November 1 2022, obligates companies to strengthen personal data handling, process, and storage, and from late November, provinces and municipalities across China extended maternity leave to support the 3-child policy (announced on May 31, 2021, following the Chinese Communist Party Politburo meeting chaired by President Xi Jinping). As a result, in 2022, human resources (“HR”) across China should diligently implement plans to comply with such changes and obligations.</p>
<p>At Horizons, we have been working with clients to adjust employee policies and summarise the main aspects for human resources to practically implement changes.</p>
<p><strong>Personal Information Protection Law</strong></p>
<p>PIPL is the first legislation to address misuse of personal data and sets forth mandatory requirements for companies processing such data. Though data handling related to human resources do not require the employee’s consent, PIPL does introduce stricter obligations for those handling sensitive personal information, such as biometrics, religious beliefs, medical and health and so forth. Namely, companies shall obtain specific consent and inform such individuals of the necessity and impact on their rights and interests. Therefore, companies should audit the existing personal information processing systems to gain a comprehensive employee data overview and, if necessary, draft specific consent forms aligned with PIPL.</p>
<p>Equally, companies may only transfer personal information outside mainland China by fulfilling provisioned conditions. Under PIPL, such conditions are generally outlined and require further guidelines for companies to proceed ahead. We suggest HR keep abreast of forthcoming related guidelines, especially those handling large volumes of personal information that meet a threshold set by the National Cyberspace Authority.</p>
<p><strong>Maternity Leave</strong></p>
<p>In late November 2021, parental leave extensions were adopted in Chinese cities and provinces to stimulate the 3-child policy. Extended leave policies aim to reduce the burden of childbirth and childcare. The extended number of days varies from province to province or city to city, for example in Shanghai, maternity leave is extended to 158 days. For companies, the amended policies shall directly impact employee leave policies and workforce planning and costs to cover extended leave.</p>
<p>We suggest that companies should conduct an employee consultation process before any amendments are made to employee leave policies and ensure employees are entitled to the legally allocated number of leave days. Namely, clear specification of the type of leave and number of days such as maternity leave, paternal leave for working parents and carer’s leave. In this manner, companies can reduce the risk of labour disputes since the amendments are consented by employees and legal blinding.</p>
<p>Both PIPL and extended maternity leave reflect Environment Social and Governance (“ESG”) principles emerging in China. As an important international topic, we anticipate ESG to be present in forthcoming legislation in China, however, governed by President Xi Jinping Thought on Socialism with Chinese Characteristics.</p>
<p><em>This content appears as a courtesy of </em><a href="http://horizons-advisory.com/"><strong><em>Horizons Corporate Advisory</em></strong></a><em>, a proud member of the</em><a href="https://theccgway.com/"> <strong><em>China Collaborative Group (CCG Association)</em></strong></a><em>. It is informational in nature and does not constitute legal advice or establish an attorney-client relationship between you and its author, publisher or any member of CCG. For more information, please visit </em><a href="http://www.horizons-advisory.com"><strong><em>www.horizons-advisory.com</em></strong></a><em>. </em></p>
</div>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/zh-hans/2022/03/02/4524/">2022 China Employment</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com/zh-hans/">China Collaborative Group</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Insights into Personal Data Protection Bill</title>
		<link>https://www.theccgway.com/zh-hans/2021/12/20/insights-into-personal-data-protection-bill/</link>
		
		<dc:creator><![CDATA[CCG]]></dc:creator>
		<pubDate>Mon, 20 Dec 2021 09:16:28 +0000</pubDate>
				<category><![CDATA[商事]]></category>
		<category><![CDATA[未分类]]></category>
		<category><![CDATA[法律]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[malawi]]></category>
		<guid isPermaLink="false">https://www.theccgway.com/2021/12/20/insights-into-personal-data-protection-bill/</guid>

					<description><![CDATA[<p>The Data Protection Bill [ DPB...</p>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/zh-hans/2021/12/20/insights-into-personal-data-protection-bill/">Insights into Personal Data Protection Bill</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com/zh-hans/">China Collaborative Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Data Protection Bill [ DPB] seeks to consolidate provisions found in several Acts of Parliament for the protection and security of personal data in Malawi. At the outset, the DPB is indeed comprehensive legislation in so far as data protection is concerned as it incorporates most of the internationally recognised norms and standards on data protection. This notwithstanding, some aspects have been left out or inadequately addressed. This brief commentary highlights the positive and notable aspects of the  DPB. In my next article I highlight the weaker aspects of the DPB that may still require attention before the DPB is enacted into law.</p>
<p><strong>DPB-the highlights</strong></p>
<p>As stated, the DPB comprehensively incorporates most of the governing norms on data protection.</p>
<p><strong>Comprehensive Incorporation of Core Principles on Data Protection</strong></p>
<p>There are several internationally recognised core norms for data protection. These include Fair and lawful processing of personal information, Purpose specification, Minimality, quality, Openness and transparency, Data subject participation, Sensitivity, Security and confidentiality and Accountability.<a href="#_ftn1" name="_ftnref1">[1]</a></p>
<p>The DPB mandates data controllers to process information fairly, in a transparent manner and subject to the data subject giving consent.<a href="#_ftn2" name="_ftnref2">[2]</a> This suffices as lawful processing of personal data under the DPB. Section 19 of the DPB also requires specific treatment for sensitive personal data. The DPB requires purpose specification for the processing of personal data, minimality, quality.<a href="#_ftn3" name="_ftnref3">[3]</a> Data subject participation is guaranteed under part IV of the DPB which outlines the rights of a data subject. Data security is comprehensively regulated under Part V of the DPB. In all this, it is easy to appreciate how comprehensive the DPB is in embracing the international norms and standard on data protection.</p>
<p><strong>Cross-Border Transfers of Personal Data</strong></p>
<p>The DPB adopts a comprehensive framework for cross-border transfer of personal data.<a href="#_ftn4" name="_ftnref4">[4]</a> This is a great step towards ensuring data protection in cross-border online transactions. This is because the DPB effectively provides a platform against which cross-border flows of personal data can be regulated. This can be sharply contrasted from the old Electronic Transactions and Cyber Security Act, which did not contain any provisions regulating cross-border flows of personal data in electronic transactions.</p>
<p>The DPB can be commended on many fronts including the condition of making data flows primarily subject to a decision on the adequacy of data protection in the foreign country to which the data will be transferred. <a href="#_ftn5" name="_ftnref5">[5]</a>  The DPB is progressive in that data transfers can be authorised where the foreign country has a law, binding corporate rules, contractual clauses, code of conduct, or certification mechanism that afford an adequate level of protection.<a href="#_ftn6" name="_ftnref6">[6]</a> This list is exhaustive enough to ensure sufficient facilitation of cross-border flows. In the absence of an adequate level of protection of any of the foregoing, a data transfer can be authorised under these conditions: if the data subject gives consent; if the processing is necessary for performance or conclusion of contract involving the data subject; and where consent cannot be practicably given, the transfer is nevertheless in the best interest of the data subject and the data subject would not have objected to it had he been asked.<a href="#_ftn7" name="_ftnref7">[7]</a> These exceptions are broad enough to ensure the pace of international transactions is not unnecessarily hindered.</p>
<p><strong>Data Protection by Design and Default</strong></p>
<p>The DPB is also very progressive in that it accords the Authority with the power to publish directions on good practices and codes of conduct in data protection including the application of data protection principles by design and default in the processing of personal data.<a href="#_ftn8" name="_ftnref8">[8]</a> Data protection by design is a concept that dictates that in light of progressive data protection regimes, companies must ensure that in their activities they incorporate data protection. Essentially since the companies must comply with data protection they must not wait for breaches before they address data protection but rather from the commencement of any action or process data protection must be incorporate and addressed.</p>
<p>On the other hand, data protection by default entails that for those computer products already released, there must be adherence to the highest standard of privacy to ensure data is kept safe and secure. Further, any data necessary for the operation of the product should only be kept for the minimum possible amount of time. The incorporation of these concepts in the DPB is a remarkable step in ensuring that privacy will be respected as technology gets more sophisticated.</p>
<p>The DPB clearly updates the data protection landscape in Malawi to comparable international standards.  This is indeed a shift in the right direction and will ensure that Malawi takes part in the information age. In my next article I shall explore some of the weaknesses in the DPB that may yet be improved to ensure comprehensive legislation is enacted.</p>
<p><strong>Author: Gonjetso Dikiya LLB(Hons) University of Malawi; LLM candidate in Information and Communications Law, University of the Witwatersrand.</strong></p>
<p><strong>Head of Legal Services- Dispute Settlement Services</strong></p>
<p><em>This content appears as a courtesy of <span dir="ltr"><a href="https://ritzattorneys.com/">Ritz Attorneys at Law</a></span></em><em>, a proud member of the</em><a href="https://theccgway.com/"> <strong><em>China Collaborative Group (CCG Association)</em></strong></a><em>. It is informational in nature and does not constitute legal advice or establish an attorney-client relationship between you and its author, publisher or any member of CCG. For more information, please visit </em><strong><a href="https://ritzattorneys.com/"><em>https://ritzattorneys.com/</em></a><em>.</em></strong></p>
<p><strong> </strong></p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> Roos Anneliese ‘Core Principles of Data Protection’ 2006 <em>CILSA</em> 102-130.</p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> S. 18 of the DPB</p>
<p><a href="#_ftnref3" name="_ftn3">[3]</a> S. 23 of the DPB.</p>
<p><a href="#_ftnref4" name="_ftn4">[4]</a> Part VI of the DPB.</p>
<p><a href="#_ftnref5" name="_ftn5">[5]</a> S. 34(1)(a) of the DPB.</p>
<p><a href="#_ftnref6" name="_ftn6">[6]</a> S. 34(1)(a) of the DPB.</p>
<p><a href="#_ftnref7" name="_ftn7">[7]</a> S 36 of the DPB.</p>
<p><a href="#_ftnref8" name="_ftn8">[8]</a> S. 13 of the DPB</p>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/zh-hans/2021/12/20/insights-into-personal-data-protection-bill/">Insights into Personal Data Protection Bill</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com/zh-hans/">China Collaborative Group</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>China&#8217;s assertive stance and the impacts for your company</title>
		<link>https://www.theccgway.com/zh-hans/2021/10/25/chinas-assertive-stance-and-the-impacts-for-your-company/</link>
		
		<dc:creator><![CDATA[CCG]]></dc:creator>
		<pubDate>Mon, 25 Oct 2021 08:46:28 +0000</pubDate>
				<category><![CDATA[中国]]></category>
		<category><![CDATA[未分类]]></category>
		<category><![CDATA[法律]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[foreign investment]]></category>
		<category><![CDATA[Horizons Corporate Advisory]]></category>
		<guid isPermaLink="false">https://www.theccgway.com/?p=4426</guid>

					<description><![CDATA[<p>Deng Xiaoping initiated the Re...</p>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/zh-hans/2021/10/25/chinas-assertive-stance-and-the-impacts-for-your-company/">China&#8217;s assertive stance and the impacts for your company</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com/zh-hans/">China Collaborative Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="entry-content clearfix">
<p>Deng Xiaoping initiated the Reform and Opening Up policy and opened the door to the world in 1978. As a result, China’s GDP rose from 367.9 billion yuan in 1978 to 15.45 trillion yuan in 2020 and lifted China from a third-world country to becoming a global economic superpower.</p>
<p>In the last 40 years, China’s significant economic growth has increased its role in the world both as a trade and investment partner and as an international Institution member in the United Nations (1945), World Trade Organisation (2001), and World Bank (1980). As a result, China holds a more influential and significant role in the world today than 40 years ago and more recently demonstrating a more mature and assertive stance.</p>
<p>Internationally, China has increased activism and assertiveness within international institutions (“Institutions”) in recent years. Specifically, China increased engagement in formulating policies and positions within the Institutions and increasingly utilised such Institutions as platforms to articulate its’ position. Equally, today’s institutions represent a broader range of countries with different priorities, needs, and interests than the founding members. Therefore, Institutions are increasingly evolving from the post-second world war era, in which the USA played a primary role in the founding principles of the Institutions.</p>
<p>Domestically, China has adopted a collection of legislation to strengthen the national sovereignty and interests, including:</p>
<ul>
<li>The Cyber Security Law of the People’s Republic of China effective from 1 June 2017</li>
<li>The Export Control Law of the People’s Republic of China effective from 1 December 2020</li>
<li>Rules on Counteracting Unjustified Extra-Territorial Application of Foreign Legislation and other Measures, effective from 9 January 2021</li>
<li>The Anti-Foreign Sanctions Law of the People’s Republic of China effective from 10 June 2021</li>
<li>Data Security Law of the People’s Republic of China effective from 1 September 2021</li>
</ul>
<p>For companies and individuals doing business in or with China, such legislation defines business operations – especially cross-border activities in several areas.</p>
<p>With a rapidly growing middle-class in China, the Chinese market for many companies is an increasingly important and growing market segment. Therefore, companies either invested or planning to invest in the Chinese market cannot disregard national sovereignty and interests’ compliance within their business operations. Below, we highlight the three key areas of national sovereignty and interests’ compliance applicable to companies doing business in or with China.</p>
<h3><strong>Cyber and data security</strong></h3>
<p>Cybersecurity for many countries is a top national priority to maintain secure networks and protect data from cyber-attacks.</p>
<p>In China, cyber security is centred on the security of the collected data, and companies are obliged to ensure networks collecting and processing the data are secure, monitored and shall not endanger national security or sovereignty.</p>
<p>The Cyber Security Law of the People’s Republic of China (“CSL”) and Data Security Law of the People’s Republic of China (“DSL”) are two primary legislation governing cyberspace and affect all companies working with data collection, processing, and management in China.</p>
<h4><em>Cyber Security Law</em></h4>
<p>The CSL establishes the compliance framework for network operators and is the overarching law for cybersecurity.</p>
<p>Under CSL, the network operator is defined as owners and administrators of the network and network service providers and obliged to ensure servers and data stored, transmitted, or created on such servers are secure and protected from cyber-attacks. Furthermore, the CSL outlines a Critical Information Infrastructure (“CII”), which subjects information crucial to national security and economy to store the collected and produced personal information and important data within the territory of mainland China. Any data required to be transmitted aboard shall be conducted under measures of the Cyberspace Administration of China.</p>
<h4><em>Data Security Law</em></h4>
<p>DSL sets forth an overarching framework to regulate data handling and management accordingly with national sovereignty, security, and development interests.</p>
<p>Under the DSL, the scope and definition of data include any record of information in electronic or other forms and imposes an extraterritorial application to China-related data handling and management.</p>
<p>Organisations and individuals are obliged to ensure and formulate data management policies, cooperate with public security and national security organs that require their data for national security or criminal investigation. Mismanagement of data, specifically those handling important data could face significant liabilities for both the company and individual.</p>
<h3><strong><em>Export Controls</em></strong></h3>
<p>Prior to the adoption of the Export Control Law of the People’s Republic of China (“ECL”), export controls were scattered across several laws. The ECL is the first comprehensive framework establishing export controls, a list of controlled items, and provisioning extra-territorial application to individuals and organisations outside of China who endanger national security and interests.</p>
<p>Under the ECL any export of the controlled items from an individual or organisation within the territory of mainland China to an overseas individual or organisation is subject to certain obligations including obtaining the relevant license from the State Export Control Authorities. Controlled items are defined under the ECL as the following:</p>
<ul>
<li>Dual-use items which can be for civil and military purposes or helping to improve military potentials, especially goods, technologies, and services in design, development, production, or application utilised for weapons of mass destruction;</li>
<li>Military products comprising of equipment, special production facilities, and other related goods, technologies, and services utilised for military purposes;</li>
<li>Nuclear materials, including nuclear equipment, non-nuclear materials used for nuclear reactors, and related technologies and services;</li>
<li>Technical materials and data related to the items listed above.</li>
</ul>
<p>For companies with an international supply chain or engaged in cross-border research and development, the ESL has a significant impact on exporting operations. For example, foreign items containing components assembled or manufactured in China could be deemed as controlled items or cross-border research or technology transfer, activities such as research, inter-company research (where the research and development centre are in China), or technology sales to foreign enterprises could be classified as related technical material and data – thus subject to export control.</p>
<h3><strong><em>Addressing sanctions</em></strong></h3>
<p>In 2021, China addressed the application of foreign legislation and sanctions to Chinese individuals and legal entities both within and outside of the territory of China. Two main legislation were enacted and established a stricter stance against foreign economic sanctions against Chinese organisations and individuals.</p>
<h4><em>Rules on Counteracting Unjustified Extra-Territorial Application of Foreign Legislation and other Measures</em></h4>
<p>Early this year, the Rules on Counteracting Unjustified Extra-Territorial Application of Foreign Legislation and other Measures (“Rules”) were promogulated by the Ministry of Commerce. The Rules provision a working mechanism for Chinese companies and individuals affected by extraterritorial foreign legislation that prohibit or restrict engagement in normal economic, trade, and related activities with a third State (or region) or its citizens, legal person, or other organisations. Affected individuals or entities are required to such matters to the State Council within 30 days. The State Council shall issue a prohibition order to oppose an unjustified extra-territorial application of foreign legislation and other measures.</p>
<p>Foreign companies in China especially multinationals should note the Rules stipulate any Chinese entities who comply with the unjustified extra-territorial application of foreign legislation subject to a prohibition order can be pursued in court.</p>
<h4><em>The Anti-Foreign Sanctions Law of the People’s Republic of China</em></h4>
<p>The Anti-Foreign Sanctions Law of the People’s Republic of China (“AFSL”) establishes the regulatory framework for foreign persons, both legal entities and individuals, acting against China’s national interests. Under the AFSL, organisations, individuals, and affiliated individuals who directly or indirectly participate in formulating, deciding, and implementing discriminatory restrictive measures against China shall be included in a Sanctions List (“List”). Those included in the List shall be subject to penalties including visa restrictions, prohibitions, or restricted conduct in transactions, cooperation, or other activities with Chinese organisations or individuals. Therefore, for foreign companies and individuals doing business in or with China, AFSL significantly impacts external conduct and communications, and public relations.</p>
<p>Whilst some may view a more assertive China negatively, China’s international significance and role cannot be disregarded. Specifically, in the business world, companies involved in the Chinese market should evaluate their full operations and third parties’ relations and update relevant policies or establish China-specific policies, otherwise risk legal penalties and economic losses. Unless companies forgo the China market completely, the recent legislative movements in strengthening national sovereignty and interests should be reflected in company operations and policies. Companies generating business from China cannot disregard China’s principles around national sovereignty and interests.</p>
<p><em>This content appears as a courtesy of </em><a href="http://horizons-advisory.com/"><strong><em>Horizons Corporate Advisory</em></strong></a><em>, a proud member of the</em><a href="https://theccgway.com/"> <strong><em>China Collaborative Group (CCG Association)</em></strong></a><em>. It is informational in nature and does not constitute legal advice or establish an attorney-client relationship between you and its author, publisher or any member of CCG. For more information, please visit </em><a href="http://www.horizons-advisory.com"><strong><em>www.horizons-advisory.com</em></strong></a><em>. </em></p>
</div>
<p>The post <a rel="nofollow" href="https://www.theccgway.com/zh-hans/2021/10/25/chinas-assertive-stance-and-the-impacts-for-your-company/">China&#8217;s assertive stance and the impacts for your company</a> appeared first on <a rel="nofollow" href="https://www.theccgway.com/zh-hans/">China Collaborative Group</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
