Translation: Cybersecurity Review Measures (Revised, Draft for Comment) – July 2021

Published

July 12, 2021

Last revised

October 14, 2021

Published

July 12, 2021

Last revised

October 14, 2021


The Cyberspace Administration of China on July 10, 2021, released a draft revision to the existing Cybersecurity Review Measures, with public comments on the revision due July 25. 

The following translation indicates changes compared to the previous version in bold italics, with substantive deletions labeled [DELETED: and in brackets]. This translation is based on DigiChina’s translation of the existing Cybersecurity Review Measures, by Lauren Dudley, Graham Webster, Rogier Creemers, and Elsa Kania. The changes were translated by Rogier Creemers and edited by Graham Webster.

Cybersecurity Review Measures (Revised, Draft for Comment)

Article 1: In order to ensure critical information infrastructure (CII) supply chain security and defend national security, in accordance with the “National Security Law of the People’s Republic of China,” the “Cybersecurity Law of the People’s Republic of China” and the “Data Security Law of the People’s Republic of China,” these measures are formulated.

Article 2: Critical information infrastructure operators (hereinafter referred to as operators) procuring network products and services and data handlers (hereinafter referred to as operators) conducting data handling activities that influence or may influence national security should conduct a cybersecurity review according to these measures.

Article 3: Cybersecurity reviews persist in the integration of preventing cybersecurity risks and the application of advanced technology; the integration of a fair and transparent process and the protection of intellectual property rights; the integration of prior review and ongoing supervision; and the integration of enterprise commitment and social supervision; and they conduct reviews on aspects such as the security of products and services and the national security risks they could bring about.

Article 4: Under the leadership of the Central Commission for Cybersecurity and Informatization, the Cyberspace Administration of China, with the National Development and Reform Commission of the People’s Republic of China, the Ministry of Industry and Informatization of the People’s Republic of China, the Ministry of Public Security of the People’s Republic of China, the Ministry of State Security of the People’s Republic of China, the Ministry of Finance of the People’s Republic of China, the Ministry of Commerce of the People’s Republic of China, the People’s Bank of China, the State Administration for Market Regulation, the National Radio and Television Administration, the China Securities Regulatory Commission, the National Administration of State Secrets Protection, and the State Encryption Management Bureau, establishes the cybersecurity review work mechanism.

The Cybersecurity Review Office resides in the Cyberspace Administration of China with the responsibility of formulating cybersecurity review systems and standards and organizing cybersecurity reviews.

Article 5: Operators that purchase network products and services shall anticipate the potential national security risk of products and services after they enter operation. If they influence or could influence national security, a cybersecurity review shall be reported to the Cybersecurity Review Office.

CII protection work departments may formulate guidelines [for anticipating risk] in their industry or sector.

Article 6: Operators holding the personal information of more than 1 million users and newly listing on foreign markets must report for cybersecurity review with the Cybersecurity Review Office.

Article 7: Regarding purchasing activities that are to undergo cybersecurity review, operators should require product and service providers to cooperate with the cybersecurity review through procurement documents or agreements, etc., including a commitment not to exploit the supply of products and services as a convenient way to illegally gain access to user data, illegally control and operate user equipment, or break off product supply or necessary technical support without reasonable grounds.

Article 8: Operators submitting to a cybersecurity review should submit the following materials:

  1. A written declaration;
  2. An analytic report on the influence or possible influence on national security;
  3. A procurement document, agreement, contract to be signed, IPO materials prepared for submission, etc.;
  4. Other materials required for cybersecurity review work.

Article 9: The Cybersecurity Review Office shall determine whether a review is needed and provide written notice to the operator within 10 working days of receiving the review declaration materials.

Article 10: The cybersecurity review process focuses on assessing the potential national security risks brought about by procurement activities, data processing activities as well as foreign listings, mainly considering the following factors:

  1. The risk that the use of products and services could bring about the illegal control of, interference with, or destruction of CII [DELETED: , as well as the theft, leak, or damage of important data];
  2. The harm to CII business continuity of product and service supply disruptions;
  3. The security, openness, transparency, and diversity of sources of products and services; the reliability of supply channels, as well as the risk of supply disruptions due to political, diplomatic, and trade factors;
  4. Product and service providers’ compliance with Chinese national laws, regulations, and department rules;
  5. The risk that core data, important data or large amounts of personal information are stolen, leaked, damaged, or illegally used or exported;
  6. The risk that after foreign listing, CII, core data, important data, or large amounts of personal information are affected, controlled, or maliciously used by foreign governments;
  7. Other factors that could harm CII security and national data security.

Article 11: If the Cybersecurity Review Office deems it necessary to launch a cybersecurity review, it shall complete a preliminary review within 30 working days of issuing written notice to the operator, including forming suggested review conclusions and transmitting them to the cybersecurity review work mechanism member units and relevant CII protection work departments for opinions. In cases involving complex situations, the review may be extended an additional 15 working days.

Article 12: The cybersecurity review working mechanism member units and relevant CII protection work departments should respond with their opinions in writing within 15 days of receiving the suggested review conclusion.

If the member units of the cybersecurity review mechanism and relevant CII protection work departments are in agreement, the Cybersecurity Review Office will formally notify the operator of the review conclusion in writing. If the opinions are inconsistent, the special review procedures shall be followed and the operator shall be notified.

Article 13: In accordance with the special review procedures, the Cybersecurity Review Office, after listening to the opinions of relevant departments and units, conducting an in-depth analysis and evaluation, once again forming a review conclusion and recommendation, soliciting the opinions of the cybersecurity review mechanism member units [DELETED: and relevant CII protection work departments], and reporting to the Central Commission for Cybersecurity and Informatization for approval according to procedure, shall form the conclusion of the review and notify the operator in writing.

Article 14: The special review procedure should generally be completed within three months [DELETED: 45 working days]; if the situation is complicated, it can be extended appropriately.

Article 15: If the Cybersecurity Review Office requests the provision of supplementary materials, operators and product and service providers shall cooperate. The time for submitting supplementary materials is not included in the review time.

Article 16: Network products and services, data handling activities, and foreign listing activities that the cybersecurity review work mechanism member units believe affect or could affect national security shall, after being submitted to the Central Commission for Cybersecurity and Informatization for approval, be reviewed by the Cybersecurity Review Office in accordance with the provisions of these Measures.

Article 17: Relevant institutions and personnel involved in cybersecurity review shall strictly protect enterprises’ business secrets and intellectual property rights, and shall undertake confidentiality obligations for the unpublished materials submitted by operators and product and service providers, and other unpublished information learned during review work; without the consent of the information provider, it may not be disclosed to unrelated parties or used for purposes other than review.

Article 18: If an operator or a provider of network products and services believes that the review personnel are unfair and impartial, or that they fail to undertake the obligation of confidentiality of information learned during the review, they may report to the Cybersecurity Review Office or relevant department.

Article 19: Operators shall urge product and service providers to fulfill the commitments made in the cybersecurity review.

The Cybersecurity Review Office strengthens pre-event, in-progress, and post-event supervision by accepting reports and other forms.

Article 20: Operators who violate the provisions of these Measures shall be dealt with in accordance with the provisions of [DELETED: Article 65 of] the “Cybersecurity Law of the People’s Republic of China” and the “Data Security Law of the People’s Republic of China.”

Article 21: In these Measures, “critical information infrastructure operators” refers to operators designated by CII protection work departments.

The “network products and services” mentioned in these Measures primarily refer to core network equipment, important telecommunications products, high-performance computers and servers, large-capacity storage devices, large-scale databases and application software, cybersecurity equipment, cloud computing services, and other important network products and services that have important influence on the security of CII.

Article 22: Where information related to state secrets is involved, the relevant national secrecy protection provisions apply.

Article 23: These Measures take effect on month day, 2021, and the “Network Product and Service Security Review Measures (Trial)” will be abolished at the same time.

Chinese-language original

Captured July 12, 2021

网络安全审查办法

(修订草案征求意见稿)

第一条 为了确保关键信息基础设施供应链安全,维护国家安全,依据《中华人民共和国国家安全法》《中华人民共和国网络安全法》《中华人民共和国数据安全法》,制定本办法。

第二条 关键信息基础设施运营者(以下简称运营者)采购网络产品和服务,数据处理者(以下称运营者)开展数据处理活动,影响或可能影响国家安全的,应当按照本办法进行网络安全审查。

第三条 网络安全审查坚持防范网络安全风险与促进先进技术应用相结合、过程公正透明与知识产权保护相结合、事前审查与持续监管相结合、企业承诺与社会监督相结合,从产品和服务安全性、可能带来的国家安全风险等方面进行审查。

第四条 在中央网络安全和信息化委员会领导下,国家互联网信息办公室会同中华人民共和国国家发展和改革委员会、中华人民共和国工业和信息化部、中华人民共和国公安部、中华人民共和国国家安全部、中华人民共和国财政部、中华人民共和国商务部、中国人民银行、国家市场监督管理总局、国家广播电视总局、中国证券监督管理委员会、国家保密局、国家密码管理局建立国家网络安全审查工作机制。

网络安全审查办公室设在国家互联网信息办公室,负责制定网络安全审查相关制度规范,组织网络安全审查。

第五条 运营者采购网络产品和服务的,应当预判该产品和服务投入使用后可能带来的国家安全风险。影响或者可能影响国家安全的,应当向网络安全审查办公室申报网络安全审查。

关键信息基础设施保护工作部门可以制定本行业、本领域预判指南。

第六条 掌握超过100万用户个人信息的运营者赴国外上市,必须向网络安全审查办公室申报网络安全审查。

第七条 对于申报网络安全审查的采购活动,运营者应通过采购文件、协议等要求产品和服务提供者配合网络安全审查,包括承诺不利用提供产品和服务的便利条件非法获取用户数据、非法控制和操纵用户设备,无正当理由不中断产品供应或必要的技术支持服务等。

第八条 运营者申报网络安全审查,应当提交以下材料:

(一)申报书;

(二)关于影响或可能影响国家安全的分析报告;

(三)采购文件、协议、拟签订的合同或拟提交的IPO材料等;

(四)网络安全审查工作需要的其他材料。

第九条 网络安全审查办公室应当自收到审查申报材料起,10个工作日内确定是否需要审查并书面通知运营者。

第十条 网络安全审查重点评估采购活动、数据处理活动以及国外上市可能带来的国家安全风险,主要考虑以下因素:

(一)产品和服务使用后带来的关键信息基础设施被非法控制、遭受干扰或破坏的风险;

(二)产品和服务供应中断对关键信息基础设施业务连续性的危害;

(三)产品和服务的安全性、开放性、透明性、来源的多样性,供应渠道的可靠性以及因为政治、外交、贸易等因素导致供应中断的风险;

(四)产品和服务提供者遵守中国法律、行政法规、部门规章情况;

(五)核心数据、重要数据或大量个人信息被窃取、泄露、毁损以及非法利用或出境的风险;

(六)国外上市后关键信息基础设施,核心数据、重要数据或大量个人信息被国外政府影响、控制、恶意利用的风险;

(七)其他可能危害关键信息基础设施安全和国家数据安全的因素。

第十一条 网络安全审查办公室认为需要开展网络安全审查的,应当自向运营者发出书面通知之日起30个工作日内完成初步审查,包括形成审查结论建议和将审查结论建议发送网络安全审查工作机制成员单位、相关关键信息基础设施保护工作部门征求意见;情况复杂的,可以延长15个工作日。

第十二条 网络安全审查工作机制成员单位和相关关键信息基础设施保护工作部门应当自收到审查结论建议之日起15个工作日内书面回复意见。

网络安全审查工作机制成员单位、相关关键信息基础设施保护工作部门意见一致的,网络安全审查办公室以书面形式将审查结论通知运营者;意见不一致的,按照特别审查程序处理,并通知运营者。

第十三条 按照特别审查程序处理的,网络安全审查办公室应当听取相关部门和单位意见,进行深入分析评估,再次形成审查结论建议,并征求网络安全审查工作机制成员单位和相关部门意见,按程序报中央网络安全和信息化委员会批准后,形成审查结论并书面通知运营者。

第十四条 特别审查程序一般应当在3个月内完成,情况复杂的可以延长。

第十五条 网络安全审查办公室要求提供补充材料的,运营者、产品和服务提供者应当予以配合。提交补充材料的时间不计入审查时间。

第十六条 网络安全审查工作机制成员单位认为影响或可能影响国家安全的网络产品和服务、数据处理活动以及国外上市行为,由网络安全审查办公室按程序报中央网络安全和信息化委员会批准后,依照本办法的规定进行审查。

第十七条 参与网络安全审查的相关机构和人员应严格保护企业商业秘密和知识产权,对运营者、产品和服务提供者提交的未公开材料,以及审查工作中获悉的其他未公开信息承担保密义务;未经信息提供方同意,不得向无关方披露或用于审查以外的目的。

第十八条 运营者或网络产品和服务提供者认为审查人员有失客观公正,或未能对审查工作中获悉的信息承担保密义务的,可以向网络安全审查办公室或者有关部门举报。

第十九条 运营者应当督促产品和服务提供者履行网络安全审查中作出的承诺。

网络安全审查办公室通过接受举报等形式加强事前事中事后监督。

第二十条 运营者违反本办法规定的,依照《中华人民共和国网络安全法》《中华人民共和国数据安全法》的规定处理。

第二十一条 本办法中关键信息基础设施运营者是指经关键信息基础设施保护工作部门认定的运营者。

本办法所称网络产品和服务主要指核心网络设备、重要通信产品、高性能计算机和服务器、大容量存储设备、大型数据库和应用软件、网络安全设备、云计算服务,以及其他对关键信息基础设施安全有重要影响的网络产品和服务。

第二十二条 涉及国家秘密信息的,依照国家有关保密规定执行。

第二十三条 本办法自2021年 月 日起实施,《网络产品和服务安全审查办法(试行)》同时废止。

CITED BY

After 5 Years, China’s Cybersecurity Rules for Critical Infrastructure Come Into Focus Citations Icon

Webster, Graham
2021