China’s emerging data protection framework
Abstract Over the past 5 years, the People’s Republic of China has accelerated efforts to establish a legal architecture for data protection. With the promulgation of the Personal Information Protection Law (PIPL) and the Data Security Law (DSL) in the summer of 2021, the first phase of these effort...
Uložené v:
| Vydané v: | Journal of cybersecurity (Oxford) Ročník 8; číslo 1 |
|---|---|
| Hlavný autor: | |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Oxford
Oxford University Press
2022
|
| Predmet: | |
| ISSN: | 2057-2085, 2057-2093 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Abstract
Over the past 5 years, the People’s Republic of China has accelerated efforts to establish a legal architecture for data protection. With the promulgation of the Personal Information Protection Law (PIPL) and the Data Security Law (DSL) in the summer of 2021, the first phase of these efforts have been concluded. These will have a significant impact on data flows within China, but also merit foreign attention. They provide a new approach to data protection to be subjected to comparative analysis, and may influence the development of data protection legislation in other states, particularly those with close digital connections to China. Doing so requires a greater understanding of how this legislation is shaped by the Chinese political and economic context. Drawing on a thorough review of government documents, supplemented by Chinese-language academic sources, this article reviews the evolution of the two pillars of China’s data protection architecture, from the early stage of fragmentation via the promulgation of the Cybersecurity Law in 2016, up to the present day. It finds that the PIPL and its attendant regulations serve to primarily regulate the relationship between large technology companies and consumers, as well as prevent cyber crime. It does not create meaningful constraints on data collection and use by the state. Even so, the PIPL bears a clear family resemblance to personal data protection regimes elsewhere in the world. In contrast, the DSL is a considerable innovation, attempting to prevent harm to national security and the public interest inflicted through data-enabled means. While implementing structures for this Law remain under construction, it will likely herald a thorough reorganization of the way through which data is collected, stored, and managed within all kinds of Chinese actors. |
|---|---|
| AbstractList | Over the past 5 years, the People’s Republic of China has accelerated efforts to establish a legal architecture for data protection. With the promulgation of the Personal Information Protection Law (PIPL) and the Data Security Law (DSL) in the summer of 2021, the first phase of these efforts have been concluded. These will have a significant impact on data flows within China, but also merit foreign attention. They provide a new approach to data protection to be subjected to comparative analysis, and may influence the development of data protection legislation in other states, particularly those with close digital connections to China. Doing so requires a greater understanding of how this legislation is shaped by the Chinese political and economic context. Drawing on a thorough review of government documents, supplemented by Chinese-language academic sources, this article reviews the evolution of the two pillars of China’s data protection architecture, from the early stage of fragmentation via the promulgation of the Cybersecurity Law in 2016, up to the present day. It finds that the PIPL and its attendant regulations serve to primarily regulate the relationship between large technology companies and consumers, as well as prevent cyber crime. It does not create meaningful constraints on data collection and use by the state. Even so, the PIPL bears a clear family resemblance to personal data protection regimes elsewhere in the world. In contrast, the DSL is a considerable innovation, attempting to prevent harm to national security and the public interest inflicted through data-enabled means. While implementing structures for this Law remain under construction, it will likely herald a thorough reorganization of the way through which data is collected, stored, and managed within all kinds of Chinese actors. Abstract Over the past 5 years, the People’s Republic of China has accelerated efforts to establish a legal architecture for data protection. With the promulgation of the Personal Information Protection Law (PIPL) and the Data Security Law (DSL) in the summer of 2021, the first phase of these efforts have been concluded. These will have a significant impact on data flows within China, but also merit foreign attention. They provide a new approach to data protection to be subjected to comparative analysis, and may influence the development of data protection legislation in other states, particularly those with close digital connections to China. Doing so requires a greater understanding of how this legislation is shaped by the Chinese political and economic context. Drawing on a thorough review of government documents, supplemented by Chinese-language academic sources, this article reviews the evolution of the two pillars of China’s data protection architecture, from the early stage of fragmentation via the promulgation of the Cybersecurity Law in 2016, up to the present day. It finds that the PIPL and its attendant regulations serve to primarily regulate the relationship between large technology companies and consumers, as well as prevent cyber crime. It does not create meaningful constraints on data collection and use by the state. Even so, the PIPL bears a clear family resemblance to personal data protection regimes elsewhere in the world. In contrast, the DSL is a considerable innovation, attempting to prevent harm to national security and the public interest inflicted through data-enabled means. While implementing structures for this Law remain under construction, it will likely herald a thorough reorganization of the way through which data is collected, stored, and managed within all kinds of Chinese actors. |
| Author | Creemers, Rogier |
| Author_xml | – sequence: 1 givenname: Rogier orcidid: 0000-0002-8803-4971 surname: Creemers fullname: Creemers, Rogier email: r.j.e.h.creemers@hum.leidenuniv.nl |
| BookMark | eNqFkM9KAzEQxoNUsNZePS94Etw2ySab7FGK_6DgRc8hm53Ure2mJinSm6_h6_kkpmzxIIin-Zj5fjPDd4oGnesAoXOCJwRXxdTs6gBmGnfaYEKO0JBiLnKaRoMfLfkJGoewxBiTilImyiG6mr20nf76-AwZrMEv2m6RNTrqbONdBBNb12XW6zW8O_96ho6tXgUYH-oIPd_ePM3u8_nj3cPsep4bhmXMmSaVlg2viGS1FaKkRW01p8KyEhtOLJRF0o0ECURiYoWhdc1TpwGMOStG6KLfm55420KIaum2vksnVUFKKRgTVZFcrHcZ70LwYJVpo95_HL1uV4pgtY9G9dGoQzQJm_zCNr5da7_7G7jsAbfd_Of9BjHTec0 |
| CitedBy_id | crossref_primary_10_1515_gj_2023_0013 crossref_primary_10_1145_3702249 crossref_primary_10_17645_pag_10413 crossref_primary_10_1002_poi3_424 crossref_primary_10_1016_j_telpol_2024_102836 crossref_primary_10_1057_s41599_024_03952_z crossref_primary_10_3390_bdcc9030062 crossref_primary_10_3389_fgene_2023_1086802 crossref_primary_10_17645_pag_10422 crossref_primary_10_17645_pag_10361 crossref_primary_10_1080_09512748_2023_2294787 crossref_primary_10_1080_21622671_2023_2183894 crossref_primary_10_3390_su17167347 crossref_primary_10_4236_blr_2025_163086 crossref_primary_10_1017_bap_2023_41 crossref_primary_10_1080_13523260_2023_2269809 crossref_primary_10_1016_j_actpsy_2025_105176 crossref_primary_10_1145_3715317 crossref_primary_10_1057_s41599_025_04656_8 crossref_primary_10_1177_20563051241301265 crossref_primary_10_1177_23477970241261432 crossref_primary_10_1080_21622671_2023_2216737 crossref_primary_10_2196_55061 |
| Cites_doi | 10.1007/978-3-642-21750-0 10.1080/17544750.2019.1649289 10.1093/grurint/ikaa136 10.1093/cjip/poab005 10.21552/edpl/2018/4/19 10.1177/0097700421993392 10.9785/cri-2018-190402 10.26686/vuwlr.v36i3.5610 10.1007/s10676-005-0456-y 10.1017/9781108864596.003 10.1093/slr/18.3.208 10.1162/isec_a_00383 10.1093/ajcl/avy016 10.1080/15614263.2018.1507895 10.2307/840631 10.2139/ssrn.4070682 |
| ContentType | Journal Article |
| Copyright | The Author(s) 2022. Published by Oxford University Press. 2022 The Author(s) 2022. Published by Oxford University Press. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: The Author(s) 2022. Published by Oxford University Press. 2022 – notice: The Author(s) 2022. Published by Oxford University Press. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | TOX AAYXX CITATION 8FE 8FG ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI |
| DOI | 10.1093/cybsec/tyac011 |
| DatabaseName | Oxford Journals Open Access Collection CrossRef ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials - QC ProQuest Central ProQuest Technology Collection ProQuest One ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition |
| DatabaseTitle | CrossRef Publicly Available Content Database Advanced Technologies & Aerospace Collection Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | Publicly Available Content Database CrossRef |
| Database_xml | – sequence: 1 dbid: TOX name: Oxford Journals Open Access Collection url: https://academic.oup.com/journals/ sourceTypes: Publisher – sequence: 2 dbid: PIMPY name: ProQuest Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2057-2093 |
| ExternalDocumentID | 10_1093_cybsec_tyac011 10.1093/cybsec/tyac011 |
| GeographicLocations | China |
| GeographicLocations_xml | – name: China |
| GroupedDBID | 0R~ 5VS AAFWJ AAMVS AAOGV AAPXW AAVAP ABEJV ABGNP ABPTD ABQLI ABXVV ACGFS ADBBV ADMLS AENZO AFKRA AFPKN ALMA_UNASSIGNED_HOLDINGS ALUQC AMNDL ARAPS ARCSS AVWKF BAYMD BCNDV BENPR BGLVJ CCPQU CIDKT EBS EJD GROUPED_DOAJ H13 HCIFZ IAO ICD IEA IMI ITC K7- KQ8 KSI ML0 M~E O9- OAWHX OJQWA OK1 PEELM PIMPY RXO TOX AAYXX AFFHD CITATION PHGZM PHGZT PQGLB 8FE 8FG ABUWG AZQEC DWQXO GNUQQ JQ2 P62 PKEHL PQEST PQQKQ PQUKI PUEGO |
| ID | FETCH-LOGICAL-c408t-4a19a8d59184bf77623bfa527f460c51fe637f4d8e8e1801f7c2bb5f4dde00543 |
| IEDL.DBID | K7- |
| ISICitedReferencesCount | 40 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000844271700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2057-2085 |
| IngestDate | Fri Sep 19 20:53:53 EDT 2025 Sat Nov 29 02:49:03 EST 2025 Tue Nov 18 20:00:29 EST 2025 Wed Apr 02 07:05:30 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| License | This is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited. https://creativecommons.org/licenses/by/4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c408t-4a19a8d59184bf77623bfa527f460c51fe637f4d8e8e1801f7c2bb5f4dde00543 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-8803-4971 |
| OpenAccessLink | https://www.proquest.com/docview/3168744793?pq-origsite=%requestingapplication% |
| PQID | 3168744793 |
| PQPubID | 7121347 |
| ParticipantIDs | proquest_journals_3168744793 crossref_citationtrail_10_1093_cybsec_tyac011 crossref_primary_10_1093_cybsec_tyac011 oup_primary_10_1093_cybsec_tyac011 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-00-00 |
| PublicationDateYYYYMMDD | 2022-01-01 |
| PublicationDate_xml | – year: 2022 text: 2022-00-00 |
| PublicationDecade | 2020 |
| PublicationPlace | Oxford |
| PublicationPlace_xml | – name: Oxford |
| PublicationTitle | Journal of cybersecurity (Oxford) |
| PublicationYear | 2022 |
| Publisher | Oxford University Press |
| Publisher_xml | – name: Oxford University Press |
| References | Ministry of Industry and Information Technology (2022121515104837500_bib85) 2021 Zhou (2022121515104837500_bib29) 2006 National Information Security Standardization Technical Committee (2022121515104837500_bib26) 2003 Zhou (2022121515104837500_bib7) 2018 Hong (2022121515104837500_bib61) 2017; 1 Creemers (2022121515104837500_bib38) 2022 Xinhuanet (2022121515104837500_bib63) 2014 Lu (2022121515104837500_bib79) 2018 Wang (2022121515104837500_bib14) 2011 Sacks (2022121515104837500_bib72) 2018 Cybersecurity Review Office (2022121515104837500_bib98) 2021 Cyberspace Administration of China (2022121515104837500_bib92) 2021 Creemers (2022121515104837500_bib52) 2022 Geller (2022121515104837500_bib4) 2020; 69 Cybersecurity Review Office (2022121515104837500_bib95) 2021 Ding (2022121515104837500_bib47) 2018; 13 Creemers (2022121515104837500_bib15) 2014 National People's Congress (2022121515104837500_bib89) 2021 Naughton (2022121515104837500_bib86) 2021 Clarke (2022121515104837500_bib17) 2020 Schaefer (2022121515104837500_bib100) 2021 United States Trade Representative (2022121515104837500_bib67) 2017 Pohle (2022121515104837500_bib12) 2018; 19 Mozur (2022121515104837500_bib44) 2017 National People's Congress (2022121515104837500_bib59) 2014 Ministry of Public Security (2022121515104837500_bib27) 2004 Ministry of Industry and Information Technology (2022121515104837500_bib32) 2011 Boyne (2022121515104837500_bib11) 2018; 66 Goldstein (2022121515104837500_bib87) 2020; 45 Cao (2022121515104837500_bib35) 2005; 36 National Information Security Standardization Technical Committee (2022121515104837500_bib75) 2017 Santoni (2022121515104837500_bib97) 2018; 4 State Council (2022121515104837500_bib19) 2016 Fang (2022121515104837500_bib101) 2022 Standing Committee of the National People's Congress (2022121515104837500_bib37) 2009 Tham (2022121515104837500_bib46) 2018 Cyberspace Administration of China (2022121515104837500_bib83) 2022 Hong (2022121515104837500_bib90) 2020 Xinhuanet (2022121515104837500_bib42) 2017 Zeng (2022121515104837500_bib22) 2021; 14 Zhang (2022121515104837500_bib18) 2010; 8 Standing Committee of the National People's Congress (2022121515104837500_bib34) 1991 Ministry of Public Security (2022121515104837500_bib82) 2019 Cyberspace Administration of China (2022121515104837500_bib20) 2022 National Information Security Standardization Technical Committee (2022121515104837500_bib76) 2022 Lovelock (2022121515104837500_bib23) 1996; 5 De Hert (2022121515104837500_bib2) 2005 Ministry of Industry and Information Technology (2022121515104837500_bib57) 2013 Hong (2022121515104837500_bib51) 2017; 06 Cyberspace Administration of China (2022121515104837500_bib84) 2022 People's Bank of China (2022121515104837500_bib31) 2011 Lee (2022121515104837500_bib40) 2018 Internet Society of China (2022121515104837500_bib77) 2018 Standing Committee of the National People's Congress (2022121515104837500_bib54) 2012 Creemers (2022121515104837500_bib16) 2020 Liu (2022121515104837500_bib50) 2020; 13 Cyberspace Administration of China (2022121515104837500_bib96) 2021 National People's Congress (2022121515104837500_bib88) 2021 Hong (2022121515104837500_bib91) 2020 Cyberspace Administration of China (2022121515104837500_bib71) 2019 Lynch (2022121515104837500_bib21) 2022; 48 Ministry of Public Security (2022121515104837500_bib73) 2018 Greenleaf (2022121515104837500_bib1) 2008 Sacks (2022121515104837500_bib69) 2017 State Council (2022121515104837500_bib41) 2022 Han (2022121515104837500_bib5) 2018; 4 Cyberspace Administration of China (2022121515104837500_bib64) 2017 Cai (2022121515104837500_bib49) 2018; 19 App Working Group (2022121515104837500_bib81) 2019 Wang (2022121515104837500_bib9) 2019; 6 Shu (2022121515104837500_bib45) 2015 Clarke (2022121515104837500_bib10) 2003 Cyberspace Administration of China (2022121515104837500_bib94) 2021 National People's Congress (2022121515104837500_bib60) 2016 Wang (2022121515104837500_bib36) 2012; 6 National People's Congress (2022121515104837500_bib80) 2018 Standardization Administration of China (2022121515104837500_bib66) 2017 Wang (2022121515104837500_bib78) 2018 Cyberspace Administration of China (2022121515104837500_bib74) 2022 Standing Committee of the National People's Congress (2022121515104837500_bib30) 2009 Hong (2022121515104837500_bib68) 2017 Hong (2022121515104837500_bib8) 2018 Li (2022121515104837500_bib43) 2015; 7 National People's Congress (2022121515104837500_bib102) 2020 Ministry of Public Security (2022121515104837500_bib55) 2013 National People's Congress (2022121515104837500_bib56) 2015 Xu (2022121515104837500_bib6) 2015 State Council (2022121515104837500_bib25) 1994 Cyberspace Administration of China (2022121515104837500_bib93) 2021 Tencent Research Institute (2022121515104837500_bib53) 2018 Pernot-Leplay (2022121515104837500_bib3) 2020; 8 Standing Committee of the National People's Congress (2022121515104837500_bib58) 2013 Keller (2022121515104837500_bib62) 1994; 42 Zhu (2022121515104837500_bib28) 1997; 18 DigiChina (2022121515104837500_bib24) 2021 Lü (2022121515104837500_bib13) 2005; 7 National Information Security Standardization Technical Committee (2022121515104837500_bib33) 2012 Cyberspace Administration of China (2022121515104837500_bib65) 2017 CNNIC (2022121515104837500_bib39) 2022 Lee (2022121515104837500_bib48) 2021; 13 Cyberspace Administration of China (2022121515104837500_bib70) 2019 Cyberspace Administration of China (2022121515104837500_bib99) 2021 |
| References_xml | – volume: 13 start-page: 380 year: 2018 ident: 2022121515104837500_bib47 article-title: Personal data protection: rethinking the reasons, nature, and legal framework publication-title: Front Law Chin – year: 2022 ident: 2022121515104837500_bib83 article-title: Guanyu shuru fa deng 33 kuan app weifa weiguid shouji shiyong geren xinxi qingkuang de tongbao [Notification on the illegal collection and use of personal information in 33 apps including input methods] – volume-title: Protecting Privacy in China: A Research on China's Privacy Standards and the Possibility of Establishing the Right to Privacy and the Information Privacy Protection legislation in Modern China year: 2011 ident: 2022121515104837500_bib14 doi: 10.1007/978-3-642-21750-0 – volume: 13 start-page: 84 year: 2020 ident: 2022121515104837500_bib50 article-title: China's data localization publication-title: Chin J Commun doi: 10.1080/17544750.2019.1649289 – volume: 69 start-page: 1191 year: 2020 ident: 2022121515104837500_bib4 article-title: How comprehensive is Chinese data protection law? A systematisation of Chinese data protection law from a European perpective publication-title: GRUR Int doi: 10.1093/grurint/ikaa136 – volume: 6 start-page: 5 year: 2019 ident: 2022121515104837500_bib9 article-title: Ren'gequanfa de xin fazhan yu woguo minfadian ren'gequanbian de wanshan [New developments in human dignity law and the completion of the human dignity chapter in our country's Civil Code publication-title: Zhejiang Univ Ind Commer J – year: 2017 ident: 2022121515104837500_bib64 article-title: Guanxian xinxi jichu sheshi anquan baohu tiaoli [Critical Information Infrastructure Security Protection Regulations] – volume: 14 start-page: 417 year: 2021 ident: 2022121515104837500_bib22 article-title: Securitization of artificial intelligence in China publication-title: Chin J Int Polit doi: 10.1093/cjip/poab005 – year: 2011 ident: 2022121515104837500_bib32 article-title: Guifan hulianwang xinxi fuwu shichang chengxu ruogan guiding [Some Provisions to Standardize Internet Information Service Market Order] – volume-title: AI Superpowers: China, Silicon Valley, and the New World Order year: 2018 ident: 2022121515104837500_bib40 – volume: 4 start-page: 535 year: 2018 ident: 2022121515104837500_bib5 article-title: Information security technology - personal information security specification: China's version of the GDPR publication-title: Eur Data Prot Law Rev doi: 10.21552/edpl/2018/4/19 – volume-title: The Data Protection Regime in China year: 2005 ident: 2022121515104837500_bib2 – volume: 8 start-page: 950 year: 2010 ident: 2022121515104837500_bib18 article-title: A constitution without constitutionalism? The paths of constitutional development in China publication-title: Int J Const Law – year: 2015 ident: 2022121515104837500_bib45 article-title: The legal protection over personal information in China – year: 2021 ident: 2022121515104837500_bib88 article-title: Zhonghua Renmin Gongheguo geren xinxi baohu fa [Personal Information Protection Law of the People's Republic of China] – year: 2017 ident: 2022121515104837500_bib75 article-title: Xinxi anquan jishu geren xinxi Anquan guifan [Information Security Technology—Personal Information Security Specification] – volume: 8 start-page: 49 year: 2020 ident: 2022121515104837500_bib3 article-title: China's approach on data privacy flaw: a third way between the US and the EU? publication-title: Penn State J Law Int Aff – volume: 06 year: 2017 ident: 2022121515104837500_bib51 article-title: Shuju chujing anquan pinggu: Baohu jichuxing zhanlüe ziyuan de zhongyao yihuan [Data outbound security assessment: An important part of protecting basic strategic resources] – volume: 48 start-page: 231 year: 2022 ident: 2022121515104837500_bib21 article-title: Xi Jinping confronts the network society publication-title: Mod Chin doi: 10.1177/0097700421993392 – year: 2018 ident: 2022121515104837500_bib46 article-title: Data dump: Chinas sees surge in personal information up for sale – year: 2021 ident: 2022121515104837500_bib24 article-title: National Development and Reform Commission Shisiwu tuijin guojia zhengwu xinxihua guihua [14th Five-Year Plan for National Governmental Informatization] – year: 2009 ident: 2022121515104837500_bib37 article-title: Tort Law of the People's Republic of China – volume-title: China's Proposed Personal Information Protection Act year: 2008 ident: 2022121515104837500_bib1 – year: 1991 ident: 2022121515104837500_bib34 article-title: Law of the People's Republic of China on Protection of Minors – volume-title: Xinxi anquan jishu gonggong ji shangyong fuwu xinxi xitong geren xinxi baohu zhinan [Information security technology - Guideline for personal information protection within information system for public and commercial services] year: 2012 ident: 2022121515104837500_bib33 – volume-title: The Internet, Social Media and a Changing China year: 2014 ident: 2022121515104837500_bib15 article-title: The privilege of speech and new media: conceptualizing China's communications law in the Internet era – year: 2022 ident: 2022121515104837500_bib101 article-title: Zhongguo hulianwan qiye xu bushang “hegui” qianzhang [Chinese Internet companies need to make up “compliance” debts] – year: 2019 ident: 2022121515104837500_bib70 article-title: Guanyu “geren xinxi chujing anquan pinggu banfa” gongkai zhengqiu yijian de tongzhi [Notice on publicly soliciting opinions on the “Personal Information Outbound Transfer Security Assessment Measures”] – year: 2020 ident: 2022121515104837500_bib91 article-title: Dui “shuju anquan fa” de lijie he renshi [Understanding and recognition of the “Data Security Law”] – year: 2021 ident: 2022121515104837500_bib86 article-title: What's behind China's regulatory storm? – year: 2015 ident: 2022121515104837500_bib56 article-title: Zhonghua renmin gongheguo xingfa (2015 xiuzheng) [Criminal Law of the People's Republic of China (2015 Revision)] – year: 2020 ident: 2022121515104837500_bib102 article-title: Zhonghua Renmin Gongheguo minfadian [Civil Code of the People's Republic of China] – volume: 19 start-page: 97 year: 2018 ident: 2022121515104837500_bib12 article-title: Data privacy legislation in the European Union member states - a practical overview publication-title: Comput Law Rev Int doi: 10.9785/cri-2018-190402 – year: 2004 ident: 2022121515104837500_bib27 article-title: Guanyu xinxi anquan dengji baohu gongzuo de shishi yijian [Implementation Opinions concerning the Information Security Multi-Level Protection System] – volume-title: Geren xinxi baohu fa (zhuanjia jianyi gao) ji lifa yanjiu baogao [Personal Information Protection Law (Experts Suggestion Draft) and Legislative Research Report] year: 2006 ident: 2022121515104837500_bib29 – year: 2021 ident: 2022121515104837500_bib99 article-title: Wangluo anquan shencha banfa [Cybersecurity review measures] – year: 2022 ident: 2022121515104837500_bib76 article-title: Xinxi anquan jishu geren xinxi anquan yingxiang pinggu [Principles and criteria from China's Draft Privacy Impact Assessment Guide] – year: 2013 ident: 2022121515104837500_bib58 article-title: Zhonghua renmin gongheguo xiaofeizhe quanyi baohufa [Consumer Rights Protection Law of the People's Republic of China] – year: 2022 ident: 2022121515104837500_bib74 article-title: Ertong geren xinxi wangluo baohu [Regulations on the Protection of Children's Personal Information Online] – volume: 36 start-page: 645 year: 2005 ident: 2022121515104837500_bib35 article-title: Protecting the right to privacy in China publication-title: Vic Univ Wellingt Law Rev doi: 10.26686/vuwlr.v36i3.5610 – year: 2017 ident: 2022121515104837500_bib42 article-title: Wangshang “heishi”: nide simi xinxi jishi yuan jiu neng chadao [Online “Black Markets”: your intimate information can be found for some tenners) – volume: 7 start-page: 7 year: 2005 ident: 2022121515104837500_bib13 article-title: Privacy and data privacy issues in ccntemporary China publication-title: Ethics Inf Technol doi: 10.1007/s10676-005-0456-y – volume: 7 year: 2015 ident: 2022121515104837500_bib43 article-title: Shei maile nide yinsi? Cheqi yonghu mingan xinxi shiluo diaocha [Who sold your privacy? An investigation of sensitive information leaks of vehicle company users] publication-title: Xiaofeizhe baodao (Consumer Report) – volume-title: Understanding China's Legal System year: 2003 ident: 2022121515104837500_bib10 article-title: Puzzling observations in Chinese law: when is a riddle just a mistake – year: 1994 ident: 2022121515104837500_bib25 article-title: Zhonghua Renmin Gongheguo jisuansji xinxi xitong anquan baohu tiaoli [Computer Information System Security Protection Regulations of the People's Republic of China] – volume-title: China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain year: 2015 ident: 2022121515104837500_bib6 article-title: Evolving legal frameworks for protecting the right to Internet privacy in China – volume: 5 start-page: 265 year: 1996 ident: 2022121515104837500_bib23 article-title: The “golden projects”: China's national networking initiative publication-title: Inf Infrastruct Pol – year: 2018 ident: 2022121515104837500_bib8 article-title: Geren xinxi anquan guifan zhende bi Oumeng yu Meiguo geng yange ma? [Is the national standard “Personal Information Security Standard” really stricter than the EU and the US? – volume-title: Law and the Party in China: Ideology and organisation year: 2020 ident: 2022121515104837500_bib16 article-title: Party ideology and Chinese law doi: 10.1017/9781108864596.003 – year: 2017 ident: 2022121515104837500_bib68 article-title: Kanqing APEC “kuajing yinsi baohu guize” tixi beihou de zhengzhi he jingji [Clearly see the politics and economics behind the APEC “Cross-border Privacy Protection Rules” system] – year: 2019 ident: 2022121515104837500_bib82 article-title: Gong'anbu tongbao “Jingwang 2019” zhuanxiang xingdong dianxing anli [The Ministry of Public Security announces typical cases of the “Net Net 2019” special action] – year: 2018 ident: 2022121515104837500_bib53 article-title: Shuzi jingji shiye zhong de Oumeng “yiban shuju baohu tiaoli” [EU General Data Protection Regulation in the Perspective of Digital Economy] – year: 2017 ident: 2022121515104837500_bib66 article-title: Xinxi anquan jishu shuju chujing anquan pinggu zhinan [Information Security Technology - Guidelines for Data Cross-border Transfer Security Assessment] – year: 2011 ident: 2022121515104837500_bib31 article-title: Zuohao geren jinrong xinxi baohu gonzuo de tongzhi [Notice on Doing Well in the Protection of Personal Financial Information – year: 2016 ident: 2022121515104837500_bib60 article-title: Zhonghua renmin gongheguo wangluo anquan fa [Cybersecurity Law of the People's Republic of China] – year: 2013 ident: 2022121515104837500_bib55 article-title: Zuigao renmin fayuan zuigao renmin jianchayuan gong’anbu guanyu yifa chengchu qinhai gongmin geren xinxi fanzui huodong de tongzhi [Notice concerning Punishing Criminal Activities Infringing Citizens’ Personal Data] – year: 2022 ident: 2022121515104837500_bib38 article-title: China's cyber governance institutions. LeidenAsiaCentre Report – year: 2018 ident: 2022121515104837500_bib77 article-title: Geren xinxi baohu changyi shu [Proposal on Personal Information Protection] – year: 2022 ident: 2022121515104837500_bib41 article-title: Cujin dashuju fazhan xingdong gangyao [Outline of operations to stimulate the development of big data] – volume: 18 start-page: 208 year: 1997 ident: 2022121515104837500_bib28 article-title: The right to privacy: an emerging right in Chinese law publication-title: Statut Law Rev doi: 10.1093/slr/18.3.208 – volume: 6 start-page: 68 year: 2012 ident: 2022121515104837500_bib36 article-title: Lun geren xinxiquan zai rengequanfa zhong de diwei [On the Status of Personal Information Right in the Law of Personality Rights] publication-title: J Soochow Univ Philos Soc Sci – year: 2017 ident: 2022121515104837500_bib69 article-title: Beyond the worst-case assumptions on China's Cybersecurity Law – year: 2019 ident: 2022121515104837500_bib71 article-title: Shuju anquan guanli banfa (zhengqiu yijian gao [Data security management measures (Draft for comment)] – volume-title: With auto data, China buckles In for security and opens up for future tech year: 2021 ident: 2022121515104837500_bib100 – volume: 45 start-page: 164 year: 2020 ident: 2022121515104837500_bib87 article-title: China's grand strategy under Xi Jinping: Reassurance, reform, and resistance publication-title: Int Secur doi: 10.1162/isec_a_00383 – year: 2016 ident: 2022121515104837500_bib19 article-title: Shisanwu guojia xinxihua guihua [Thirteenth Five-Year Plan for National Informatization] – volume: 13 start-page: 343 year: 2021 ident: 2022121515104837500_bib48 article-title: Online fraud victimization in China: a case study of Baidu Tieba, victims & offenders publication-title: Int J Evid Based Res Pol Pract – year: 2018 ident: 2022121515104837500_bib79 article-title: What the Facebook scandal means in a land without Facebook: A look at China's burgeoning data protection regime – year: 2021 ident: 2022121515104837500_bib85 article-title: Yidong hulianwang yingyong chengxu geren xinxi baohu guanli zanxing guiding [Interim Provisions on the Management of Personal Information Protection of Mobile Internet Applications] – year: 2009 ident: 2022121515104837500_bib30 article-title: Zhonghua Renmin Gongheguo xingfa xiuzheng an [Amendments to the Criminal Law of the People's Republic of China – year: 2021 ident: 2022121515104837500_bib93 article-title: Wangluo shuju anquan guanli tiaoli (zhengqiu yijian gao) [Online Data Security Management Regulations (Draft for comment)] – year: 2017 ident: 2022121515104837500_bib65 article-title: Guanyu “geren xinxi he zhongyao shuju chujing anquan pinggu banfa” gongkai zhengqiu yijian de tongzhi [Notice on the Public Consultation on the “Measures for the Security Evaluation of the Exit of Personal Information and Important Data”] – year: 2019 ident: 2022121515104837500_bib81 article-title: App weifa weigui shouji shiyong geren xinxi zi pinggu zhinan [App Self-Assessment Guide for Collecting and Using Personal Information in Violation of Laws and Regulations] – volume: 1 start-page: 66 year: 2017 ident: 2022121515104837500_bib61 article-title: Ping “wangluo anquan fa” dui shuju anquan baohu zhi de yu shi [On the Gain and Loss of Cybersecurity Law of China on Data Protection publication-title: Zhengce Pinglun (Pol Rev) – year: 2021 ident: 2022121515104837500_bib94 article-title: Qiche shuju Anquan guanli ruogan guiding (zhengqiu yijian gao) [Several Provisions on the Management of Automobile Data Security (Draft for comment)] – year: 2021 ident: 2022121515104837500_bib98 article-title: Guanyu dui “Yunmanman” “Huochebang” “Boss Zhipin” qidong wangluo anquan shencha de gonggao [Announcement on launching a cybersecurity review of “Yunmanman”, “Truck Gang”, and “Boss Direct Appointment”] – year: 2020 ident: 2022121515104837500_bib90 article-title: Shuju anquan guanli shijiao xia de shuju fenlei yanjiu [Research on data classification from the perspective of data security management] – volume: 66 start-page: 299 year: 2018 ident: 2022121515104837500_bib11 article-title: Data protection in the United States publication-title: Am J Comp Law doi: 10.1093/ajcl/avy016 – year: 2003 ident: 2022121515104837500_bib26 article-title: Guanyu jiaqiang xinxi anquan baozhang gongzuo de yijian [Opinions concerning Strengthening Information Security Protection] – year: 2017 ident: 2022121515104837500_bib44 article-title: Apple customer data in China was sold illegally, police say – year: 2018 ident: 2022121515104837500_bib78 article-title: Nide geren xinxi anquan ma? [Is your personal information safe?] – year: 2021 ident: 2022121515104837500_bib95 article-title: Dui “Didi Chuxing” qidong wangluo anquan shencha de gonggao [Announcement on launching a cybersecurity review of “Didi Travel”] – year: 2018 ident: 2022121515104837500_bib80 article-title: Zhonghua Renmin Gongheguo dianzi shangwu fa [E-Commerce Law of the People's Republic of China] – year: 2021 ident: 2022121515104837500_bib96 article-title: Guanyu xiajia “DidiChuxing” app de tongbao [Announcement on the removal of “Didi Travel” App] – year: 2022 ident: 2022121515104837500_bib20 article-title: Guojia wangluo kongjian anquan zhanlüe [National Cyberspace Security Strategy] – volume: 19 start-page: 582 year: 2018 ident: 2022121515104837500_bib49 article-title: Characteristics of cybercrimes: evidence from Chinese judgment documents publication-title: Police Pract Res doi: 10.1080/15614263.2018.1507895 – year: 2022 ident: 2022121515104837500_bib39 article-title: Di 47 ci Zhongguo hulianwangluo fazhan zhuankuang tongji baogao [47th Statistical report on the development situation of the Internet in China] – year: 2020 ident: 2022121515104837500_bib17 article-title: Order and law in China – year: 2017 ident: 2022121515104837500_bib67 article-title: Communication From the United States - Measures adopted by China relating to its cybersecurity law – year: 2012 ident: 2022121515104837500_bib54 article-title: Quanguo renmin daibiao dahui changwu weiyuanhui guanju jiaqiang wangluo xinxi baohu de jueding [National People's Congress Standing Committee Decision concerning Strengthening Network Information Protection] – volume: 42 start-page: 711 year: 1994 ident: 2022121515104837500_bib62 article-title: Sources of order in Chinese law publication-title: Am J Compar Law doi: 10.2307/840631 – year: 2018 ident: 2022121515104837500_bib72 article-title: Public security ministry aligns with Chinese data protection regime in draft rules – year: 2013 ident: 2022121515104837500_bib57 article-title: Dianxin he hulianwang yonghu geren xinxi baohu guiding [Telecommunications and Internet Personal User Data Protection Regulations] – year: 2018 ident: 2022121515104837500_bib73 article-title: Wangluo anquan dengji baohu tiaoli (zhengqiu yijian gao) [Regulations on Graded Cyber Security Protection (Draft for solicitation of comments)] – year: 2022 ident: 2022121515104837500_bib52 article-title: China's cybersecurity regime: Securing the smart state doi: 10.2139/ssrn.4070682 – volume: 4 start-page: 589 year: 2018 ident: 2022121515104837500_bib97 article-title: Foreign capital in Chinese telecommunication companies: from the Variable Interest Entity model to the draft of the new Chinese Foreign Investment Law publication-title: Ital Law J – year: 2022 ident: 2022121515104837500_bib84 article-title: Changjian leixing yidong hulianwang yingyong chengxu biyao geren xinxi fanwei guiding [Regulations on the Scope of Necessary Personal Information for Common Types of Mobile Internet Applications] – year: 2021 ident: 2022121515104837500_bib89 article-title: Zhonghua Renmin Gongheguo shuju Anquan fa [Data Security Law of the People's Republic of China] – year: 2021 ident: 2022121515104837500_bib92 article-title: Shuju chujing anquan pinggu banfa (zhengqiu yijian gao) [Outbound Data Transfer Security Assessment Measures (Draft for comment)) – year: 2014 ident: 2022121515104837500_bib59 article-title: Fan kongbuzhuyifa cao'an [Anti-Terrorism Law (Draft)] – year: 2018 ident: 2022121515104837500_bib7 article-title: Zhou Hanhua: Geren xinxi baohu guannian yanbian de sige jieduan [Zhou Hanhua: the four stages of the evolution of personal information protection concepts] – year: 2014 ident: 2022121515104837500_bib63 article-title: Zhongguo hulianwang guanli jiang dapo ‘jiulong zhishui’ geju [The situation of “nine dragons governing the water” in China's Internet management will be smashed] |
| SSID | ssj0001922476 |
| Score | 2.4011035 |
| Snippet | Abstract
Over the past 5 years, the People’s Republic of China has accelerated efforts to establish a legal architecture for data protection. With the... Over the past 5 years, the People’s Republic of China has accelerated efforts to establish a legal architecture for data protection. With the promulgation of... |
| SourceID | proquest crossref oup |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| SubjectTerms | Cybersecurity Data collection Data integrity Impact analysis Legislation |
| Title | China’s emerging data protection framework |
| URI | https://www.proquest.com/docview/3168744793 |
| Volume | 8 |
| WOSCitedRecordID | wos000844271700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2057-2093 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001922476 issn: 2057-2085 databaseCode: DOA dateStart: 20150101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2057-2093 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001922476 issn: 2057-2085 databaseCode: M~E dateStart: 20150101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVASL databaseName: Oxford Journals Open Access Collection customDbUrl: eissn: 2057-2093 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001922476 issn: 2057-2085 databaseCode: TOX dateStart: 20150901 isFulltext: true titleUrlDefault: https://academic.oup.com/journals/ providerName: Oxford University Press – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 2057-2093 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001922476 issn: 2057-2085 databaseCode: K7- dateStart: 20180101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 2057-2093 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001922476 issn: 2057-2085 databaseCode: BENPR dateStart: 20180101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Publicly Available Content Database customDbUrl: eissn: 2057-2093 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001922476 issn: 2057-2085 databaseCode: PIMPY dateStart: 20180101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1PS8MwFA-6efDi_IvTOYoIXgxr2rRNT6KyoaCzyJR5Kk2agCDbXKuwm1_Dr-cn8aVNJzuoB29t-lrKe3l_8pL3fggdgblTLHUpBnkzTIVIMU9SgSFCoiHoE1FFn-2H66DfZ8NhGJmEW2aOVVY2sTDU6VjoHHlHAywFVOeBTicvWKNG6d1VA6GxjOrEASOsN2UD_J1jCcFBlfhyEJZgDUc579vodsSMZ1J08lkibEIW_NJCrVtlnAuP02v891_X0ZqJNa2zcnJsoCU52kSNCsfBMmq9hU4KEO3P94_M0uXCGrbI0idHLdPEAURnqeoQ1za673UHF5fYoChgQW2WY5qQMGGpF8JajqsAjJ_LVeI5gaK-LTyipO_CdcokkwT8lQqEw7kHI6nUAZ27g2qj8UjuIosrB5weTZSt4GX4rAy8kHuh4D5Ric-aCFc8jIVpMa6RLp7jcqvbjUuex4bnTXQ8p5-UzTV-pDwEkfxJ1KrEERtNzOJvWez9_ngfrTq6tKFIr7RQLZ--ygO0It7yp2zaRvXzbj-6axdr9nYxzWAsurqJHuFucDv8Anf13tw |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3NTsJAEJ4gmuhF_I0oamM0XtxA2y3dHowxKoGAxAMabrW73U1MDCBFDTdfw5fwoXwSZ_sD8aCeOHhr2umm6cx-Mzu7Mx_AIcKdYqFNCeqbESpESHgQCoIREvVwPpkq7rN913Lbbdbtejc5-MhqYfSxygwTY6AO-0LnyMuaYMmlOg90NngimjVK765mFBqJWTTl-BWXbNFp4xL1e2RZtavORZ2krAJE0AobERqYXsBCx8O1DVcugoHNVeBYrqLVinBMJas2XodMMmkifitXWJw7eCeUOsCxcdw5mKc2c_W8arpkmtPx0CEmfHYYBhFNfznpE2mXxZhHUpRH40BUTPObH_xWW5c5g9jD1Qr_7d-swHIaSxvnifGvQk721qCQ8VQYKWytw0lMEv759h4Zuhxa0zIZ-mSskTapQNM0VHZIbQNuZ_LNm5Dv9XtyCwyuLHTqNFAVhS_jsNJ1PO54gldNFVRZEUimM1-kLdQ1k8ejn2zl236iYz_VcRGOJ_KDpHnIj5IHaAJ_CpUy9fsp0kT-VPfbvz_eh8V657rltxrt5g4sWbqMI04llSA_Gj7LXVgQL6OHaLgXG7UB97O2lC_7UzZZ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=China%E2%80%99s+emerging+data+protection+framework&rft.jtitle=Journal+of+cybersecurity+%28Oxford%29&rft.au=Creemers%2C+Rogier&rft.date=2022&rft.issn=2057-2085&rft.eissn=2057-2093&rft.volume=8&rft.issue=1&rft_id=info:doi/10.1093%2Fcybsec%2Ftyac011&rft.externalDBID=n%2Fa&rft.externalDocID=10_1093_cybsec_tyac011 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2057-2085&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2057-2085&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2057-2085&client=summon |