1 / 5

Decrypting Data Compliance in China

Decrypting Data Compliance in China. 3 Trends, 2 Considerations, and 1 Action. Three Legislative Trends. Data Localization Increasing requirements to store some data in China; many companies are already switching to local data centers. Cross-Border Restrictions

louisec
Download Presentation

Decrypting Data Compliance in China

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Decrypting Data Compliance in China 3 Trends, 2 Considerations, and 1 Action

  2. Three Legislative Trends Data Localization Increasing requirements to store some data in China; many companies are already switching to local data centers Cross-Border Restrictions More difficult to move data to other countries; some data will require a security review Government Access Focus on cybersecurity indicates that the government will require companies to provide more access to their data, business processes, and product information

  3. Two Strategy Considerations Proactive Planning Plan ahead by following principles reflected in clear trends to avoid last-minute compliance issues and mitigate risk Global Context New laws in other jurisdictions will require global companies to reconfigure systems for a unified and international data strategy

  4. One Key Action Data Inventory and Mapping Review privacy policies for data collection Determine what data already exists Ascertain where the data is stored Check what systems are in use for tasks like accounting, email, website hosting, CRM, payment processing, etc. Record how company data is accessed by external users or partners Data Hardware • Determine what equipment is in use, especially with regards to networking equipment in China • Assess what procurement challenges may arise as a result of the 2016 Cybersecurity Law and related implementation rules Organization Clarify roles within the organization for legal compliance, data security, and incident response Establish best practices and training for employees Communicate key developments and challenges to regional and global management

More Related