{"id":20152,"date":"2021-12-01T20:58:03","date_gmt":"2021-12-01T20:58:03","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=20152"},"modified":"2021-12-02T16:09:36","modified_gmt":"2021-12-02T16:09:36","slug":"china-data-privacy-law-pipl","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/","title":{"rendered":"China&#8217;s Data Privacy Law Poses Challenge for International Companies"},"content":{"rendered":"<p>Businesses that have spent the past three-plus years adapting to the European Union\u2019s far-reaching <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/gdpr-solutions\/\">data privacy law<\/a> now have to decide how they will respond to a similar law in China that has been criticized as being more vague in its wording and harsher in its penalties.<\/p>\n<p>China\u2019s Personal Information and Privacy Law (PIPL), enacted early last month, is designed to give more than 1.4 billion people greater control over the data collected by private companies and what those companies can do with the data while preserving the Chinese government\u2019s broad access to their citizens\u2019 personal information.<\/p>\n<p>The regulation will have a broad ripple effect in the international IT and business world, given that it covers the world\u2019s second-largest economy and a country that has been asserting greater influence on such home-grown tech giants as Alibaba and Tencent and has made it more challenging for outside tech companies to do business within its borders.<\/p>\n<h2><strong>Spread of Data Privacy Laws<\/strong><\/h2>\n<p>Despite the concern, the new law is a significant step forward in the international push to protect citizens\u2019 data privacy rights at a time when companies are able to collect vast amounts of personal information and use it in myriad ways.<\/p>\n<p>The new law is \u201cnot all good or all bad,\u201d Jake Williams, co-founder and CTO at cybersecurity firm BreachQuest, told <em>eSecurity Planet<\/em>, adding that it\u2019s \u201cprobably somewhere in between.&#8221;<\/p>\n<p>&#8220;Chinese citizens need privacy protection just like anyone else,&#8221; Williams said. &#8220;That said, the law gives the CCP additional control over and access to private sector data under the guise of protecting privacy. Given the long history of state-sanctioned IP theft and abuses, organizations are right to be concerned.\u201d<\/p>\n<p>PIPL is designed to enable people to get the personal data that has been collected by companies and correct or delete it and control how it\u2019s used. In addition, they have to consent before their data is collected and that consent can be withdrawn. Companies that collect and process data need to take measures necessary to ensure the data collected is protected and to create <a href=\"https:\/\/www.esecurityplanet.com\/networks\/security-compliance\/\">compliance<\/a> systems and internal audits.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/grc-tools\/\">Top GRC Tools &amp; Software<\/a><\/p>\n<h2><strong>Responsibilities and Penalties<\/strong><\/h2>\n<p>Companies that send data outside of China\u2019s borders also are required to create a specialized data processing site in China or name a person who is responsible for data protection. Companies that violate the law face penalties that include the possibility of being banned from doing business in China. In addition, companies that violate the law could face fines of up to 5 percent of their annual revenue and personal penalties against executives of those companies.<\/p>\n<p>\u201cFor organizations handling personal information collected in China, this law will require an additional layer of data governance,\u201d Nader Henein, privacy research vice president at Gartner, <a href=\"https:\/\/fortune.com\/2021\/11\/22\/chinas-new-data-privacy-rules-2021-foreign-companies-regulation\/\">wrote in Fortune<\/a>. \u201cOperationally, this new layer is intended to deliver consumer privacy rights and crucially realign corporate strategies regarding where to store, where to process, and with whom they can share customer data.\u201d<\/p>\n<h2><strong>PIPL vs. GDPR<\/strong><\/h2>\n<p>Multinational companies since 2018 have had to wrestle with a broad array of data privacy challenges in the wake of the EU\u2019s <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/how-to-comply-with-gdpr\/\">General Data Protection Regulation (GDPR)<\/a> in such areas as where the data is stored, how it\u2019s transferred and how it\u2019s used.<\/p>\n<p>\u201cThe good news is that the PIPL is similar to the GDPR in many ways,\u201d Henein wrote. \u201cIt\u2019s not as comprehensive, and it will likely be heavily supported with ongoing guidance from the regulatory bodies. But for organizations that have taken the last few years to put in place a modern privacy program, satisfying these new consumer privacy rights should not represent a challenge.\u201d<\/p>\n<p>However, there are differences between the two that organizations will have to adapt to, he wrote, noting that \u201cprocessing data as part of a contractual or legal obligation is covered, but critically, the concept of \u2018legitimate interest\u2019 continues to be absent, which means that\u00a0many use cases that involve the processing of personal information will have to rely on informed consent.\u201d<\/p>\n<h2><strong>Executives Can Be Penalized<\/strong><\/h2>\n<p>Organizations are going to have to take the new law into account, given how many companies in the United States and other countries do business in China, Hank Schless, senior manager of security solutions at security firm Lookout, told <em>eSecurity Planet<\/em>.<\/p>\n<p>\u201cThere was a similar concern around vague language when GDPR first came out, but the penalties weren\u2019t quite as harsh,\u201d Schless said. \u201cWhile the financial penalties are similar between China\u2019s laws and GDPR, China tacked on significant additional penalties, including revoking the ability to do business in China and personal penalties on a non-compliant firm\u2019s executives.\u00a0If business in China accounts for more than 5 percent of a non-compliant firm\u2019s revenue, then the revocation of being able to do business in China could be the most significant blow to an organization.\u201d<\/p>\n<p>BreachQuest\u2019s Williams agreed that the language in the PIPL is vague and noted that the timeframe between publication and enforcement also was short. PIPL was announced in September and enacted two months later. With the GDPR, regulators used the longer time between publication and enforcement to answer key implementation questions.<\/p>\n<p>\u201cThe accelerated time scale has removed that opportunity here,\u201d Willias said. \u201cGiven the potential for extremely harsh fines, I think some organizations will choose to opt out of business in China for some time. Data locality will likely have the largest impact to most businesses. Organizations can\u2019t transfer the data of Chinese people outside of China without prior approval. Many organizations weren\u2019t ready to build dedicated infrastructure for processing in China, so this will be a challenge.\u201d<\/p>\n<h2><strong>Will Businesses Leave China?<\/strong><\/h2>\n<p>John Bambenek, principal threat hunter for security company Netenrich, doubted that many companies will leave China.<\/p>\n<p>\u201cDoing business in China has always come with strings attached.\u201d Bambenek told <em>eSecurity Planet<\/em>. \u201cI\u2019m much more concerned with businesses having to be complicit or at least turning a blind eye to flagrant human rights violations than I am with some additional overhead of compliance. Companies will whine, but they want the Chinese money, so they\u2019ll fall in line like they always do and China knows it. Ask anyone still doing business in Hong Kong.\u201d<\/p>\n<h2><strong>Will the U.S. Follow?<\/strong><\/h2>\n<p>The institution by China of PIPL coupled with GDPR also puts a spotlight on the United States, which has not yet instituted a similar country-wide data protection regulation. However, California in 2018 enacted the <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/ccpa-compliance\/\">California Consumer Privacy Act (CCPA)<\/a>, which is similar to GDPR and allows California consumers to demand to see personal data that a company has collected on them as well as third-party organizations with whom the data has been shared. California consumers also can sue companies if the privacy law is violated, regardless if there has been a breach.<\/p>\n<p>Earlier this year, both Colorado and Virginia enacted their own consumer data privacy laws.<\/p>\n<p>Bambenek and Williams both said the United States eventually will have a federal law, but that the country is taking a different route from Europe and China.<\/p>\n<p>\u201cThe legal and political culture in the United States is different than Europe and especially China,\u201d Bambenek said. \u201cThe U.S. does have some data privacy laws, but the trend is towards limiting promiscuous data collection and usage. We do have restrictions on biometric data and California has a privacy law. Eventually we\u2019ll adopt something more comprehensive.\u201d<\/p>\n<p>Williams said that \u201cwhile the U.S. would benefit from federal privacy laws, this isn\u2019t something impacting businesses. Remember that privacy laws make it more difficult to do business. They don\u2019t attract it. I think we\u2019ll see federal privacy laws when complying with individual state laws is too onerous for businesses. In other words, the U.S isn\u2019t behind, we\u2019re just approaching the problem differently.\u201d<\/p>\n<p>Further reading: <a href=\"https:\/\/www.esecurityplanet.com\/products\/risk-management-software\/\">Best Risk Management Software<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6fc68570c0-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fc68570c0\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fc68570c0\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fc68570c0\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fc68570c0\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fc68570c0\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fc68570c0\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Businesses that have spent the past three-plus years adapting to the European Union\u2019s far-reaching data privacy law now have to decide how they will respond to a similar law in China that has been criticized as being more vague in its wording and harsher in its penalties. China\u2019s Personal Information and Privacy Law (PIPL), enacted [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":20154,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[23],"tags":[4633,27742],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[237,384,380,253],"class_list":["post-20152","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-compliance","tag-compliance","tag-grc","b2b_audience-awareness-and-consideration","b2b_product-governance","b2b_product-identity-management-privacy","b2b_product-policy-compliance","b2b_product-regulatory-compliance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>China&#039;s Data Privacy Law Poses Challenge for International Companies | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"China&#039;s new PIPL data privacy law creates challenges for companies doing business in China. Here&#039;s what you need to know.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"China&#039;s Data Privacy Law Poses Challenge for International Companies | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"China&#039;s new PIPL data privacy law creates challenges for companies doing business in China. Here&#039;s what you need to know.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-01T20:58:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-02T16:09:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/data-privacy-e1638392262703.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"China&#8217;s Data Privacy Law Poses Challenge for International Companies\",\"datePublished\":\"2021-12-01T20:58:03+00:00\",\"dateModified\":\"2021-12-02T16:09:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/\"},\"wordCount\":1320,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/data-privacy-e1638392262703.jpeg\",\"keywords\":[\"compliance\",\"GRC\"],\"articleSection\":[\"Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/\",\"name\":\"China's Data Privacy Law Poses Challenge for International Companies | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/data-privacy-e1638392262703.jpeg\",\"datePublished\":\"2021-12-01T20:58:03+00:00\",\"dateModified\":\"2021-12-02T16:09:36+00:00\",\"description\":\"China's new PIPL data privacy law creates challenges for companies doing business in China. Here's what you need to know.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/data-privacy-e1638392262703.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/data-privacy-e1638392262703.jpeg\",\"width\":900,\"height\":540,\"caption\":\"data privacy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"China&#8217;s Data Privacy Law Poses Challenge for International Companies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"China's Data Privacy Law Poses Challenge for International Companies | eSecurity Planet","description":"China's new PIPL data privacy law creates challenges for companies doing business in China. Here's what you need to know.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/","og_locale":"en_US","og_type":"article","og_title":"China's Data Privacy Law Poses Challenge for International Companies | eSecurity Planet","og_description":"China's new PIPL data privacy law creates challenges for companies doing business in China. Here's what you need to know.","og_url":"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/","og_site_name":"eSecurity Planet","article_published_time":"2021-12-01T20:58:03+00:00","article_modified_time":"2021-12-02T16:09:36+00:00","og_image":[{"width":900,"height":540,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/data-privacy-e1638392262703.jpeg","type":"image\/jpeg"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"China&#8217;s Data Privacy Law Poses Challenge for International Companies","datePublished":"2021-12-01T20:58:03+00:00","dateModified":"2021-12-02T16:09:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/"},"wordCount":1320,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/data-privacy-e1638392262703.jpeg","keywords":["compliance","GRC"],"articleSection":["Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/","url":"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/","name":"China's Data Privacy Law Poses Challenge for International Companies | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/data-privacy-e1638392262703.jpeg","datePublished":"2021-12-01T20:58:03+00:00","dateModified":"2021-12-02T16:09:36+00:00","description":"China's new PIPL data privacy law creates challenges for companies doing business in China. Here's what you need to know.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/data-privacy-e1638392262703.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/data-privacy-e1638392262703.jpeg","width":900,"height":540,"caption":"data privacy"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/compliance\/china-data-privacy-law-pipl\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"China&#8217;s Data Privacy Law Poses Challenge for International Companies"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20152"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=20152"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20152\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/20154"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=20152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=20152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=20152"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=20152"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=20152"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=20152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}