Submitted:
09 April 2024
Posted:
09 April 2024
Read the latest preprint version here
Abstract
Keywords:
1. China's Data Security Continues to be Emphasized in Mainland
2. The Fundamental Legal Framework of Data Governance in China Mainland
2.1. Focus on Improving Data-Processing Systems
2.1.1. The Principle of Minimum Necessary
2.1.2. The Principles of Openness and Transparency
2.1.3. The Principle of Informed Consent
2.2. Focus on Improving the Environment of Data Circulation
2.2.1. Improving the Regulation of Data Localization
2.2.2. Improvement of Regulation of Cross-Border Follow of Data
2.3. Focusing on the System of Assuming Responsibility for Data Security
2.3.1. Civil Liability
2.3.2. Administrative Liability
2.3.1. Criminal Liability
3. Data Security Governance Practices in China Mainland
3.1. Legislative Practice and Achievements
3.2. The Administrative Law Enforcement and Improvement
2.3. Judicial Practice and Emphasis
4. China's Data Security and Privacy Protection Path
4.1. Improvement of Laws and Regulations
4.2. Improving the Data Infrastructure
4.2.1. Improvement of Data Grounded Theory
4.2.2. Improvement of Data Classification Regulations
4.3. Improvement of Supporting Measures
5. Summary
References
- N. Kanem, “State of the World Population Report 2023,” United Nations Population Fund, New York, NY, USA, 2023.
- W. Fan, “Reconstructing the Path of Personal Information Protection in the Age of Big Data,” Global Law Review. vol. 38, no. 5, pp.92-115, Feb, 2016.
- T. Wu, “Application of the principle of data minimization to the platform's practice of handling personal information,” Chinese Journal of Law, Vol. 43, no. 6, pp.71-89, 2021.
- Liang, Y. Differences, causes and consequences of global data governance between China and the United States [J/OL]. Journal of Nanjing University of Posts and Telecommunications (Social Science Edition). [CrossRef]
- Dong, k.; Wu, J-C.; Ma, T-C.; “Research of Outbound Data Transfer Security Risk Element System in China,” Information Studies: Theory & Application. Jan, 2024. Accessed: Apr, 1, 2024, [Online.] Available: https://link.cnki.net/urlid/11.1762.G3.20240115.1347.004.
- C. Nigel, D. Luke, “How barriers to cross-border data flows are spreading globally, what they cost, and how to address them,” ITIF. Accessed: Apr 1, 2024. [Online.] Available: https://itif.org/publications/2021/07/19/how-barriers-cross-border-data-flows-are-spreading-globally-what-they-cost/.
- B Chen.; “Data outbound security governance ushers in new regulations,” in Explaining the logic of multidimensional governance in the digital economy. Beijing, China: China Legal Publishing House, 2022, pp.45-51.
- Propaganda Office, “The first approved data exit safety assessment case in China landed in beijing friendship hospital” Beijing Friendship Hospital. Accessed: Arp 1, 2024. [Online.] Available: https://www.bfh.com.cn/Html/News/Articles/5797.html.
- D. Q. Xu, “On the rule of law in regulating corporate two-way compliance of exit data Flows,” Oriental Law, no. 02, pp. 185-197, Feb. 2020. [CrossRef]
- H. L. Zhang, “Platform’s date security obiligation in data production,” Legal Forum, vol. 36, no. 36, pp: 46-57, Mar. 2021. [CrossRef]
- You - Case of destroying computer information system, PiZhou, JiangSu, China, no. 868, 2020.
- Han, J.Y. The judicial dilemma of data crime and the way forward for its governance. Proc. The Yangtze River Delta Jurisprudence Forum, Shanghai, China, 2022, pp.185-197. [CrossRef]
- Y. Q. Hong, “The logical deconstruction and institutional construction of China’s data security legislation,” Law Science Magazine, vol. 44, pp. 38-53, 2023. [CrossRef]
- Y. Liu, “Improve data classification regulations and data security legislation,” Cyberspace Administration of China. Accessed: Arp 1, 2024. [Online.] Available: https://www.cac.gov.cn/2020-09/28/c_1602854536494247.htm.
- S. Lin, “China to introduce ‘Data Element X’ plan to unlock data’s multiplier effects in diverse scenarios: official,” Global Times. Accessed Arp 1, 2024. [Online] Available: https://www.globaltimes.cn/page/202311/1302484.shtml.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).