SlideShare a Scribd company logo
1 of 20
Download to read offline
1
1
Thank You for Joining “China's PIPL: How to Comply in under 60 Days”
● We will be starting a couple minutes after the hour
● This webinar will be recorded and the recording and slides sent out later today
● Please use the GoToWebinar control panel on the right hand side to submit any
questions for the speakers
2
2
© 2021 TrustArc Inc. Proprietary and Confidential Information.
China's PIPL:
How to Comply in under 60 Days
15 September 2021
3
3
Speakers
Paul Breitbarth
Director
Global Policy & EU Strategy
TrustArc
K Royal
Associate General Counsel
Privacy Intelligence
TrustArc
4
4
Today, we will address:
● The key components of the law
● The enforcement mechanisms and potential fines
● Similarities between PIPL, GDPR, and other major data protection
laws
● Steps to take to comply before November 1, 2021
Resources: https://trustarc.com/china-pipl/
5
5
Key Components of PIPL
● Fundamental Requirements
○ Basic principles and definitions
○ Legal bases for processing / handling data
● Cookie Compliance
● Individual Rights, including Notice
● Data Sharing
○ Vendor Management
● Cross-border transfers
● Enforcement
6
6
Legal Bases
Article 13 PIPL
Consent
(freely given, informed,
active & distinct)
Necessary
for a Contract with
the Individual
(incl. HR)
To Fulfill Statutory
Duties and
Obligations
Public Health, Life
and Death or
Protection Property
in Emergency
Situations
News Reporting,
Opinion
Formulating, etc.
Information
Disclosed by the
Individual or in a
Lawful Manner
As Provided by
other Laws
7
7
Individual Rights
Transparency and notice (Art. 17)
Know if an entity is processing their personal information (Art. 44)
Decide if and how their personal information is processed (Art. 44)
View and copy (Art. 45)
Portability (Art. 45)
Correction and amendment (Art. 46)
Deletion (Art. 46)
To know (and have explained) the handling rules (Art. 48)
Non-discrimination for exercising rights (Art. 16)
Automated Processing rights (Art. 24)
Consent to cross-border transfers (Art. 39)
8
8
Notice
Before processing personal information, must provide the following:
● Handler’s name or personal name and contact method;
● Purpose of handling;
● Handling methods,
● Categories of personal information, and
● Retention period;
● Methods and procedures for individuals to exercise the rights including how to reach the
DPO; and
● Other items that laws or administrative regulations provide shall be notified.
For sensitive personal information, Handlers must also disclose the necessity and the influence
on individuals’ rights and interest except where permitted not to do so (Art. 30).
For cross-border transfers, currently or proposed in future, with separate consent.
Accurate, truthful, clear, and understandable
9
9
Data Sharing & Vendor Management
Contracts require:
● Purpose of processing
● Time limit
● Handling method
● Categories of personal information
● Protection measures
● Rights and duties of both sides
● Supervision
● Limited to the activities in the agreement
● Handlers must approve subcontractors
10
10
Cross-Border Transfers
All subject to further documentation from the State cyberspace and informatization department
Chapter III PIPL
Passing a Security
Assessment
Certification
Conducted by a
Specialized Body
Use of a Standard
Contract
As Provided by
other Laws
11
11
Enforcement (Chapter VII)
Entities must:
● Correct the violation, relinquish the unlawful income, and suspend activities.
If entities refuse, they face an additional fine of up to ¥1 million.
Severe (grave) violations: Maximum penalty: ¥50 million (~$7,7 million) or 5% of annual revenue
➢ If impact a large number of people, the entity faces lawsuits (Art. 70)
Individuals in charge or directly responsible for the processing operation face:
● Fines between ¥10,000 and ¥100,000 / up to ¥100,000 and ¥1 million and
● Prohibited from “holding positions of director, supervisor, high-level manager, or personal
information protection officer for a certain period.”
Plus:
● Reported to credit files (individual and business) and publicized (Art. 67)
● Individuals may file a lawsuit when their individual rights are denied (Art. 50)
● Criminal penalties (Art. 71)
12
12
Comparison to Other Laws
13
13
Sensitive Personal Information
CPRA GDPR PIPL
Racial or ethnic origin X X i
Religious beliefs X X i
Philosophical beliefs X X X
Political opinions X i
Union membership X X
Mental or physical health X X X
Sexual orientation or sex life X X i
Genetic or biometric data X X X
Personal data from a known child Provisions Art. 8 for child <14
Precise geolocation X X
Govt-issued ID numbers (SSN, DL, ID, passport) X i
Account access credentials X i
Financial Accounts X
Content of messages unless a business is the recipient X
14
14
Comparison to other laws
CCPA/ CPRA GDPR PIPL
Effective Date Current / CPRA 1 Jan 2023 25 May 2018 1 November 2021
Triggers
In addition to doing business in state with
residents, must generally meet at least one
trigger
$25M rev,
buy/sell data 50k (100k) consumers or
households, or
50% rev from selling (CPRA sharing)
Art. 3
Activities of EU establishment, offering
goods/services to persons in EU or
monitoring their behaviour
Art. 3
Data processing in China, offering
goods/services to persons in China or
monitoring their behaviour, or if prescribed
by law
Implementing Regulations Yes Yes awaiting guidance
Privacy Notice Yes Yes Yes
Consumer Rights
Access | Know | Delete | Correct | Portability |
Appeal | Non-discrimination
A, K, D, C
Non-d
A, K, D, C, P, Ap, Non-d A, K, D, C, P, Ap (plus others)
Non-d
Response Time 45, +45 One month timely
Sensitive Data No Yes, explicit consent or exempted
situation
Yes, separate consent
Minors, Age <13, 13-15 <16 (member states cannot go
<13)
<14
Applies B2B No (CCPA moratorium) Yes Yes
Applies to Employees No (CCPA moratorium) Yes Yes
15
15
Comparison, cont.
CCPA/ CPRA GDPR PIPL
Opt-outs Sell / CPRA Share Right to object Sensitive data, transfers, ads
Vendor Contract Requirements Yes Yes Yes
Security Audits No / CPRA Yes Implied in accountability
obligations
For important data only,
under Art. 30 DSL
DPIA / PIAs Yes (CPRA) Yes Yes
Enforcement AG DPAs Agency
Cure period 30 days / CPRA No No No
Penalties $2500 / $7500 Up to 4% revenue /
20M Euros
Up to 5% revenue /
¥50M / and individual sanctions
Private Right of Action Yes, if data breach Yes (+ collective redress) Yes
Sale / Sharing Data Sell / CPRA Share Right to object Sensitive data, transfers, ads
16
16
Roadmap to Compliance
17
17
Roadmap to Compliance
Four week planning guide
6 weeks to go!
Week 1
• Identifying
elements of
law and status
• Processing
activities
• Stakeholder
alignment
Week 2
• Vendor
management
• Join Handlers
• Cross-border
transfers
• Data
localization
Week 3
• Policy review
and revise
• Consent
• Automated
decision-
making
• Cookies
Week 4
• Individual
rights
• Notice
• Training
• Finalize DPIAs
• Verify ready
18
18
Privacy Central
19
19
Last Thoughts and Questions
?
?
20
20
Thank You!
See http://www.trustarc.com/insightseries for the
2021 Privacy Insight Series and past webinar
recordings.
If you would like to learn more about how TrustArc can support you with
compliance, please reach out to sales@trustarc.com for a free demo.

More Related Content

What's hot

Demystifying Healthcare Data Governance
Demystifying Healthcare Data GovernanceDemystifying Healthcare Data Governance
Demystifying Healthcare Data Governance
Health Catalyst
 
Optimize the IT Operating Model
Optimize the IT Operating ModelOptimize the IT Operating Model
Optimize the IT Operating Model
Info-Tech Research Group
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
DATAVERSITY
 

What's hot (20)

Implementing the Data Maturity Model (DMM)
Implementing the Data Maturity Model (DMM)Implementing the Data Maturity Model (DMM)
Implementing the Data Maturity Model (DMM)
 
Rethinking Trust in Data
Rethinking Trust in Data Rethinking Trust in Data
Rethinking Trust in Data
 
California Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to ComplianceCalifornia Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to Compliance
 
LFS302_Real-World Evidence Platform to Enable Therapeutic Innovation
LFS302_Real-World Evidence Platform to Enable Therapeutic InnovationLFS302_Real-World Evidence Platform to Enable Therapeutic Innovation
LFS302_Real-World Evidence Platform to Enable Therapeutic Innovation
 
TOP_407070357-Data-Governance-Playbook.pptx
TOP_407070357-Data-Governance-Playbook.pptxTOP_407070357-Data-Governance-Playbook.pptx
TOP_407070357-Data-Governance-Playbook.pptx
 
Engagement at Scale
Engagement at ScaleEngagement at Scale
Engagement at Scale
 
Demystifying Healthcare Data Governance
Demystifying Healthcare Data GovernanceDemystifying Healthcare Data Governance
Demystifying Healthcare Data Governance
 
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with ITBigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
 
Accelerating the Path to GDPR Compliance
Accelerating the Path to GDPR ComplianceAccelerating the Path to GDPR Compliance
Accelerating the Path to GDPR Compliance
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
Data Quality
Data QualityData Quality
Data Quality
 
Optimize the IT Operating Model
Optimize the IT Operating ModelOptimize the IT Operating Model
Optimize the IT Operating Model
 
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
Data Quality Strategies
Data Quality StrategiesData Quality Strategies
Data Quality Strategies
 
Data Governance Best Practices
Data Governance Best PracticesData Governance Best Practices
Data Governance Best Practices
 
Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...
Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...
Chief Data Architect or Chief Data Officer: Connecting the Enterprise Data Ec...
 
Five Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data GovernanceFive Things to Consider About Data Mesh and Data Governance
Five Things to Consider About Data Mesh and Data Governance
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
 
Transform Data to Insight
Transform Data to InsightTransform Data to Insight
Transform Data to Insight
 

Similar to China's PIPL: How to Comply in Under 60 Days

Similar to China's PIPL: How to Comply in Under 60 Days (20)

WB-2022-01-25-India's Data Protection Bill
WB-2022-01-25-India's Data Protection BillWB-2022-01-25-India's Data Protection Bill
WB-2022-01-25-India's Data Protection Bill
 
WB-2022-01-25-India Data Protection Bill
WB-2022-01-25-India Data Protection BillWB-2022-01-25-India Data Protection Bill
WB-2022-01-25-India Data Protection Bill
 
Building Consumer Trust through Individual Rights / DSAR Management
Building Consumer Trust through Individual Rights / DSAR ManagementBuilding Consumer Trust through Individual Rights / DSAR Management
Building Consumer Trust through Individual Rights / DSAR Management
 
Data Decoded: Understanding India's Draft Data Protection Bill
Data Decoded: Understanding India's Draft Data Protection BillData Decoded: Understanding India's Draft Data Protection Bill
Data Decoded: Understanding India's Draft Data Protection Bill
 
Post US Election Privacy Updates & Implications
Post US Election Privacy Updates & ImplicationsPost US Election Privacy Updates & Implications
Post US Election Privacy Updates & Implications
 
So Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateSo Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law Update
 
LGPD is Here: What to know to understand compliance and enforcement action
LGPD is Here: What to know to understand compliance and enforcement actionLGPD is Here: What to know to understand compliance and enforcement action
LGPD is Here: What to know to understand compliance and enforcement action
 
CCPA Update: What You Need to Know about CPRA & July 1st Enforcement
CCPA Update: What You Need to Know about CPRA & July 1st EnforcementCCPA Update: What You Need to Know about CPRA & July 1st Enforcement
CCPA Update: What You Need to Know about CPRA & July 1st Enforcement
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430
Eic munich-2019-ripple effect of gdpr in na- cx pa-rev20190430
 
Why GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkWhy GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC Framework
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1
 
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
How to Leverage Your GDPR Compliance for CCPA, Privacy Shield & More New Requ...
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
 
Data Protection: Transitioning to the GDPR
Data Protection: Transitioning to the GDPRData Protection: Transitioning to the GDPR
Data Protection: Transitioning to the GDPR
 
NetSquared London - GDPR for charities
NetSquared London - GDPR for charitiesNetSquared London - GDPR for charities
NetSquared London - GDPR for charities
 
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
 
California Consumer Privacy Act and the Role of IAM
California Consumer Privacy Act and the Role of IAMCalifornia Consumer Privacy Act and the Role of IAM
California Consumer Privacy Act and the Role of IAM
 

More from TrustArc

TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc
 

More from TrustArc (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
TrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc Webinar - TrustArc's Latest AI Innovations
TrustArc Webinar - TrustArc's Latest AI Innovations
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
 
Nymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
 
CBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
 
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
 
Building Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
 
The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
 
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
 
Artificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

China's PIPL: How to Comply in Under 60 Days

  • 1. 1 1 Thank You for Joining “China's PIPL: How to Comply in under 60 Days” ● We will be starting a couple minutes after the hour ● This webinar will be recorded and the recording and slides sent out later today ● Please use the GoToWebinar control panel on the right hand side to submit any questions for the speakers
  • 2. 2 2 © 2021 TrustArc Inc. Proprietary and Confidential Information. China's PIPL: How to Comply in under 60 Days 15 September 2021
  • 3. 3 3 Speakers Paul Breitbarth Director Global Policy & EU Strategy TrustArc K Royal Associate General Counsel Privacy Intelligence TrustArc
  • 4. 4 4 Today, we will address: ● The key components of the law ● The enforcement mechanisms and potential fines ● Similarities between PIPL, GDPR, and other major data protection laws ● Steps to take to comply before November 1, 2021 Resources: https://trustarc.com/china-pipl/
  • 5. 5 5 Key Components of PIPL ● Fundamental Requirements ○ Basic principles and definitions ○ Legal bases for processing / handling data ● Cookie Compliance ● Individual Rights, including Notice ● Data Sharing ○ Vendor Management ● Cross-border transfers ● Enforcement
  • 6. 6 6 Legal Bases Article 13 PIPL Consent (freely given, informed, active & distinct) Necessary for a Contract with the Individual (incl. HR) To Fulfill Statutory Duties and Obligations Public Health, Life and Death or Protection Property in Emergency Situations News Reporting, Opinion Formulating, etc. Information Disclosed by the Individual or in a Lawful Manner As Provided by other Laws
  • 7. 7 7 Individual Rights Transparency and notice (Art. 17) Know if an entity is processing their personal information (Art. 44) Decide if and how their personal information is processed (Art. 44) View and copy (Art. 45) Portability (Art. 45) Correction and amendment (Art. 46) Deletion (Art. 46) To know (and have explained) the handling rules (Art. 48) Non-discrimination for exercising rights (Art. 16) Automated Processing rights (Art. 24) Consent to cross-border transfers (Art. 39)
  • 8. 8 8 Notice Before processing personal information, must provide the following: ● Handler’s name or personal name and contact method; ● Purpose of handling; ● Handling methods, ● Categories of personal information, and ● Retention period; ● Methods and procedures for individuals to exercise the rights including how to reach the DPO; and ● Other items that laws or administrative regulations provide shall be notified. For sensitive personal information, Handlers must also disclose the necessity and the influence on individuals’ rights and interest except where permitted not to do so (Art. 30). For cross-border transfers, currently or proposed in future, with separate consent. Accurate, truthful, clear, and understandable
  • 9. 9 9 Data Sharing & Vendor Management Contracts require: ● Purpose of processing ● Time limit ● Handling method ● Categories of personal information ● Protection measures ● Rights and duties of both sides ● Supervision ● Limited to the activities in the agreement ● Handlers must approve subcontractors
  • 10. 10 10 Cross-Border Transfers All subject to further documentation from the State cyberspace and informatization department Chapter III PIPL Passing a Security Assessment Certification Conducted by a Specialized Body Use of a Standard Contract As Provided by other Laws
  • 11. 11 11 Enforcement (Chapter VII) Entities must: ● Correct the violation, relinquish the unlawful income, and suspend activities. If entities refuse, they face an additional fine of up to ¥1 million. Severe (grave) violations: Maximum penalty: ¥50 million (~$7,7 million) or 5% of annual revenue ➢ If impact a large number of people, the entity faces lawsuits (Art. 70) Individuals in charge or directly responsible for the processing operation face: ● Fines between ¥10,000 and ¥100,000 / up to ¥100,000 and ¥1 million and ● Prohibited from “holding positions of director, supervisor, high-level manager, or personal information protection officer for a certain period.” Plus: ● Reported to credit files (individual and business) and publicized (Art. 67) ● Individuals may file a lawsuit when their individual rights are denied (Art. 50) ● Criminal penalties (Art. 71)
  • 13. 13 13 Sensitive Personal Information CPRA GDPR PIPL Racial or ethnic origin X X i Religious beliefs X X i Philosophical beliefs X X X Political opinions X i Union membership X X Mental or physical health X X X Sexual orientation or sex life X X i Genetic or biometric data X X X Personal data from a known child Provisions Art. 8 for child <14 Precise geolocation X X Govt-issued ID numbers (SSN, DL, ID, passport) X i Account access credentials X i Financial Accounts X Content of messages unless a business is the recipient X
  • 14. 14 14 Comparison to other laws CCPA/ CPRA GDPR PIPL Effective Date Current / CPRA 1 Jan 2023 25 May 2018 1 November 2021 Triggers In addition to doing business in state with residents, must generally meet at least one trigger $25M rev, buy/sell data 50k (100k) consumers or households, or 50% rev from selling (CPRA sharing) Art. 3 Activities of EU establishment, offering goods/services to persons in EU or monitoring their behaviour Art. 3 Data processing in China, offering goods/services to persons in China or monitoring their behaviour, or if prescribed by law Implementing Regulations Yes Yes awaiting guidance Privacy Notice Yes Yes Yes Consumer Rights Access | Know | Delete | Correct | Portability | Appeal | Non-discrimination A, K, D, C Non-d A, K, D, C, P, Ap, Non-d A, K, D, C, P, Ap (plus others) Non-d Response Time 45, +45 One month timely Sensitive Data No Yes, explicit consent or exempted situation Yes, separate consent Minors, Age <13, 13-15 <16 (member states cannot go <13) <14 Applies B2B No (CCPA moratorium) Yes Yes Applies to Employees No (CCPA moratorium) Yes Yes
  • 15. 15 15 Comparison, cont. CCPA/ CPRA GDPR PIPL Opt-outs Sell / CPRA Share Right to object Sensitive data, transfers, ads Vendor Contract Requirements Yes Yes Yes Security Audits No / CPRA Yes Implied in accountability obligations For important data only, under Art. 30 DSL DPIA / PIAs Yes (CPRA) Yes Yes Enforcement AG DPAs Agency Cure period 30 days / CPRA No No No Penalties $2500 / $7500 Up to 4% revenue / 20M Euros Up to 5% revenue / ¥50M / and individual sanctions Private Right of Action Yes, if data breach Yes (+ collective redress) Yes Sale / Sharing Data Sell / CPRA Share Right to object Sensitive data, transfers, ads
  • 17. 17 17 Roadmap to Compliance Four week planning guide 6 weeks to go! Week 1 • Identifying elements of law and status • Processing activities • Stakeholder alignment Week 2 • Vendor management • Join Handlers • Cross-border transfers • Data localization Week 3 • Policy review and revise • Consent • Automated decision- making • Cookies Week 4 • Individual rights • Notice • Training • Finalize DPIAs • Verify ready
  • 19. 19 19 Last Thoughts and Questions ? ?
  • 20. 20 20 Thank You! See http://www.trustarc.com/insightseries for the 2021 Privacy Insight Series and past webinar recordings. If you would like to learn more about how TrustArc can support you with compliance, please reach out to sales@trustarc.com for a free demo.