网易首页 > 网易号 > 正文 申请入驻

Comments on the PI Protection Compliance Audit Measures

0
分享至

On August 3, 2023, the Cyberspace Administration of China (" CAC ") issued the draft Administrative Measures for Personal Information Protection Compliance Audit and the accompanying "Personal Information Protection Compliance Audit Reference Points" ("Audit Reference Points", collectively referred to as "PI Audit Measures") for seeking public comments.

The PI Audit Measures sets forth detailed guidelines on Articles 54 and 64 of the "Personal Information Protection Law of the People's Republic of China" ( “PIPL" ) which takes effect on November 1,2021 and requires Personal Information processors to conduct audits of Personal Information(“PI”) processing activities on a regular basis and from time to time.

In this article, we will explain the key contents of the PI Audit Measures which shall get noticed by enterprises and provide corresponding solutions.

I.Key contents of the PI Audit Measures

1.Details of the PI Audit System

It is worth noting that, unlike the relevant legal requirements for the establishment of PI protection agencies and data export, the PI audit obligations stipulated in the PI Audit Measures are mandatory obligations and shall apply to all PI processors, with no exemptions or mitigations based on their specific PI processing act.

Based on Article 54 and 64 of the PIPL, the PI Audit Measures provides more details for the specific requirements of two types of audits: regular self-audits and irregular supervisory audits:

1.1Regular self PI audits

Specifically, PI Processors that have processed PI more than 1 million individuals shall conduct a PI audit at least once a year; other types of PI Processors shall conduct a PI audit at least once every two years.

1.2Irregular regulatory PI audits

If the cyberspace department, in the course of performing their duties and responsibilities, discovers that "there are high risks in PI processing activities" or "PI security incidents have occurred", it may require the PI processor to entrust a professional agency to conduct a compliance audit of its PI processing activities. Such risks or incidents may include the PI security risks reflected in the user complaints and reports, civil litigation, administrative penalties, public opinion risks and voluntary disclosure materials of the PI processors(such as self-assessment reports on data transfer security).

Different from regular self PI audits, the regulatory PI audits carried out at the request of the cyberspace department must be conducted by a professional institution entrusted by the PI processor and cannot be conducted by the PI Processor internally. The PI Audit Measure therefore stipulates a recommended list for audit institutions, encouraging PI processors to give preference to the professional institutions in the recommended list to carry out PI audits.

2.Specific Procedures and Obligations of All Parties for PI Audits

2.1Audit procedures

The PI Audit Measure do not stipulated too much regarding self PI audits, and enterprises should conduct their own audits according to the frequency specified in the PI Audit Measure.However, for regulatory audits, the specific procedures stipulated in the PI Audit Measure are as follows:

(a)Trigger: When the cyberspace department discovers that "there are high risks in PI processing activities" or "PI security incidents have occurred", it may request the enterprise to conduct a PI audit;

(b)Select and entrust a professional agency: After receiving the request from the cyberspace department, the enterprise should refer to the recommended list of professional agencies or select and entrust an external professional agency on its own to conduct the PI audit as soon as possible;

(c)Conduct a PI audit: The audit should be completed within 90 working days; if the situation is complicated, such duration may be extended appropriately with approval by the department performing PI protection duties and responsibilities;

(d)Submit a PI audit report: PI processors should submit the PI audit report issued by a professional institution to the department performing PI protection duties and responsibilities. The report should be signed by the person in charge of the PI audit and the person in charge of the professional institution and stamped with the official seal of the professional institution.

(e)Rectify and report the rectification results: PI processors should make rectifications according to the rectification suggestions given by professional institutions, and, after the review of the professional institutions, submit the rectification results to the department that performs PI protection duties and responsibilities.

2.2Obligations of all parties

PI processors have an obligation to cooperate with professional institutions and should ensure that the professional institutions can exercise their authority normally, including requiring provision or assistance in consulting relevant documents or materials; entering relevant premises of PI processing activities for investigation and observation, checking and testing the related equipment and facilities, interviewing the personnel, investigating, inquiring and taking evidence with respect to the relevant issues and soon.. It can be seen that entrusting a third party to conduct PI audits will inevitably have a certain impact on corporate business activities.

Similarly, the PI Audit Measure make detailed provisions on the code of conduct of professional institutions, including requirements such as no subcontracting, independence and objectivity, confidentiality obligations, no malicious interference with normal operations, and audit authenticity.

3.Reference Points for PI audits

PI Audit Measures listed the review matters that PI processors or professional institutions entrusted by them should consider when conducting PI audits in the appendix Audit Reference Points, summarizing the general audit requirements of PIPL and Information Security Technology Personal Information Security Specifications(GB /T 35273-2020 ):

(a)The lawful basis of processing activities, such as obligations to inform and obtain consent;

(b)Special processing scenarios: joint processing, entrusted processing, transfer, external provision, disclosure, automated decision-making, etc.;

(c)Rights of PI subjects: right to delete, methods of exercising rights, etc.;

(d)Internal PI protection system: such as internal management system and operating procedures for PI protection, person in charge of PI protection, PI protection impact assessment, security incident emergency plan and emergency response, etc.

In addition, the Audit Reference Points also incorporates the compliance requirements for cross-border PI processing in laws and regulations related to data export such as the Measures for the Security Assessment of Outbound Data Transfer and the measures for the Standard Contract for the outbound Transfer of Personal Information, the compliance requirements for the large-scale Internet platform operator, as well as legal regulations on online violence management, recommendation algorithms, etc.

This Audit Reference Points basically covers the entire process of PI processing and can be used as a reference when conducting PI audits. Due to its recommended and non-mandatory nature, we understand that enterprises and PI audit institutions may also make supplementary adjustments in addition to the matters listed in the Audit Reference Points in accordance with the provisions of other applicable laws and regulations and possible updates to laws and regulations.

4.Legal liability for violating the PI Audit Measures

Article 15 of the PI Audit Measures stipulates that PI processors who violate the provisions shall be punished in accordance with the PIPL and other laws and regulations Therefore, PI processors that fail to perform PI audit-related obligations may be subject to the penalties for violating PI protection obligations under the PIPL, including but not limited to fines of high amount and personal liability of senior executives.

II.Practical Concerns and Suggestions of Enterprises

1.Pay attention to legislative trends and properly perform PI audit obligations

We understand that, on the one hand, the PI audit system, especially the audits conducted by third-party professional institutions, will be included by the cyberspace departments in their "regulatory toolbox" in their daily law enforcement processes to identify and rectify the enterprise's unproper PI processing activities. On the other hand, a complete and objective PI audit report can also become a powerful material for enterprises to prove their compliance with PI processing to the cyberspace department. Therefore, we recommend that enterprises pay attention to the relevant provisions of the official issue of the PI Audit Measures and connect the PI audit system with the compliance requirements of other PI protection laws and regulations.

Since PI audits are bound to have a certain impact on the business activities of PI processors, we recommend that PI processors positively follow the frequency specified in the PI Audit Measures and the considerations specified in the Audit Reference Points in daily operations and perform self PI audits to detect and avoid PI security incidents which may trigger the regulatory PI audits as early as possible.

2.Pay attention to the overlap between PI audit systems and other information disclosure obligations

The audit materials, reports, etc. collected and compiled by an enterprise during its own PI audit can also be used as a proof that the enterprise has fulfilled its PI protection obligations during inquiries or investigations by the cyberspace department. The relevant content of the PI audit report can also be cross-referenced with other statutory disclosures made by the enterprise, such as the data export risk self-assessment report prepared when applying for data export security assessment, personal information protection impact assessment report, network product security vulnerability reporting, annual automobile data security management report, and even disclosure and inquiry responses during the listing process to ensure that the disclosure content is correct and save the cost of preparing relevant disclosure documents.

3.Establish an internal PI audit system as early as possible

In order to smoothly carry out PI audits, enterprises should establish relevant internal audit systems as early as possible, including (a) the frequency and process of PI audits; (b) PI audit matters and standards; (c) The docking process between the audit department(which can be IT, legal, and compliance departments) and other departments (human resources, business, etc.) to strengthen cross-department and cross-professional communication and cooperation within the enterprise; (d) Selection requirements for professional institutions and processes; (e) docking and communication mechanisms with regulatory authorities; and(f)rectification and control measures after audits, etc.

4.Special concerns for multinational enterprises

Throughout the world, many jurisdictions have introduced similar regulations on PI audits. EU's GDPR is the most influential one. It not only regulates data processing and protection, but also clarifies the specific requirements for data protection audits together with the EDPS Audit Guidelines. Similar to China's PI Audit Measures, EU companies can not only prove the legality and compliance of their PI processing acts through PI audits, but regulatory authorities can also require companies to conduct PI audits during investigations.

The UK's Information Commissioner's Office(ICO)has also released A Guide to ICO Audits. Unlike China and EU, UK’s PI audits are voluntary for companies but are conducted by ICO. In the United States, the California Privacy Rights Act requires companies that pose significant risks to consumer privacy or security in their PI processing activities to conduct an annual cybersecurity audit. The audit must be conducted every year and the company should make audit scope clear and ensure the thoroughness and independence of the audit through audit procedures.

In view of this, multinational enterprises, especially those with operations in jurisdictions with relatively complete data protection legislation such as the United States, Europe, and China, need to strengthen the communication between their headquarters and Chinese subsidiaries, pay special attention to the links and differences between the existing personal information or data audit system in each country and Chinese PI audit system established by the PI Audit Measures, get familiar with the different time schedule when the audit obligations are triggered in various jurisdictions, and clarify the overlap and differences in audit matters in various countries to ensure that the operations of the entire multinational enterprise headquarters and Chinese subsidiaries fully comply with applicable laws and regulations.

特别声明:

大成律师事务所严格遵守对客户的信息保护义务,本篇所涉客户项目内容均取自公开信息或取得客户同意。全文内容、观点仅供参考,不代表大成律师事务所任何立场,亦不应当被视为出具任何形式的法律意见或建议。如需转载或引用该文章的任何内容,请私信沟通授权事宜,并于转载时在文章开头处注明来源。未经授权,不得转载或使用该等文章中的任何内容。

特别声明:以上内容(如有图片或视频亦包括在内)为自媒体平台“网易号”用户上传并发布,本平台仅提供信息存储服务。

Notice: The content above (including the pictures and videos if any) is uploaded and posted by a user of NetEase Hao, which is a social media platform and only provides information storage services.

相关推荐
热点推荐
汪峰520官宣,森林北骑马炫耀,披5千围巾,女粉丝却集体取关

汪峰520官宣,森林北骑马炫耀,披5千围巾,女粉丝却集体取关

红大娘娱乐
2024-05-20 18:30:55
凯特王妃的黑白照惊人,卡米拉无意中已透露出真相

凯特王妃的黑白照惊人,卡米拉无意中已透露出真相

古装影视解说阿凶
2024-05-22 00:00:23
嫦娥六号准备着陆!48小时完成“挖土”,外媒:中国采回,将共享

嫦娥六号准备着陆!48小时完成“挖土”,外媒:中国采回,将共享

史纪文谭
2024-05-21 22:06:07
太高了!姚明启程前往新疆,人群中显眼,辽篮或横扫夺冠捧杯

太高了!姚明启程前往新疆,人群中显眼,辽篮或横扫夺冠捧杯

天涯沦落人
2024-05-21 18:39:10
车管所提示:“交强险”不再是950元了,没出过险的车主开心了

车管所提示:“交强险”不再是950元了,没出过险的车主开心了

娱乐圈的笔娱君
2024-05-21 07:55:20
社保没交满15年的有救了!新规下,2024年起,全都这样处理!

社保没交满15年的有救了!新规下,2024年起,全都这样处理!

天下纵览
2024-05-21 10:11:18
排面!辽宁男篮即将夺取3连冠,沈阳文旅局长:努力争取全城花车巡游

排面!辽宁男篮即将夺取3连冠,沈阳文旅局长:努力争取全城花车巡游

818体育
2024-05-21 23:51:03
网友吃瓜!网传520深夜,某女老师和学生约会被堵,上演名场面…

网友吃瓜!网传520深夜,某女老师和学生约会被堵,上演名场面…

火山诗话
2024-05-21 09:27:34
中国永远的校长,死于1962年

中国永远的校长,死于1962年

最爱历史
2024-05-20 13:30:17
乔治表态愿加入尼克斯 2亿顶薪先签后换 兰德尔加选秀权回报快船

乔治表态愿加入尼克斯 2亿顶薪先签后换 兰德尔加选秀权回报快船

篮球话题团
2024-05-22 00:53:31
安徽省亳州市政协原党组成员、副主席吴斌等4人被逮捕

安徽省亳州市政协原党组成员、副主席吴斌等4人被逮捕

界面新闻
2024-05-21 16:14:08
2轮不胜!10人国安1-1遭垫底+空场海牛逼平 于大宝半场染红

2轮不胜!10人国安1-1遭垫底+空场海牛逼平 于大宝半场染红

直播吧
2024-05-21 21:43:37
中通客车被“神预言”卡点涨停,深交所通报:相关账户限制交易15日

中通客车被“神预言”卡点涨停,深交所通报:相关账户限制交易15日

每日经济新闻
2024-05-21 22:24:11
成都部分网友投诉开发商恶意降价销售,官方:属市场调节价

成都部分网友投诉开发商恶意降价销售,官方:属市场调节价

澎湃新闻
2024-05-19 22:30:27
比QS还厉害?2024全球最大世界大学排名出炉!

比QS还厉害?2024全球最大世界大学排名出炉!

朗威谈星座
2024-05-21 23:28:47
再这么搞下去,失业的人只会越来越多!政府该做些什么?

再这么搞下去,失业的人只会越来越多!政府该做些什么?

鹏飞深文
2024-04-27 13:40:46
20多个孟加拉人围殴3个中国人,结果?

20多个孟加拉人围殴3个中国人,结果?

穷游天下的阿等
2024-05-20 17:30:06
不满怀孕,华裔女子怒砍男友,将生殖器扔进垃圾桶,完事她还...

不满怀孕,华裔女子怒砍男友,将生殖器扔进垃圾桶,完事她还...

听风听你
2024-05-22 02:30:59
庆余年2:庆帝没想到,叶轻眉不仅给范闲留下五个大爹,还有大哥

庆余年2:庆帝没想到,叶轻眉不仅给范闲留下五个大爹,还有大哥

娱乐八卦木木子
2024-05-21 22:05:39
伟大3-0!14万人口小城创奇迹:建队74年后首进欧冠,庆祝如夺冠

伟大3-0!14万人口小城创奇迹:建队74年后首进欧冠,庆祝如夺冠

侃球熊弟
2024-05-21 07:11:49
2024-05-22 05:38:44
大成律师事务所
大成律师事务所
全球资源 本土智慧
2527文章数 248关注度
往期回顾 全部

教育要闻

不用高一知识,怎么解出这道初中题?动动脑吧

头条要闻

美媒:莱希之死基本为小哈梅内伊接替父亲职位铺平道路

头条要闻

美媒:莱希之死基本为小哈梅内伊接替父亲职位铺平道路

体育要闻

兄弟们,为了我,拿下冠军吧!

娱乐要闻

杨洋乔欣聊天记录曝光!还牵扯张天爱

财经要闻

中植系的销售,不退40亿被抓了

科技要闻

小鹏一季度营收65.5亿,经营亏损16.5亿

汽车要闻

四排八座纯电MPV/续航超过800km 翼真L380开启预订

态度原创

房产
手机
时尚
数码
军事航空

房产要闻

教育+医疗+商业连甩王炸,三亚配套大爆发!

手机要闻

618过后Redmi K70至尊版登场:新一代天玑之王蓄势待发

今年夏天最流行的颜色居然是它?

数码要闻

芝奇将于 2024 台北电脑展推出内存与外设新品、举办年度超频活动

军事要闻

美方无理指责中方向俄提供军事装备 中国代表当场回击

无障碍浏览 进入关怀版