China’s emerging data protection framework

Abstract Over the past 5 years, the People’s Republic of China has accelerated efforts to establish a legal architecture for data protection. With the promulgation of the Personal Information Protection Law (PIPL) and the Data Security Law (DSL) in the summer of 2021, the first phase of these effort...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Journal of cybersecurity (Oxford) Ročník 8; číslo 1
Hlavný autor: Creemers, Rogier
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Oxford Oxford University Press 2022
Predmet:
ISSN:2057-2085, 2057-2093
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Abstract Over the past 5 years, the People’s Republic of China has accelerated efforts to establish a legal architecture for data protection. With the promulgation of the Personal Information Protection Law (PIPL) and the Data Security Law (DSL) in the summer of 2021, the first phase of these efforts have been concluded. These will have a significant impact on data flows within China, but also merit foreign attention. They provide a new approach to data protection to be subjected to comparative analysis, and may influence the development of data protection legislation in other states, particularly those with close digital connections to China. Doing so requires a greater understanding of how this legislation is shaped by the Chinese political and economic context. Drawing on a thorough review of government documents, supplemented by Chinese-language academic sources, this article reviews the evolution of the two pillars of China’s data protection architecture, from the early stage of fragmentation via the promulgation of the Cybersecurity Law in 2016, up to the present day. It finds that the PIPL and its attendant regulations serve to primarily regulate the relationship between large technology companies and consumers, as well as prevent cyber crime. It does not create meaningful constraints on data collection and use by the state. Even so, the PIPL bears a clear family resemblance to personal data protection regimes elsewhere in the world. In contrast, the DSL is a considerable innovation, attempting to prevent harm to national security and the public interest inflicted through data-enabled means. While implementing structures for this Law remain under construction, it will likely herald a thorough reorganization of the way through which data is collected, stored, and managed within all kinds of Chinese actors.
AbstractList Over the past 5 years, the People’s Republic of China has accelerated efforts to establish a legal architecture for data protection. With the promulgation of the Personal Information Protection Law (PIPL) and the Data Security Law (DSL) in the summer of 2021, the first phase of these efforts have been concluded. These will have a significant impact on data flows within China, but also merit foreign attention. They provide a new approach to data protection to be subjected to comparative analysis, and may influence the development of data protection legislation in other states, particularly those with close digital connections to China. Doing so requires a greater understanding of how this legislation is shaped by the Chinese political and economic context. Drawing on a thorough review of government documents, supplemented by Chinese-language academic sources, this article reviews the evolution of the two pillars of China’s data protection architecture, from the early stage of fragmentation via the promulgation of the Cybersecurity Law in 2016, up to the present day. It finds that the PIPL and its attendant regulations serve to primarily regulate the relationship between large technology companies and consumers, as well as prevent cyber crime. It does not create meaningful constraints on data collection and use by the state. Even so, the PIPL bears a clear family resemblance to personal data protection regimes elsewhere in the world. In contrast, the DSL is a considerable innovation, attempting to prevent harm to national security and the public interest inflicted through data-enabled means. While implementing structures for this Law remain under construction, it will likely herald a thorough reorganization of the way through which data is collected, stored, and managed within all kinds of Chinese actors.
Abstract Over the past 5 years, the People’s Republic of China has accelerated efforts to establish a legal architecture for data protection. With the promulgation of the Personal Information Protection Law (PIPL) and the Data Security Law (DSL) in the summer of 2021, the first phase of these efforts have been concluded. These will have a significant impact on data flows within China, but also merit foreign attention. They provide a new approach to data protection to be subjected to comparative analysis, and may influence the development of data protection legislation in other states, particularly those with close digital connections to China. Doing so requires a greater understanding of how this legislation is shaped by the Chinese political and economic context. Drawing on a thorough review of government documents, supplemented by Chinese-language academic sources, this article reviews the evolution of the two pillars of China’s data protection architecture, from the early stage of fragmentation via the promulgation of the Cybersecurity Law in 2016, up to the present day. It finds that the PIPL and its attendant regulations serve to primarily regulate the relationship between large technology companies and consumers, as well as prevent cyber crime. It does not create meaningful constraints on data collection and use by the state. Even so, the PIPL bears a clear family resemblance to personal data protection regimes elsewhere in the world. In contrast, the DSL is a considerable innovation, attempting to prevent harm to national security and the public interest inflicted through data-enabled means. While implementing structures for this Law remain under construction, it will likely herald a thorough reorganization of the way through which data is collected, stored, and managed within all kinds of Chinese actors.
Author Creemers, Rogier
Author_xml – sequence: 1
  givenname: Rogier
  orcidid: 0000-0002-8803-4971
  surname: Creemers
  fullname: Creemers, Rogier
  email: r.j.e.h.creemers@hum.leidenuniv.nl
BookMark eNqFkM9KAzEQxoNUsNZePS94Etw2ySab7FGK_6DgRc8hm53Ure2mJinSm6_h6_kkpmzxIIin-Zj5fjPDd4oGnesAoXOCJwRXxdTs6gBmGnfaYEKO0JBiLnKaRoMfLfkJGoewxBiTilImyiG6mr20nf76-AwZrMEv2m6RNTrqbONdBBNb12XW6zW8O_96ho6tXgUYH-oIPd_ePM3u8_nj3cPsep4bhmXMmSaVlg2viGS1FaKkRW01p8KyEhtOLJRF0o0ECURiYoWhdc1TpwGMOStG6KLfm55420KIaum2vksnVUFKKRgTVZFcrHcZ70LwYJVpo95_HL1uV4pgtY9G9dGoQzQJm_zCNr5da7_7G7jsAbfd_Of9BjHTec0
CitedBy_id crossref_primary_10_1515_gj_2023_0013
crossref_primary_10_1145_3702249
crossref_primary_10_17645_pag_10413
crossref_primary_10_1002_poi3_424
crossref_primary_10_1016_j_telpol_2024_102836
crossref_primary_10_1057_s41599_024_03952_z
crossref_primary_10_3390_bdcc9030062
crossref_primary_10_3389_fgene_2023_1086802
crossref_primary_10_17645_pag_10422
crossref_primary_10_17645_pag_10361
crossref_primary_10_1080_09512748_2023_2294787
crossref_primary_10_1080_21622671_2023_2183894
crossref_primary_10_3390_su17167347
crossref_primary_10_4236_blr_2025_163086
crossref_primary_10_1017_bap_2023_41
crossref_primary_10_1080_13523260_2023_2269809
crossref_primary_10_1016_j_actpsy_2025_105176
crossref_primary_10_1145_3715317
crossref_primary_10_1057_s41599_025_04656_8
crossref_primary_10_1177_20563051241301265
crossref_primary_10_1177_23477970241261432
crossref_primary_10_1080_21622671_2023_2216737
crossref_primary_10_2196_55061
Cites_doi 10.1007/978-3-642-21750-0
10.1080/17544750.2019.1649289
10.1093/grurint/ikaa136
10.1093/cjip/poab005
10.21552/edpl/2018/4/19
10.1177/0097700421993392
10.9785/cri-2018-190402
10.26686/vuwlr.v36i3.5610
10.1007/s10676-005-0456-y
10.1017/9781108864596.003
10.1093/slr/18.3.208
10.1162/isec_a_00383
10.1093/ajcl/avy016
10.1080/15614263.2018.1507895
10.2307/840631
10.2139/ssrn.4070682
ContentType Journal Article
Copyright The Author(s) 2022. Published by Oxford University Press. 2022
The Author(s) 2022. Published by Oxford University Press. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: The Author(s) 2022. Published by Oxford University Press. 2022
– notice: The Author(s) 2022. Published by Oxford University Press. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID TOX
AAYXX
CITATION
8FE
8FG
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
DOI 10.1093/cybsec/tyac011
DatabaseName Oxford Journals Open Access Collection
CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials - QC
ProQuest Central
ProQuest Technology Collection
ProQuest One
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
DatabaseTitle CrossRef
Publicly Available Content Database
Advanced Technologies & Aerospace Collection
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList Publicly Available Content Database

CrossRef
Database_xml – sequence: 1
  dbid: TOX
  name: Oxford Journals Open Access Collection
  url: https://academic.oup.com/journals/
  sourceTypes: Publisher
– sequence: 2
  dbid: PIMPY
  name: ProQuest Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2057-2093
ExternalDocumentID 10_1093_cybsec_tyac011
10.1093/cybsec/tyac011
GeographicLocations China
GeographicLocations_xml – name: China
GroupedDBID 0R~
5VS
AAFWJ
AAMVS
AAOGV
AAPXW
AAVAP
ABEJV
ABGNP
ABPTD
ABQLI
ABXVV
ACGFS
ADBBV
ADMLS
AENZO
AFKRA
AFPKN
ALMA_UNASSIGNED_HOLDINGS
ALUQC
AMNDL
ARAPS
ARCSS
AVWKF
BAYMD
BCNDV
BENPR
BGLVJ
CCPQU
CIDKT
EBS
EJD
GROUPED_DOAJ
H13
HCIFZ
IAO
ICD
IEA
IMI
ITC
K7-
KQ8
KSI
ML0
M~E
O9-
OAWHX
OJQWA
OK1
PEELM
PIMPY
RXO
TOX
AAYXX
AFFHD
CITATION
PHGZM
PHGZT
PQGLB
8FE
8FG
ABUWG
AZQEC
DWQXO
GNUQQ
JQ2
P62
PKEHL
PQEST
PQQKQ
PQUKI
PUEGO
ID FETCH-LOGICAL-c408t-4a19a8d59184bf77623bfa527f460c51fe637f4d8e8e1801f7c2bb5f4dde00543
IEDL.DBID K7-
ISICitedReferencesCount 40
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000844271700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2057-2085
IngestDate Fri Sep 19 20:53:53 EDT 2025
Sat Nov 29 02:49:03 EST 2025
Tue Nov 18 20:00:29 EST 2025
Wed Apr 02 07:05:30 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License This is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited.
https://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-4a19a8d59184bf77623bfa527f460c51fe637f4d8e8e1801f7c2bb5f4dde00543
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-8803-4971
OpenAccessLink https://www.proquest.com/docview/3168744793?pq-origsite=%requestingapplication%
PQID 3168744793
PQPubID 7121347
ParticipantIDs proquest_journals_3168744793
crossref_citationtrail_10_1093_cybsec_tyac011
crossref_primary_10_1093_cybsec_tyac011
oup_primary_10_1093_cybsec_tyac011
PublicationCentury 2000
PublicationDate 2022-00-00
PublicationDateYYYYMMDD 2022-01-01
PublicationDate_xml – year: 2022
  text: 2022-00-00
PublicationDecade 2020
PublicationPlace Oxford
PublicationPlace_xml – name: Oxford
PublicationTitle Journal of cybersecurity (Oxford)
PublicationYear 2022
Publisher Oxford University Press
Publisher_xml – name: Oxford University Press
References Ministry of Industry and Information Technology (2022121515104837500_bib85) 2021
Zhou (2022121515104837500_bib29) 2006
National Information Security Standardization Technical Committee (2022121515104837500_bib26) 2003
Zhou (2022121515104837500_bib7) 2018
Hong (2022121515104837500_bib61) 2017; 1
Creemers (2022121515104837500_bib38) 2022
Xinhuanet (2022121515104837500_bib63) 2014
Lu (2022121515104837500_bib79) 2018
Wang (2022121515104837500_bib14) 2011
Sacks (2022121515104837500_bib72) 2018
Cybersecurity Review Office (2022121515104837500_bib98) 2021
Cyberspace Administration of China (2022121515104837500_bib92) 2021
Creemers (2022121515104837500_bib52) 2022
Geller (2022121515104837500_bib4) 2020; 69
Cybersecurity Review Office (2022121515104837500_bib95) 2021
Ding (2022121515104837500_bib47) 2018; 13
Creemers (2022121515104837500_bib15) 2014
National People's Congress (2022121515104837500_bib89) 2021
Naughton (2022121515104837500_bib86) 2021
Clarke (2022121515104837500_bib17) 2020
Schaefer (2022121515104837500_bib100) 2021
United States Trade Representative (2022121515104837500_bib67) 2017
Pohle (2022121515104837500_bib12) 2018; 19
Mozur (2022121515104837500_bib44) 2017
National People's Congress (2022121515104837500_bib59) 2014
Ministry of Public Security (2022121515104837500_bib27) 2004
Ministry of Industry and Information Technology (2022121515104837500_bib32) 2011
Boyne (2022121515104837500_bib11) 2018; 66
Goldstein (2022121515104837500_bib87) 2020; 45
Cao (2022121515104837500_bib35) 2005; 36
National Information Security Standardization Technical Committee (2022121515104837500_bib75) 2017
Santoni (2022121515104837500_bib97) 2018; 4
State Council (2022121515104837500_bib19) 2016
Fang (2022121515104837500_bib101) 2022
Standing Committee of the National People's Congress (2022121515104837500_bib37) 2009
Tham (2022121515104837500_bib46) 2018
Cyberspace Administration of China (2022121515104837500_bib83) 2022
Hong (2022121515104837500_bib90) 2020
Xinhuanet (2022121515104837500_bib42) 2017
Zeng (2022121515104837500_bib22) 2021; 14
Zhang (2022121515104837500_bib18) 2010; 8
Standing Committee of the National People's Congress (2022121515104837500_bib34) 1991
Ministry of Public Security (2022121515104837500_bib82) 2019
Cyberspace Administration of China (2022121515104837500_bib20) 2022
National Information Security Standardization Technical Committee (2022121515104837500_bib76) 2022
Lovelock (2022121515104837500_bib23) 1996; 5
De Hert (2022121515104837500_bib2) 2005
Ministry of Industry and Information Technology (2022121515104837500_bib57) 2013
Hong (2022121515104837500_bib51) 2017; 06
Cyberspace Administration of China (2022121515104837500_bib84) 2022
People's Bank of China (2022121515104837500_bib31) 2011
Lee (2022121515104837500_bib40) 2018
Internet Society of China (2022121515104837500_bib77) 2018
Standing Committee of the National People's Congress (2022121515104837500_bib54) 2012
Creemers (2022121515104837500_bib16) 2020
Liu (2022121515104837500_bib50) 2020; 13
Cyberspace Administration of China (2022121515104837500_bib96) 2021
National People's Congress (2022121515104837500_bib88) 2021
Hong (2022121515104837500_bib91) 2020
Cyberspace Administration of China (2022121515104837500_bib71) 2019
Lynch (2022121515104837500_bib21) 2022; 48
Ministry of Public Security (2022121515104837500_bib73) 2018
Greenleaf (2022121515104837500_bib1) 2008
Sacks (2022121515104837500_bib69) 2017
State Council (2022121515104837500_bib41) 2022
Han (2022121515104837500_bib5) 2018; 4
Cyberspace Administration of China (2022121515104837500_bib64) 2017
Cai (2022121515104837500_bib49) 2018; 19
App Working Group (2022121515104837500_bib81) 2019
Wang (2022121515104837500_bib9) 2019; 6
Shu (2022121515104837500_bib45) 2015
Clarke (2022121515104837500_bib10) 2003
Cyberspace Administration of China (2022121515104837500_bib94) 2021
National People's Congress (2022121515104837500_bib60) 2016
Wang (2022121515104837500_bib36) 2012; 6
National People's Congress (2022121515104837500_bib80) 2018
Standardization Administration of China (2022121515104837500_bib66) 2017
Wang (2022121515104837500_bib78) 2018
Cyberspace Administration of China (2022121515104837500_bib74) 2022
Standing Committee of the National People's Congress (2022121515104837500_bib30) 2009
Hong (2022121515104837500_bib68) 2017
Hong (2022121515104837500_bib8) 2018
Li (2022121515104837500_bib43) 2015; 7
National People's Congress (2022121515104837500_bib102) 2020
Ministry of Public Security (2022121515104837500_bib55) 2013
National People's Congress (2022121515104837500_bib56) 2015
Xu (2022121515104837500_bib6) 2015
State Council (2022121515104837500_bib25) 1994
Cyberspace Administration of China (2022121515104837500_bib93) 2021
Tencent Research Institute (2022121515104837500_bib53) 2018
Pernot-Leplay (2022121515104837500_bib3) 2020; 8
Standing Committee of the National People's Congress (2022121515104837500_bib58) 2013
Keller (2022121515104837500_bib62) 1994; 42
Zhu (2022121515104837500_bib28) 1997; 18
DigiChina (2022121515104837500_bib24) 2021
Lü (2022121515104837500_bib13) 2005; 7
National Information Security Standardization Technical Committee (2022121515104837500_bib33) 2012
Cyberspace Administration of China (2022121515104837500_bib65) 2017
CNNIC (2022121515104837500_bib39) 2022
Lee (2022121515104837500_bib48) 2021; 13
Cyberspace Administration of China (2022121515104837500_bib70) 2019
Cyberspace Administration of China (2022121515104837500_bib99) 2021
References_xml – volume: 13
  start-page: 380
  year: 2018
  ident: 2022121515104837500_bib47
  article-title: Personal data protection: rethinking the reasons, nature, and legal framework
  publication-title: Front Law Chin
– year: 2022
  ident: 2022121515104837500_bib83
  article-title: Guanyu shuru fa deng 33 kuan app weifa weiguid shouji shiyong geren xinxi qingkuang de tongbao [Notification on the illegal collection and use of personal information in 33 apps including input methods]
– volume-title: Protecting Privacy in China: A Research on China's Privacy Standards and the Possibility of Establishing the Right to Privacy and the Information Privacy Protection legislation in Modern China
  year: 2011
  ident: 2022121515104837500_bib14
  doi: 10.1007/978-3-642-21750-0
– volume: 13
  start-page: 84
  year: 2020
  ident: 2022121515104837500_bib50
  article-title: China's data localization
  publication-title: Chin J Commun
  doi: 10.1080/17544750.2019.1649289
– volume: 69
  start-page: 1191
  year: 2020
  ident: 2022121515104837500_bib4
  article-title: How comprehensive is Chinese data protection law? A systematisation of Chinese data protection law from a European perpective
  publication-title: GRUR Int
  doi: 10.1093/grurint/ikaa136
– volume: 6
  start-page: 5
  year: 2019
  ident: 2022121515104837500_bib9
  article-title: Ren'gequanfa de xin fazhan yu woguo minfadian ren'gequanbian de wanshan [New developments in human dignity law and the completion of the human dignity chapter in our country's Civil Code
  publication-title: Zhejiang Univ Ind Commer J
– year: 2017
  ident: 2022121515104837500_bib64
  article-title: Guanxian xinxi jichu sheshi anquan baohu tiaoli [Critical Information Infrastructure Security Protection Regulations]
– volume: 14
  start-page: 417
  year: 2021
  ident: 2022121515104837500_bib22
  article-title: Securitization of artificial intelligence in China
  publication-title: Chin J Int Polit
  doi: 10.1093/cjip/poab005
– year: 2011
  ident: 2022121515104837500_bib32
  article-title: Guifan hulianwang xinxi fuwu shichang chengxu ruogan guiding [Some Provisions to Standardize Internet Information Service Market Order]
– volume-title: AI Superpowers: China, Silicon Valley, and the New World Order
  year: 2018
  ident: 2022121515104837500_bib40
– volume: 4
  start-page: 535
  year: 2018
  ident: 2022121515104837500_bib5
  article-title: Information security technology - personal information security specification: China's version of the GDPR
  publication-title: Eur Data Prot Law Rev
  doi: 10.21552/edpl/2018/4/19
– volume-title: The Data Protection Regime in China
  year: 2005
  ident: 2022121515104837500_bib2
– volume: 8
  start-page: 950
  year: 2010
  ident: 2022121515104837500_bib18
  article-title: A constitution without constitutionalism? The paths of constitutional development in China
  publication-title: Int J Const Law
– year: 2015
  ident: 2022121515104837500_bib45
  article-title: The legal protection over personal information in China
– year: 2021
  ident: 2022121515104837500_bib88
  article-title: Zhonghua Renmin Gongheguo geren xinxi baohu fa [Personal Information Protection Law of the People's Republic of China]
– year: 2017
  ident: 2022121515104837500_bib75
  article-title: Xinxi anquan jishu geren xinxi Anquan guifan [Information Security Technology—Personal Information Security Specification]
– volume: 8
  start-page: 49
  year: 2020
  ident: 2022121515104837500_bib3
  article-title: China's approach on data privacy flaw: a third way between the US and the EU?
  publication-title: Penn State J Law Int Aff
– volume: 06
  year: 2017
  ident: 2022121515104837500_bib51
  article-title: Shuju chujing anquan pinggu: Baohu jichuxing zhanlüe ziyuan de zhongyao yihuan [Data outbound security assessment: An important part of protecting basic strategic resources]
– volume: 48
  start-page: 231
  year: 2022
  ident: 2022121515104837500_bib21
  article-title: Xi Jinping confronts the network society
  publication-title: Mod Chin
  doi: 10.1177/0097700421993392
– year: 2018
  ident: 2022121515104837500_bib46
  article-title: Data dump: Chinas sees surge in personal information up for sale
– year: 2021
  ident: 2022121515104837500_bib24
  article-title: National Development and Reform Commission Shisiwu tuijin guojia zhengwu xinxihua guihua [14th Five-Year Plan for National Governmental Informatization]
– year: 2009
  ident: 2022121515104837500_bib37
  article-title: Tort Law of the People's Republic of China
– volume-title: China's Proposed Personal Information Protection Act
  year: 2008
  ident: 2022121515104837500_bib1
– year: 1991
  ident: 2022121515104837500_bib34
  article-title: Law of the People's Republic of China on Protection of Minors
– volume-title: Xinxi anquan jishu gonggong ji shangyong fuwu xinxi xitong geren xinxi baohu zhinan [Information security technology - Guideline for personal information protection within information system for public and commercial services]
  year: 2012
  ident: 2022121515104837500_bib33
– volume-title: The Internet, Social Media and a Changing China
  year: 2014
  ident: 2022121515104837500_bib15
  article-title: The privilege of speech and new media: conceptualizing China's communications law in the Internet era
– year: 2022
  ident: 2022121515104837500_bib101
  article-title: Zhongguo hulianwan qiye xu bushang “hegui” qianzhang [Chinese Internet companies need to make up “compliance” debts]
– year: 2019
  ident: 2022121515104837500_bib70
  article-title: Guanyu “geren xinxi chujing anquan pinggu banfa” gongkai zhengqiu yijian de tongzhi [Notice on publicly soliciting opinions on the “Personal Information Outbound Transfer Security Assessment Measures”]
– year: 2020
  ident: 2022121515104837500_bib91
  article-title: Dui “shuju anquan fa” de lijie he renshi [Understanding and recognition of the “Data Security Law”]
– year: 2021
  ident: 2022121515104837500_bib86
  article-title: What's behind China's regulatory storm?
– year: 2015
  ident: 2022121515104837500_bib56
  article-title: Zhonghua renmin gongheguo xingfa (2015 xiuzheng) [Criminal Law of the People's Republic of China (2015 Revision)]
– year: 2020
  ident: 2022121515104837500_bib102
  article-title: Zhonghua Renmin Gongheguo minfadian [Civil Code of the People's Republic of China]
– volume: 19
  start-page: 97
  year: 2018
  ident: 2022121515104837500_bib12
  article-title: Data privacy legislation in the European Union member states - a practical overview
  publication-title: Comput Law Rev Int
  doi: 10.9785/cri-2018-190402
– year: 2004
  ident: 2022121515104837500_bib27
  article-title: Guanyu xinxi anquan dengji baohu gongzuo de shishi yijian [Implementation Opinions concerning the Information Security Multi-Level Protection System]
– volume-title: Geren xinxi baohu fa (zhuanjia jianyi gao) ji lifa yanjiu baogao [Personal Information Protection Law (Experts Suggestion Draft) and Legislative Research Report]
  year: 2006
  ident: 2022121515104837500_bib29
– year: 2021
  ident: 2022121515104837500_bib99
  article-title: Wangluo anquan shencha banfa [Cybersecurity review measures]
– year: 2022
  ident: 2022121515104837500_bib76
  article-title: Xinxi anquan jishu geren xinxi anquan yingxiang pinggu [Principles and criteria from China's Draft Privacy Impact Assessment Guide]
– year: 2013
  ident: 2022121515104837500_bib58
  article-title: Zhonghua renmin gongheguo xiaofeizhe quanyi baohufa [Consumer Rights Protection Law of the People's Republic of China]
– year: 2022
  ident: 2022121515104837500_bib74
  article-title: Ertong geren xinxi wangluo baohu [Regulations on the Protection of Children's Personal Information Online]
– volume: 36
  start-page: 645
  year: 2005
  ident: 2022121515104837500_bib35
  article-title: Protecting the right to privacy in China
  publication-title: Vic Univ Wellingt Law Rev
  doi: 10.26686/vuwlr.v36i3.5610
– year: 2017
  ident: 2022121515104837500_bib42
  article-title: Wangshang “heishi”: nide simi xinxi jishi yuan jiu neng chadao [Online “Black Markets”: your intimate information can be found for some tenners)
– volume: 7
  start-page: 7
  year: 2005
  ident: 2022121515104837500_bib13
  article-title: Privacy and data privacy issues in ccntemporary China
  publication-title: Ethics Inf Technol
  doi: 10.1007/s10676-005-0456-y
– volume: 7
  year: 2015
  ident: 2022121515104837500_bib43
  article-title: Shei maile nide yinsi? Cheqi yonghu mingan xinxi shiluo diaocha [Who sold your privacy? An investigation of sensitive information leaks of vehicle company users]
  publication-title: Xiaofeizhe baodao (Consumer Report)
– volume-title: Understanding China's Legal System
  year: 2003
  ident: 2022121515104837500_bib10
  article-title: Puzzling observations in Chinese law: when is a riddle just a mistake
– year: 1994
  ident: 2022121515104837500_bib25
  article-title: Zhonghua Renmin Gongheguo jisuansji xinxi xitong anquan baohu tiaoli [Computer Information System Security Protection Regulations of the People's Republic of China]
– volume-title: China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain
  year: 2015
  ident: 2022121515104837500_bib6
  article-title: Evolving legal frameworks for protecting the right to Internet privacy in China
– volume: 5
  start-page: 265
  year: 1996
  ident: 2022121515104837500_bib23
  article-title: The “golden projects”: China's national networking initiative
  publication-title: Inf Infrastruct Pol
– year: 2018
  ident: 2022121515104837500_bib8
  article-title: Geren xinxi anquan guifan zhende bi Oumeng yu Meiguo geng yange ma? [Is the national standard “Personal Information Security Standard” really stricter than the EU and the US?
– volume-title: Law and the Party in China: Ideology and organisation
  year: 2020
  ident: 2022121515104837500_bib16
  article-title: Party ideology and Chinese law
  doi: 10.1017/9781108864596.003
– year: 2017
  ident: 2022121515104837500_bib68
  article-title: Kanqing APEC “kuajing yinsi baohu guize” tixi beihou de zhengzhi he jingji [Clearly see the politics and economics behind the APEC “Cross-border Privacy Protection Rules” system]
– year: 2019
  ident: 2022121515104837500_bib82
  article-title: Gong'anbu tongbao “Jingwang 2019” zhuanxiang xingdong dianxing anli [The Ministry of Public Security announces typical cases of the “Net Net 2019” special action]
– year: 2018
  ident: 2022121515104837500_bib53
  article-title: Shuzi jingji shiye zhong de Oumeng “yiban shuju baohu tiaoli” [EU General Data Protection Regulation in the Perspective of Digital Economy]
– year: 2017
  ident: 2022121515104837500_bib66
  article-title: Xinxi anquan jishu shuju chujing anquan pinggu zhinan [Information Security Technology - Guidelines for Data Cross-border Transfer Security Assessment]
– year: 2011
  ident: 2022121515104837500_bib31
  article-title: Zuohao geren jinrong xinxi baohu gonzuo de tongzhi [Notice on Doing Well in the Protection of Personal Financial Information
– year: 2016
  ident: 2022121515104837500_bib60
  article-title: Zhonghua renmin gongheguo wangluo anquan fa [Cybersecurity Law of the People's Republic of China]
– year: 2013
  ident: 2022121515104837500_bib55
  article-title: Zuigao renmin fayuan zuigao renmin jianchayuan gong’anbu guanyu yifa chengchu qinhai gongmin geren xinxi fanzui huodong de tongzhi [Notice concerning Punishing Criminal Activities Infringing Citizens’ Personal Data]
– year: 2022
  ident: 2022121515104837500_bib38
  article-title: China's cyber governance institutions. LeidenAsiaCentre Report
– year: 2018
  ident: 2022121515104837500_bib77
  article-title: Geren xinxi baohu changyi shu [Proposal on Personal Information Protection]
– year: 2022
  ident: 2022121515104837500_bib41
  article-title: Cujin dashuju fazhan xingdong gangyao [Outline of operations to stimulate the development of big data]
– volume: 18
  start-page: 208
  year: 1997
  ident: 2022121515104837500_bib28
  article-title: The right to privacy: an emerging right in Chinese law
  publication-title: Statut Law Rev
  doi: 10.1093/slr/18.3.208
– volume: 6
  start-page: 68
  year: 2012
  ident: 2022121515104837500_bib36
  article-title: Lun geren xinxiquan zai rengequanfa zhong de diwei [On the Status of Personal Information Right in the Law of Personality Rights]
  publication-title: J Soochow Univ Philos Soc Sci
– year: 2017
  ident: 2022121515104837500_bib69
  article-title: Beyond the worst-case assumptions on China's Cybersecurity Law
– year: 2019
  ident: 2022121515104837500_bib71
  article-title: Shuju anquan guanli banfa (zhengqiu yijian gao [Data security management measures (Draft for comment)]
– volume-title: With auto data, China buckles In for security and opens up for future tech
  year: 2021
  ident: 2022121515104837500_bib100
– volume: 45
  start-page: 164
  year: 2020
  ident: 2022121515104837500_bib87
  article-title: China's grand strategy under Xi Jinping: Reassurance, reform, and resistance
  publication-title: Int Secur
  doi: 10.1162/isec_a_00383
– year: 2016
  ident: 2022121515104837500_bib19
  article-title: Shisanwu guojia xinxihua guihua [Thirteenth Five-Year Plan for National Informatization]
– volume: 13
  start-page: 343
  year: 2021
  ident: 2022121515104837500_bib48
  article-title: Online fraud victimization in China: a case study of Baidu Tieba, victims & offenders
  publication-title: Int J Evid Based Res Pol Pract
– year: 2018
  ident: 2022121515104837500_bib79
  article-title: What the Facebook scandal means in a land without Facebook: A look at China's burgeoning data protection regime
– year: 2021
  ident: 2022121515104837500_bib85
  article-title: Yidong hulianwang yingyong chengxu geren xinxi baohu guanli zanxing guiding [Interim Provisions on the Management of Personal Information Protection of Mobile Internet Applications]
– year: 2009
  ident: 2022121515104837500_bib30
  article-title: Zhonghua Renmin Gongheguo xingfa xiuzheng an [Amendments to the Criminal Law of the People's Republic of China
– year: 2021
  ident: 2022121515104837500_bib93
  article-title: Wangluo shuju anquan guanli tiaoli (zhengqiu yijian gao) [Online Data Security Management Regulations (Draft for comment)]
– year: 2017
  ident: 2022121515104837500_bib65
  article-title: Guanyu “geren xinxi he zhongyao shuju chujing anquan pinggu banfa” gongkai zhengqiu yijian de tongzhi [Notice on the Public Consultation on the “Measures for the Security Evaluation of the Exit of Personal Information and Important Data”]
– year: 2019
  ident: 2022121515104837500_bib81
  article-title: App weifa weigui shouji shiyong geren xinxi zi pinggu zhinan [App Self-Assessment Guide for Collecting and Using Personal Information in Violation of Laws and Regulations]
– volume: 1
  start-page: 66
  year: 2017
  ident: 2022121515104837500_bib61
  article-title: Ping “wangluo anquan fa” dui shuju anquan baohu zhi de yu shi [On the Gain and Loss of Cybersecurity Law of China on Data Protection
  publication-title: Zhengce Pinglun (Pol Rev)
– year: 2021
  ident: 2022121515104837500_bib94
  article-title: Qiche shuju Anquan guanli ruogan guiding (zhengqiu yijian gao) [Several Provisions on the Management of Automobile Data Security (Draft for comment)]
– year: 2021
  ident: 2022121515104837500_bib98
  article-title: Guanyu dui “Yunmanman” “Huochebang” “Boss Zhipin” qidong wangluo anquan shencha de gonggao [Announcement on launching a cybersecurity review of “Yunmanman”, “Truck Gang”, and “Boss Direct Appointment”]
– year: 2020
  ident: 2022121515104837500_bib90
  article-title: Shuju anquan guanli shijiao xia de shuju fenlei yanjiu [Research on data classification from the perspective of data security management]
– volume: 66
  start-page: 299
  year: 2018
  ident: 2022121515104837500_bib11
  article-title: Data protection in the United States
  publication-title: Am J Comp Law
  doi: 10.1093/ajcl/avy016
– year: 2003
  ident: 2022121515104837500_bib26
  article-title: Guanyu jiaqiang xinxi anquan baozhang gongzuo de yijian [Opinions concerning Strengthening Information Security Protection]
– year: 2017
  ident: 2022121515104837500_bib44
  article-title: Apple customer data in China was sold illegally, police say
– year: 2018
  ident: 2022121515104837500_bib78
  article-title: Nide geren xinxi anquan ma? [Is your personal information safe?]
– year: 2021
  ident: 2022121515104837500_bib95
  article-title: Dui “Didi Chuxing” qidong wangluo anquan shencha de gonggao [Announcement on launching a cybersecurity review of “Didi Travel”]
– year: 2018
  ident: 2022121515104837500_bib80
  article-title: Zhonghua Renmin Gongheguo dianzi shangwu fa [E-Commerce Law of the People's Republic of China]
– year: 2021
  ident: 2022121515104837500_bib96
  article-title: Guanyu xiajia “DidiChuxing” app de tongbao [Announcement on the removal of “Didi Travel” App]
– year: 2022
  ident: 2022121515104837500_bib20
  article-title: Guojia wangluo kongjian anquan zhanlüe [National Cyberspace Security Strategy]
– volume: 19
  start-page: 582
  year: 2018
  ident: 2022121515104837500_bib49
  article-title: Characteristics of cybercrimes: evidence from Chinese judgment documents
  publication-title: Police Pract Res
  doi: 10.1080/15614263.2018.1507895
– year: 2022
  ident: 2022121515104837500_bib39
  article-title: Di 47 ci Zhongguo hulianwangluo fazhan zhuankuang tongji baogao [47th Statistical report on the development situation of the Internet in China]
– year: 2020
  ident: 2022121515104837500_bib17
  article-title: Order and law in China
– year: 2017
  ident: 2022121515104837500_bib67
  article-title: Communication From the United States - Measures adopted by China relating to its cybersecurity law
– year: 2012
  ident: 2022121515104837500_bib54
  article-title: Quanguo renmin daibiao dahui changwu weiyuanhui guanju jiaqiang wangluo xinxi baohu de jueding [National People's Congress Standing Committee Decision concerning Strengthening Network Information Protection]
– volume: 42
  start-page: 711
  year: 1994
  ident: 2022121515104837500_bib62
  article-title: Sources of order in Chinese law
  publication-title: Am J Compar Law
  doi: 10.2307/840631
– year: 2018
  ident: 2022121515104837500_bib72
  article-title: Public security ministry aligns with Chinese data protection regime in draft rules
– year: 2013
  ident: 2022121515104837500_bib57
  article-title: Dianxin he hulianwang yonghu geren xinxi baohu guiding [Telecommunications and Internet Personal User Data Protection Regulations]
– year: 2018
  ident: 2022121515104837500_bib73
  article-title: Wangluo anquan dengji baohu tiaoli (zhengqiu yijian gao) [Regulations on Graded Cyber Security Protection (Draft for solicitation of comments)]
– year: 2022
  ident: 2022121515104837500_bib52
  article-title: China's cybersecurity regime: Securing the smart state
  doi: 10.2139/ssrn.4070682
– volume: 4
  start-page: 589
  year: 2018
  ident: 2022121515104837500_bib97
  article-title: Foreign capital in Chinese telecommunication companies: from the Variable Interest Entity model to the draft of the new Chinese Foreign Investment Law
  publication-title: Ital Law J
– year: 2022
  ident: 2022121515104837500_bib84
  article-title: Changjian leixing yidong hulianwang yingyong chengxu biyao geren xinxi fanwei guiding [Regulations on the Scope of Necessary Personal Information for Common Types of Mobile Internet Applications]
– year: 2021
  ident: 2022121515104837500_bib89
  article-title: Zhonghua Renmin Gongheguo shuju Anquan fa [Data Security Law of the People's Republic of China]
– year: 2021
  ident: 2022121515104837500_bib92
  article-title: Shuju chujing anquan pinggu banfa (zhengqiu yijian gao) [Outbound Data Transfer Security Assessment Measures (Draft for comment))
– year: 2014
  ident: 2022121515104837500_bib59
  article-title: Fan kongbuzhuyifa cao'an [Anti-Terrorism Law (Draft)]
– year: 2018
  ident: 2022121515104837500_bib7
  article-title: Zhou Hanhua: Geren xinxi baohu guannian yanbian de sige jieduan [Zhou Hanhua: the four stages of the evolution of personal information protection concepts]
– year: 2014
  ident: 2022121515104837500_bib63
  article-title: Zhongguo hulianwang guanli jiang dapo ‘jiulong zhishui’ geju [The situation of “nine dragons governing the water” in China's Internet management will be smashed]
SSID ssj0001922476
Score 2.4011035
Snippet Abstract Over the past 5 years, the People’s Republic of China has accelerated efforts to establish a legal architecture for data protection. With the...
Over the past 5 years, the People’s Republic of China has accelerated efforts to establish a legal architecture for data protection. With the promulgation of...
SourceID proquest
crossref
oup
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
SubjectTerms Cybersecurity
Data collection
Data integrity
Impact analysis
Legislation
Title China’s emerging data protection framework
URI https://www.proquest.com/docview/3168744793
Volume 8
WOSCitedRecordID wos000844271700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2057-2093
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001922476
  issn: 2057-2085
  databaseCode: DOA
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2057-2093
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001922476
  issn: 2057-2085
  databaseCode: M~E
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVASL
  databaseName: Oxford Journals Open Access Collection
  customDbUrl:
  eissn: 2057-2093
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001922476
  issn: 2057-2085
  databaseCode: TOX
  dateStart: 20150901
  isFulltext: true
  titleUrlDefault: https://academic.oup.com/journals/
  providerName: Oxford University Press
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 2057-2093
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001922476
  issn: 2057-2085
  databaseCode: K7-
  dateStart: 20180101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 2057-2093
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001922476
  issn: 2057-2085
  databaseCode: BENPR
  dateStart: 20180101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Publicly Available Content Database
  customDbUrl:
  eissn: 2057-2093
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001922476
  issn: 2057-2085
  databaseCode: PIMPY
  dateStart: 20180101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1PS8MwFA-6efDi_IvTOYoIXgxr2rRNT6KyoaCzyJR5Kk2agCDbXKuwm1_Dr-cn8aVNJzuoB29t-lrKe3l_8pL3fggdgblTLHUpBnkzTIVIMU9SgSFCoiHoE1FFn-2H66DfZ8NhGJmEW2aOVVY2sTDU6VjoHHlHAywFVOeBTicvWKNG6d1VA6GxjOrEASOsN2UD_J1jCcFBlfhyEJZgDUc579vodsSMZ1J08lkibEIW_NJCrVtlnAuP02v891_X0ZqJNa2zcnJsoCU52kSNCsfBMmq9hU4KEO3P94_M0uXCGrbI0idHLdPEAURnqeoQ1za673UHF5fYoChgQW2WY5qQMGGpF8JajqsAjJ_LVeI5gaK-LTyipO_CdcokkwT8lQqEw7kHI6nUAZ27g2qj8UjuIosrB5weTZSt4GX4rAy8kHuh4D5Ric-aCFc8jIVpMa6RLp7jcqvbjUuex4bnTXQ8p5-UzTV-pDwEkfxJ1KrEERtNzOJvWez9_ngfrTq6tKFIr7RQLZ--ygO0It7yp2zaRvXzbj-6axdr9nYxzWAsurqJHuFucDv8Anf13tw
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3NTsJAEJ4gmuhF_I0oamM0XtxA2y3dHowxKoGAxAMabrW73U1MDCBFDTdfw5fwoXwSZ_sD8aCeOHhr2umm6cx-Mzu7Mx_AIcKdYqFNCeqbESpESHgQCoIREvVwPpkq7rN913Lbbdbtejc5-MhqYfSxygwTY6AO-0LnyMuaYMmlOg90NngimjVK765mFBqJWTTl-BWXbNFp4xL1e2RZtavORZ2krAJE0AobERqYXsBCx8O1DVcugoHNVeBYrqLVinBMJas2XodMMmkifitXWJw7eCeUOsCxcdw5mKc2c_W8arpkmtPx0CEmfHYYBhFNfznpE2mXxZhHUpRH40BUTPObH_xWW5c5g9jD1Qr_7d-swHIaSxvnifGvQk721qCQ8VQYKWytw0lMEv759h4Zuhxa0zIZ-mSskTapQNM0VHZIbQNuZ_LNm5Dv9XtyCwyuLHTqNFAVhS_jsNJ1PO54gldNFVRZEUimM1-kLdQ1k8ejn2zl236iYz_VcRGOJ_KDpHnIj5IHaAJ_CpUy9fsp0kT-VPfbvz_eh8V657rltxrt5g4sWbqMI04llSA_Gj7LXVgQL6OHaLgXG7UB97O2lC_7UzZZ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=China%E2%80%99s+emerging+data+protection+framework&rft.jtitle=Journal+of+cybersecurity+%28Oxford%29&rft.au=Creemers%2C+Rogier&rft.date=2022&rft.issn=2057-2085&rft.eissn=2057-2093&rft.volume=8&rft.issue=1&rft_id=info:doi/10.1093%2Fcybsec%2Ftyac011&rft.externalDBID=n%2Fa&rft.externalDocID=10_1093_cybsec_tyac011
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2057-2085&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2057-2085&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2057-2085&client=summon