China PIPL Compliance: Cross-Border Data Transfer Guide

Complete guide to China's Personal Information Protection Law (PIPL) covering processing rules, cross-border transfer mechanisms, CAC enforcement, and compliance steps.

E
ECOSIRE Research and Development Team
|March 19, 202613 min read2.8k Words|

Part of our Compliance & Regulation series

Read the complete guide

China PIPL Compliance: Cross-Border Data Transfer Guide

China's Personal Information Protection Law (PIPL — 个人信息保护法), effective November 1, 2021, is China's comprehensive national data privacy law and one of the most demanding data protection frameworks globally. Alongside the Data Security Law (DSL, effective September 2021) and the Cybersecurity Law (CSL, effective June 2017), PIPL forms a trilogy of regulations that fundamentally reshape how businesses collect, process, store, and transfer data in and out of China.

For multinational companies operating in China or serving Chinese consumers, PIPL compliance is not optional — violations can result in fines up to 5% of annual turnover, suspension of business operations, and personal criminal liability for responsible executives. The Cyberspace Administration of China (CAC) has demonstrated aggressive enforcement, including high-profile actions against Didi Global ($1.19 billion fine), Full Truck Alliance, and Boss Zhipin.

Key Takeaways

  • PIPL applies to processing of personal information of individuals in China — extraterritorial scope covers overseas entities targeting or analysing Chinese individuals
  • Separate consent is required for each processing purpose — bundled consent is invalid
  • "Sensitive personal information" (biometrics, financial, health, precise location, minors' data) requires separate, explicit consent
  • Cross-border transfers require one of three mechanisms: CAC security assessment, standard contracts, or certification — all are operationally significant
  • Data localisation requirements apply to Critical Information Infrastructure Operators (CIIOs)
  • The CAC security assessment is mandatory for large-scale cross-border transfers (over 100,000 individuals' data annually)
  • Important personal information of minors (under 14) requires separate parental consent and heightened protection
  • Fines reach up to 5% of annual turnover for serious violations; business suspension is also available as a sanction

PIPL Framework and Scope

Legislative Basis

PIPL was adopted by the Standing Committee of the National People's Congress on August 20, 2021. It draws on global data protection best practices (particularly GDPR) while reflecting China's unique regulatory context, including national security considerations embedded throughout the legislation.

Key principles (Article 5–9):

  • Lawfulness, legitimacy, necessity, and good faith
  • Clear and reasonable purpose
  • Data minimisation
  • Quality assurance (accuracy and completeness)
  • Security and responsibility
  • Processing limited to minimum necessary scope

Territorial Scope

Article 3 gives PIPL extraterritorial application. It applies to:

  1. Processing of personal information of individuals within China's territory by entities inside China
  2. Processing of personal information of individuals within China's territory by entities outside China where:
    • The purpose is to provide products or services to individuals in China
    • The purpose is to analyse or assess the behaviour of individuals in China
    • Other circumstances specified by CAC

This means a foreign company running a website in Chinese, serving Chinese consumers, or using analytics tools that profile Chinese user behaviour must comply with PIPL.

Overseas Personal Information Processors (OPIPs): Overseas entities within PIPL's extraterritorial scope must (Article 53):

  • Establish a dedicated entity or appoint a representative within China
  • Submit the name and contact details of the China representative to the relevant competent department

Article 13 of PIPL establishes six legal bases for processing personal information. Unlike GDPR where multiple bases are equally weighted, PIPL treats individual consent as the primary basis with other bases as exceptions:

Legal BasisDescription
Individual consentSeparate, informed, voluntary, explicit consent
Contract/HRNecessary for contract execution, or HR management under legally adopted rules
Legal dutyNecessary to fulfil statutory duties or obligations
Public health emergencyResponding to public health emergencies or protecting life/health/property safety
News and supervision activitiesIn the public interest, within reasonable scope
Public disclosureProcessing already publicly disclosed information within reasonable scope
Other legal provisionsOther circumstances provided by laws and administrative regulations

Critical consent requirements (Articles 14–17):

  • Consent must be given voluntarily and explicitly
  • Consent must be informed — individuals must understand what they are consenting to before deciding
  • Consent cannot be bundled — you must obtain separate consent for each processing purpose
  • Withdrawing consent must be as easy as giving it
  • Withdrawal does not affect prior lawful processing
  • Refusing to provide personal information or withdrawing consent must not affect the provision of the core product/service (except where data is necessary for the service)

Sensitive Personal Information

Article 28 defines sensitive personal information (敏感个人信息) as personal information that, once leaked or unlawfully used, may cause harm to the dignity of natural persons or serious harm to their personal or property safety. Specific categories include:

  • Biometric information (fingerprints, voiceprints, face recognition, eye iris, genetic data)
  • Religious belief
  • Specific identities (political party, ethnicity)
  • Medical health information
  • Financial accounts
  • Precise location information (real-time GPS, precise movement tracking)
  • Personal information of minors under 14 years old

Heightened requirements for sensitive PI:

  • Separate, explicit consent (additional to any consent for non-sensitive processing)
  • Necessity justification — must have specific purposes and adequate necessity
  • Enhanced security measures
  • Notification to individuals of the specific impact of processing

Children's personal information (minors under 14): Must obtain consent from parents or guardians. CAC has issued specific Rules on the Protection of Children's Personal Information Online (2019, amended 2022) with additional requirements for online service providers.


Data Subject Rights

PIPL grants individuals (Chapter IV, Articles 44–50) the following rights:

Right to know and right to decide: Individuals have the right to know about and decide on the processing of their personal information, and to restrict or refuse processing by others.

Right to access and copy: Individuals can request copies of their personal information. Processors must provide it within a reasonable timeframe.

Right to transfer: Where technically feasible, individuals can request transfer of their personal information to another designated processor.

Right to correction: Individuals can correct inaccurate or incomplete personal information.

Right to deletion: Deletion is required where: (1) processing purpose has been achieved or is impossible; (2) processor decides to stop providing products/services; (3) retention period has expired; (4) consent withdrawn; (5) processing violates laws/regulations or agreement.

Right to withdraw consent: For consent-based processing, individuals can withdraw at any time. Withdrawal does not affect prior lawful processing.

Right to explanation: Individuals can request explanations of personal information processing rules.

Right to refuse automated decision-making: Where PI is used for personalised recommendations or automated decisions, individuals have the right to refuse and request human review of decisions with significant effects.


Cross-Border Data Transfer: The Critical Challenge

Chapter III (Articles 38–43) of PIPL imposes the strictest cross-border transfer framework of any major privacy law, making this the most operationally challenging compliance area for multinational companies.

Three Permitted Mechanisms

1. CAC Security Assessment (Article 38(1))

Mandatory for:

  • Critical Information Infrastructure Operators (CIIOs) — any cross-border transfer
  • Non-CIIO processors: if cumulative overseas transfers reach 100,000 individuals' data in current year (or 10,000 individuals of sensitive PI)
  • Personal information generated by important data (critical data under DSL)

The CAC security assessment involves submitting an application with detailed documentation of the transfer, the recipient's data protection practices, and contractual arrangements. Assessment timelines are 60 working days (extendable to 90).

2. Standard Contract (Article 38(2))

For non-CIIO processors not reaching the 100,000 threshold, overseas transfers can be conducted using CAC-approved standard contractual clauses published in February 2023. Key requirements:

  • Use the CAC SCC template without modification
  • File the SCC with the provincial-level CAC within 10 business days of the contract taking effect
  • Conduct a Personal Information Protection Impact Assessment (PIPIA) before transfer
  • Maintain PIPIA and contract records for 3 years

3. Certification (Article 38(3))

Intragroup transfers between affiliated entities can use certification by a CAC-accredited personal information protection professional organisation. The PIPIA certification scheme was developed jointly by the National Information Security Standardization Technical Committee (TC260) and CAC.

Transfer Mechanism Selection Guide

Company TypeApplicable Mechanism
CIIO (critical infrastructure)CAC Security Assessment (mandatory)
More than 1 million users' PI transferred overseas since January 1CAC Security Assessment (mandatory)
100,000–1 million individuals' PI transferred overseas in current yearCAC Security Assessment (mandatory)
Sensitive PI of 10,000+ individuals transferred overseasCAC Security Assessment (mandatory)
Non-CIIO, under 100,000 threshold, unrelated entitiesCAC Standard Contract + PIPIA
Non-CIIO, intragroup transfersCertification or CAC Standard Contract

Data Localisation for CIIOs

Critical Information Infrastructure Operators must store personal information and "important data" collected and generated in China within China (Article 40). Cross-border transfer of data collected in China by CIIOs requires the CAC security assessment. CIIOs are defined broadly by the CSL and sector-specific CIIO identification regulations, covering energy, transport, water, finance, public services, e-government, national defence, and internet infrastructure operators.


Obligations for Large-Scale Processors

Article 58 imposes additional obligations on Personal Information Processors whose services reach a large number of users (threshold to be determined by CAC, but commonly understood to be 10 million+ users based on CAC guidance):

  • Formulate personal information protection compliance programs and procedures
  • Establish an external oversight mechanism with social supervision
  • Conduct regular compliance audits of personal information protection
  • Conduct Personal Information Protection Impact Assessments (PIPIAs) before processing activities with significant risks
  • Accept supervision by relevant national authorities
  • Designate a Personal Information Protection Officer (PIPO) responsible for oversight

Personal Information Protection Impact Assessments (PIPIAs)

Article 55 requires PIPIAs before:

  • Processing sensitive personal information
  • Using PI for automated decision-making
  • Entrusting processing to third parties, sharing, or transferring PI
  • Disclosing PI publicly
  • Cross-border transfers (required for SCC mechanism)
  • Other processing activities with significant impact on individuals

PIPIA documentation must be retained for at least 3 years. A PIPIA must analyse:

  • Whether the processing purpose, method, and scope comply with laws/regulations
  • Impact on individual rights and the degree of security risk
  • Whether protective measures are lawful, effective, and proportionate to risk

Breach Notification

Article 57 requires that upon discovering a personal information security incident (breach), processors must immediately take remedial action and notify competent authorities and individuals. Notification must include:

  • Type of personal information leaked, tampered with, or lost
  • Causes and potential harm of the incident
  • Remedial measures taken by the processor
  • Steps individuals can take to mitigate the harm
  • Processor contact information

Timeline: The law says "immediately" — CAC guidance indicates this means as soon as the breach is discovered for internal and regulatory notification. Individual notification should occur without undue delay once the scope is assessed.

Where the breach is unlikely to harm individuals, the processor can record the incident internally instead of notifying individuals (subject to regulatory review).


CAC Enforcement and Penalties

The Cyberspace Administration of China is the primary PIPL enforcement authority, working alongside sector regulators (PBOC for financial data, NHSA for health data, etc.).

Administrative penalties (Article 66):

  • Warning and order to correct
  • Confiscation of unlawful gains
  • Fines up to RMB 1 million ($140,000 USD) for lesser violations
  • Fines up to 5% of annual turnover of the prior year for serious violations
  • Suspension or termination of business operations (nuclear option)
  • Personal liability for executives: fines up to RMB 1 million, prohibition from being a company director/officer

Criminal referral: Violations involving national security or constituting criminal offences are referred to public security authorities.

Notable enforcement actions:

  • Didi Global (2022): $1.19 billion fine for serious violations of network data security — the largest PIPL-related enforcement action to date
  • BOSS Zhipin and Full Truck Alliance (2021): Suspensions and investigations for cybersecurity review violations related to overseas listings
  • Ongoing CAC investigations of companies across fintech, healthcare, and internet sectors

PIPL Compliance Checklist

  • Applicability analysis completed (China operations, Chinese users, extraterritorial scope)
  • China representative/entity designated if overseas entity within PIPL scope
  • Personal information inventory completed including sensitive PI identification
  • Legal basis documented for every processing activity (consent for most)
  • Separate consent mechanisms implemented for each processing purpose
  • Sensitive PI consent obtained separately and explicitly
  • Children's (under 14) personal information identified — parental consent mechanism implemented
  • Privacy notice prepared in Mandarin Chinese with all required disclosures
  • Data subject rights procedures documented (access, correction, deletion, portability, withdrawal)
  • Cross-border transfer assessment completed — mechanism determined (CAC assessment, SCC, or certification)
  • PIPIA conducted for all cross-border transfers (mandatory for SCC mechanism)
  • CAC SCC filed with provincial CAC within 10 days (if SCC mechanism used)
  • CIIO determination completed — data localisation implemented if applicable
  • Large-scale processor obligations assessed (10M+ users threshold)
  • PIPO designated if applicable (large-scale processor)
  • Third-party processor agreements comply with PIPL Chapter II
  • Security measures implemented: encryption, access control, monitoring
  • Breach notification procedure documented (immediate response)
  • Automated decision-making transparency and opt-out mechanisms implemented

Frequently Asked Questions

What makes China's PIPL cross-border transfer requirements so challenging?

Three factors: (1) Mandatory CAC security assessment for large-scale transfers — the assessment process is lengthy (60+ working days) and requires extensive documentation including risk assessments; (2) Even for smaller transfers using standard contracts, a PIPIA must be completed and the contract filed with the CAC within 10 days of signing; (3) The data volumes triggering the mandatory assessment (100,000 individuals/year) are easily exceeded by medium-sized businesses. Multinationals with China operations effectively must have dedicated PIPL compliance programmes for cross-border data flows.

How does PIPL apply to businesses without physical presence in China?

Article 3(2) applies PIPL to overseas processors providing products or services to individuals in China, or analysing the behaviour of individuals in China. Article 53 requires such processors to designate a representative entity or individual within China and report contact details to competent authorities. Practically, any overseas website with substantial Chinese traffic, any app with Chinese users, or any analytics platform processing Chinese consumer data must comply with PIPL — including the China representative requirement.

What is the CAC security assessment process like in practice?

The CAC security assessment involves submitting a detailed application through the provincial-level CAC (for most businesses) or the national CAC (for CIIOs). Required documents include: the data export security assessment self-assessment report, the PI export contract, PIPIA report, and other supporting materials. The assessment covers: whether the data export purpose and method complies with law; whether the overseas recipient's country has adequate protection; risks to individual rights from the transfer; and adequacy of contractual protections. Assessment takes 60 working days (extendable to 90 for complex cases). Many multinational companies have found this process to take 6–12 months in practice.

How does PIPL interact with China's Data Security Law (DSL)?

PIPL and DSL work in tandem. PIPL focuses on personal information protection. DSL governs all data (including non-personal data) based on national security and economic importance, with a tiered classification system from "general data" to "core state data." The DSL requires all data processing to comply with data classification requirements, critical data processing restrictions, and cross-border transfer rules for "important data." Critical data (重要数据) has its own cross-border transfer assessment requirements under DSL. Multinational companies in China must assess compliance under both PIPL (for personal data) and DSL (for all data including commercial data that is classified as critical).

Are there industry-specific PIPL requirements?

Yes. Several sector regulators have issued PIPL-aligned or supplementary regulations: the People's Bank of China (PBOC) has financial data protection and transmission requirements; the National Health Security Administration (NHSA) regulates health data; the Ministry of Industry and Information Technology (MIIT) regulates mobile app data collection with specific lists of prohibited data collection practices. The TC260 (National Information Security Standardization Technical Committee) has issued GB/T 35273 (Personal Information Security Specification) as a voluntary but widely-referenced technical standard. Sector-regulated entities must comply with both PIPL and their sector-specific requirements.


Next Steps

China's PIPL is among the world's most demanding data protection frameworks, particularly for cross-border data operations. The combination of consent-first processing, strict cross-border transfer mechanisms, data localisation for CIIOs, and active CAC enforcement makes PIPL compliance a board-level risk for any organisation with significant China exposure.

ECOSIRE's team can help you design PIPL-compliant data architectures, implement consent management for Chinese users, conduct PIPIAs, and navigate the cross-border transfer mechanism selection process.

Get started: ECOSIRE Services

Disclaimer: This guide is for informational purposes only and does not constitute legal advice. China's data protection regulatory landscape is evolving rapidly. Consult qualified China-licensed legal counsel for advice specific to your organisation and activities.

E

Written by

ECOSIRE Research and Development Team

Building enterprise-grade digital products at ECOSIRE. Sharing insights on Odoo integrations, e-commerce automation, and AI-powered business solutions.

Chat on WhatsApp