China’s much-anticipated Cyber Security Law (CSL) came into effect on 1 June 2017. Control Risks looks at how it will impact multinationals

China espionage spy cyber

The new CSL is the first comprehensive law to address cyber security concerns at the national level and, to some extent, consolidates cyber activities captured in other laws and regulations. The move by China to strengthen its laws and regulations governing cyber activity is not dissimilar to what is happening around the globe.

“The biggest challenge with the new law for companies is the ability to understand exactly who is captured and what is covered, and this is leaving companies unsure as to how they will comply with this vague and potentially onerous law,” says Carla Liedtke, director, Control Risks.

Who will be captured by the law?

It is very likely that many multinational companies (MNCs) will feel the heat. The brunt of the CSL currently falls on “critical information infrastructure” (CII) operators. The broad definition of CII encompasses not only traditional critical industries, such as power, transport and finance, but also other infrastructure that could, as outlined in the law, harm “people’s livelihoods”. This means any foreign company that is a key supplier to a ‘critical’ sector, as well as any company that holds significant amounts of information on Chinese citizens, could become a prime target for regulators seeking to enforce the CSL.

The lack of clarity in the definition of CII is significant because of the potential obligations for these companies, for example, localising data to China and undergoing intrusive onsite inspections of cyber security systems and procedures. Certain technologies must pass a “national security review” to ensure they cannot be illegally controlled or interfered with before CII operators are able to use them. The CSL gives broad authority to the Cyberspace Administration of China, China’s powerful cyberspace watchdog, and other industry regulators to conduct these reviews.

What is covered by the law?

There is a particular focus on “personal information” and “important data”, both of which are vaguely defined. This is significant as network and CII operators will be required to localise this information to China, and a security self-assessment or approval from the relevant regulator will be required before transferring this data abroad.

Under the CSL, personal information is defined as information that, taken alone or with other data, is sufficient to ascertain an individual’s identity, including birth dates, phone numbers, addresses and identity card numbers. Other personal information guidelines indicate that regulators consider political, religious and genetic information to be sensitive. Similar to the State Secrets Law, the definition of important data is extremely vague; it is described as data closely related to national security, economic development and social public interests. Regulators will likely focus on whether companies have any data that could contradict official numbers, such as industry or population health statistics.

What are the risks for MNCs?

The sheer scope of the CSL is mind boggling, and, as mentioned, it is also extremely vague. This means it is currently impossible to be ‘compliant,’ and companies will need to focus on how the CSL will be enforced by regulators. From a resource perspective, regulators will need to prioritise certain sectors, aspects and companies over others, with those priorities changing over time. Moreover, the presence of multiple industry regulators will result in patchy interpretation, conflicting signals and unpredictable enforcement.

Overall, MNCs are experiencing progressively active and often aggressive regulatory enforcement in China across several areas, including pricing, corruption and product quality. These enforcement actions are a result of China’s increasingly sophisticated bureaucracy, industrial policies that aim to change the market and geopolitical disputes. While the CSL will certainly be applied for legitimate cyber security concerns, including protecting key domestic infrastructure from internal and external cyber-attacks, foreign companies need to be aware that the CSL will be another tool in the enforcement toolbox and could be used for reasons only tangential to cyber security.

Companies should also be aware the CSL potentially provides the government with the legal ability to obtain intellectual property and a view into an organisation’s cyber gaps and vulnerabilities. The operational costs and risks of localising data to China are likely to be significant for most MNCs, particularly the loss of the ability to conduct global big data analytics if the China data has to be housed separately. There is also significant risk that foreign technologies that are uncertified under the CSL could be shut out of the China market in order to benefit domestic versions, affecting companies that rely on them.

How can companies prepare to be compliant with a moving target?

Companies need to ask themselves if they are an enforcement target for regulators: Is my company critical in keeping certain sectors running? What is the extent of my view into the lives of Chinese citizens? Do I have a strong domestic competitor that will seek to use this law to their advantage?

“There are some practical steps that companies can take to mitigate the impact of this law. It is important you first spend time to understand where you are exposed. You should compare your business against government priorities for network operators and CII, including suppliers, distributors, competitors and technology vendors. Map your data to learn what could be considered personal and important to regulators” says Carla Liedtke.

“Once you understand where you stand, you then need to prepare your company to comply by filling in the gaps. For example, if your business or data is an enforcement priority, prepare for key CSL provisions, including data localisation and the national security review. In addition to assessing gaps in cyber policies and procedures against the CSL, preparing for investigators’ unique methods and motivations will be key to mitigating risks from the review process” continues Carla.

“Third, look to engage and use available resources. Regulators across industries are developing rules that will put flesh on the bones of the CSL. What are you doing about it? You should look at how to apply strategic and targeted government engagement strategies to help mitigate the impact of the CSL on your business.

“The scope and nature of the CSL is certainly concerning for MNCs operating in China. As with any regulation in China, companies that have a clearer understanding of government priorities with respect to enforcement and have undertaken a risk assessment will be better prepared to manage the operational and compliance risks associated with the CSL.”