{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T10:07:42Z","timestamp":1777284462041,"version":"3.51.4"},"reference-count":102,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2022,8,25]],"date-time":"2022-08-25T00:00:00Z","timestamp":1661385600000},"content-version":"vor","delay-in-days":236,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["016.Vidi.185.200"],"award-info":[{"award-number":["016.Vidi.185.200"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,28]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Over the past 5 years, the People\u2019s Republic of China has accelerated efforts to establish a legal architecture for data protection. With the promulgation of the Personal Information Protection Law (PIPL) and the Data Security Law (DSL) in the summer of 2021, the first phase of these efforts have been concluded. These will have a significant impact on data flows within China, but also merit foreign attention. They provide a new approach to data protection to be subjected to comparative analysis, and may influence the development of data protection legislation in other states, particularly those with close digital connections to China. Doing so requires a greater understanding of how this legislation is shaped by the Chinese political and economic context. Drawing on a thorough review of government documents, supplemented by Chinese-language academic sources, this article reviews the evolution of the two pillars of China\u2019s data protection architecture, from the early stage of fragmentation via the promulgation of the Cybersecurity Law in 2016, up to the present day. It finds that the PIPL and its attendant regulations serve to primarily regulate the relationship between large technology companies and consumers, as well as prevent cyber crime. It does not create meaningful constraints on data collection and use by the state. Even so, the PIPL bears a clear family resemblance to personal data protection regimes elsewhere in the world. In contrast, the DSL is a considerable innovation, attempting to prevent harm to national security and the public interest inflicted through data-enabled means. While implementing structures for this Law remain under construction, it will likely herald a thorough reorganization of the way through which data is collected, stored, and managed within all kinds of Chinese actors.<\/jats:p>","DOI":"10.1093\/cybsec\/tyac011","type":"journal-article","created":{"date-parts":[[2022,8,25]],"date-time":"2022-08-25T02:17:19Z","timestamp":1661393839000},"source":"Crossref","is-referenced-by-count":66,"title":["China\u2019s emerging data protection framework"],"prefix":"10.1093","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8803-4971","authenticated-orcid":false,"given":"Rogier","family":"Creemers","sequence":"first","affiliation":[{"name":"Leiden Institute for Area Studies, Leiden University , Matthias De Vrieshof 3, Leiden, Zuid Holland, The Netherlands"}]}],"member":"286","published-online":{"date-parts":[[2022,8,24]]},"reference":[{"key":"2022121515104837500_bib1","volume-title":"China's Proposed Personal Information Protection Act","author":"Greenleaf","year":"2008"},{"key":"2022121515104837500_bib2","volume-title":"The Data Protection Regime in China","author":"De\u00a0Hert","year":"2005"},{"key":"2022121515104837500_bib3","first-page":"49","article-title":"China's approach on data privacy flaw: a third way between the US and the EU?","volume":"8","author":"Pernot-Leplay","year":"2020","journal-title":"Penn State J Law Int Aff"},{"key":"2022121515104837500_bib4","doi-asserted-by":"crossref","first-page":"1191","DOI":"10.1093\/grurint\/ikaa136","article-title":"How comprehensive is Chinese data protection law? A systematisation of Chinese data protection law from a European perpective","volume":"69","author":"Geller","year":"2020","journal-title":"GRUR Int"},{"key":"2022121515104837500_bib5","doi-asserted-by":"crossref","first-page":"535","DOI":"10.21552\/edpl\/2018\/4\/19","article-title":"Information security technology - personal information security specification: China's version of the GDPR","volume":"4","author":"Han","year":"2018","journal-title":"Eur Data Prot Law Rev"},{"key":"2022121515104837500_bib6","article-title":"Evolving legal frameworks for protecting the right to Internet privacy in China","volume-title":"China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain","author":"Xu","year":"2015"},{"key":"2022121515104837500_bib7","article-title":"Zhou Hanhua: Geren xinxi baohu guannian yanbian de sige jieduan [Zhou Hanhua: the four stages of the evolution of personal information protection concepts]","author":"Zhou","year":"2018"},{"key":"2022121515104837500_bib8","article-title":"Geren xinxi anquan guifan zhende bi Oumeng yu Meiguo geng yange ma? [Is the national standard \u201cPersonal Information Security Standard\u201d really stricter than the EU and the US?","author":"Hong","year":"2018"},{"key":"2022121515104837500_bib9","first-page":"5","article-title":"Ren'gequanfa de xin fazhan yu woguo minfadian ren'gequanbian de wanshan [New developments in human dignity law and the completion of the human dignity chapter in our country's Civil Code","volume":"6","author":"Wang","year":"2019","journal-title":"Zhejiang Univ Ind Commer J"},{"key":"2022121515104837500_bib10","article-title":"Puzzling observations in Chinese law: when is a riddle just a mistake","volume-title":"Understanding China's Legal System","author":"Clarke","year":"2003"},{"key":"2022121515104837500_bib11","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1093\/ajcl\/avy016","article-title":"Data protection in the United States","volume":"66","author":"Boyne","year":"2018","journal-title":"Am J Comp Law"},{"key":"2022121515104837500_bib12","doi-asserted-by":"crossref","first-page":"97","DOI":"10.9785\/cri-2018-190402","article-title":"Data privacy legislation in the European Union member states - a practical overview","volume":"19","author":"Pohle","year":"2018","journal-title":"Comput Law Rev Int"},{"key":"2022121515104837500_bib13","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s10676-005-0456-y","article-title":"Privacy and data privacy issues in ccntemporary China","volume":"7","author":"L\u00fc","year":"2005","journal-title":"Ethics Inf Technol"},{"key":"2022121515104837500_bib14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-21750-0","volume-title":"Protecting Privacy in China: A Research on China's Privacy Standards and the Possibility of Establishing the Right to Privacy and the Information Privacy Protection legislation in Modern China","author":"Wang","year":"2011"},{"key":"2022121515104837500_bib15","article-title":"The privilege of speech and new media: conceptualizing China's communications law in the Internet era","volume-title":"The Internet, Social Media and a Changing China","author":"Creemers","year":"2014"},{"key":"2022121515104837500_bib16","doi-asserted-by":"crossref","DOI":"10.1017\/9781108864596.003","article-title":"Party ideology and Chinese law","volume-title":"Law and the Party in China: Ideology and organisation","author":"Creemers","year":"2020"},{"key":"2022121515104837500_bib17","article-title":"Order and law in China","author":"Clarke","year":"2020"},{"key":"2022121515104837500_bib18","first-page":"950","article-title":"A constitution without constitutionalism? The paths of constitutional development in China","volume":"8","author":"Zhang","year":"2010","journal-title":"Int J Const Law"},{"key":"2022121515104837500_bib19","article-title":"Shisanwu guojia xinxihua guihua [Thirteenth Five-Year Plan for National Informatization]","author":"State Council","year":"2016"},{"key":"2022121515104837500_bib20","article-title":"Guojia wangluo kongjian anquan zhanl\u00fce [National Cyberspace Security Strategy]","author":"Cyberspace Administration of China","year":"2022"},{"key":"2022121515104837500_bib21","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1177\/0097700421993392","article-title":"Xi Jinping confronts the network society","volume":"48","author":"Lynch","year":"2022","journal-title":"Mod Chin"},{"key":"2022121515104837500_bib22","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1093\/cjip\/poab005","article-title":"Securitization of artificial intelligence in China","volume":"14","author":"Zeng","year":"2021","journal-title":"Chin J Int Polit"},{"key":"2022121515104837500_bib23","first-page":"265","article-title":"The \u201cgolden projects\u201d: China's national networking initiative","volume":"5","author":"Lovelock","year":"1996","journal-title":"Inf Infrastruct Pol"},{"key":"2022121515104837500_bib24","article-title":"National Development and Reform Commission Shisiwu tuijin guojia zhengwu xinxihua guihua [14th Five-Year Plan for National Governmental Informatization]","author":"DigiChina","year":"2021"},{"key":"2022121515104837500_bib25","article-title":"Zhonghua Renmin Gongheguo jisuansji xinxi xitong anquan baohu tiaoli [Computer Information System Security Protection Regulations of the People's Republic of China]","author":"State Council","year":"1994"},{"key":"2022121515104837500_bib26","article-title":"Guanyu jiaqiang xinxi anquan baozhang gongzuo de yijian [Opinions concerning Strengthening Information Security Protection]","author":"National Information Security Standardization Technical Committee","year":"2003"},{"key":"2022121515104837500_bib27","article-title":"Guanyu xinxi anquan dengji baohu gongzuo de shishi yijian [Implementation Opinions concerning the Information Security Multi-Level Protection System]","author":"Ministry of Public Security","year":"2004"},{"key":"2022121515104837500_bib28","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1093\/slr\/18.3.208","article-title":"The right to privacy: an emerging right in Chinese law","volume":"18","author":"Zhu","year":"1997","journal-title":"Statut Law Rev"},{"key":"2022121515104837500_bib29","volume-title":"Geren xinxi baohu fa (zhuanjia jianyi gao) ji lifa yanjiu baogao [Personal Information Protection Law (Experts Suggestion Draft) and Legislative Research Report]","author":"Zhou","year":"2006"},{"key":"2022121515104837500_bib30","article-title":"Zhonghua Renmin Gongheguo xingfa xiuzheng an [Amendments to the Criminal Law of the People's Republic of China","author":"Standing Committee of the National People's Congress","year":"2009"},{"key":"2022121515104837500_bib31","article-title":"Zuohao geren jinrong xinxi baohu gonzuo de tongzhi [Notice on Doing Well in the Protection of Personal Financial Information","author":"People's Bank of China","year":"2011"},{"key":"2022121515104837500_bib32","article-title":"Guifan hulianwang xinxi fuwu shichang chengxu ruogan guiding [Some Provisions to Standardize Internet Information Service Market Order]","author":"Ministry of Industry and Information Technology","year":"2011"},{"key":"2022121515104837500_bib33","volume-title":"Xinxi anquan jishu gonggong ji shangyong fuwu xinxi xitong geren xinxi baohu zhinan [Information security technology - Guideline for personal information protection within information system for public and commercial services]","author":"National Information Security Standardization Technical Committee","year":"2012"},{"key":"2022121515104837500_bib34","article-title":"Law of the People's Republic of China on Protection of Minors","author":"Standing Committee of the National People's Congress","year":"1991"},{"key":"2022121515104837500_bib35","doi-asserted-by":"crossref","first-page":"645","DOI":"10.26686\/vuwlr.v36i3.5610","article-title":"Protecting the right to privacy in China","volume":"36","author":"Cao","year":"2005","journal-title":"Vic Univ Wellingt Law Rev"},{"key":"2022121515104837500_bib36","first-page":"68","article-title":"Lun geren xinxiquan zai rengequanfa zhong de diwei [On the Status of Personal Information Right in the Law of Personality Rights]","volume":"6","author":"Wang","year":"2012","journal-title":"J Soochow Univ Philos Soc Sci"},{"key":"2022121515104837500_bib37","article-title":"Tort Law of the People's Republic of China","author":"Standing Committee of the National People's Congress","year":"2009"},{"key":"2022121515104837500_bib38","article-title":"China's cyber governance institutions. LeidenAsiaCentre Report","author":"Creemers","year":"2022"},{"key":"2022121515104837500_bib39","article-title":"Di 47 ci Zhongguo hulianwangluo fazhan zhuankuang tongji baogao [47th Statistical report on the development situation of the Internet in China]","author":"CNNIC","year":"2022"},{"key":"2022121515104837500_bib40","volume-title":"AI Superpowers: China, Silicon Valley, and the New World Order","author":"Lee","year":"2018"},{"key":"2022121515104837500_bib41","article-title":"Cujin dashuju fazhan xingdong gangyao [Outline of operations to stimulate the development of big data]","author":"State Council","year":"2022"},{"key":"2022121515104837500_bib42","article-title":"Wangshang \u201cheishi\u201d: nide simi xinxi jishi yuan jiu neng chadao [Online \u201cBlack Markets\u201d: your intimate information can be found for some tenners)","author":"Xinhuanet","year":"2017"},{"key":"2022121515104837500_bib43","article-title":"Shei maile nide yinsi? Cheqi yonghu mingan xinxi shiluo diaocha [Who sold your privacy? An investigation of sensitive information leaks of vehicle company users]","volume":"7","author":"Li","year":"2015","journal-title":"Xiaofeizhe baodao (Consumer Report)"},{"key":"2022121515104837500_bib44","article-title":"Apple customer data in China was sold illegally, police say","author":"Mozur","year":"2017"},{"key":"2022121515104837500_bib45","article-title":"The legal protection over personal information in China","author":"Shu","year":"2015"},{"key":"2022121515104837500_bib46","article-title":"Data dump: Chinas sees surge in personal information up for sale","author":"Tham","year":"2018"},{"key":"2022121515104837500_bib47","first-page":"380","article-title":"Personal data protection: rethinking the reasons, nature, and legal framework","volume":"13","author":"Ding","year":"2018","journal-title":"Front Law Chin"},{"key":"2022121515104837500_bib48","first-page":"343","article-title":"Online fraud victimization in China: a case study of Baidu Tieba, victims & offenders","volume":"13","author":"Lee","year":"2021","journal-title":"Int J Evid Based Res Pol Pract"},{"key":"2022121515104837500_bib49","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1080\/15614263.2018.1507895","article-title":"Characteristics of cybercrimes: evidence from Chinese judgment documents","volume":"19","author":"Cai","year":"2018","journal-title":"Police Pract Res"},{"key":"2022121515104837500_bib50","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1080\/17544750.2019.1649289","article-title":"China's data localization","volume":"13","author":"Liu","year":"2020","journal-title":"Chin J Commun"},{"key":"2022121515104837500_bib51","article-title":"Shuju chujing anquan pinggu: Baohu jichuxing zhanl\u00fce ziyuan de zhongyao yihuan [Data outbound security assessment: An important part of protecting basic strategic resources]","volume":"06","author":"Hong","year":"2017"},{"key":"2022121515104837500_bib52","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.4070682","article-title":"China's cybersecurity regime: Securing the smart state","author":"Creemers","year":"2022"},{"key":"2022121515104837500_bib53","article-title":"Shuzi jingji shiye zhong de Oumeng \u201cyiban shuju baohu tiaoli\u201d [EU General Data Protection Regulation in the Perspective of Digital Economy]","author":"Tencent Research Institute","year":"2018"},{"key":"2022121515104837500_bib54","article-title":"Quanguo renmin daibiao dahui changwu weiyuanhui guanju jiaqiang wangluo xinxi baohu de jueding [National People's Congress Standing Committee Decision concerning Strengthening Network Information Protection]","author":"Standing Committee of the National People's Congress","year":"2012"},{"key":"2022121515104837500_bib55","article-title":"Zuigao renmin fayuan zuigao renmin jianchayuan gong\u2019anbu guanyu yifa chengchu qinhai gongmin geren xinxi fanzui huodong de tongzhi [Notice concerning Punishing Criminal Activities Infringing Citizens\u2019 Personal Data]","author":"Ministry of Public Security","year":"2013"},{"key":"2022121515104837500_bib56","article-title":"Zhonghua renmin gongheguo xingfa (2015 xiuzheng) [Criminal Law of the People's Republic of China (2015 Revision)]","author":"National People's Congress","year":"2015"},{"key":"2022121515104837500_bib57","article-title":"Dianxin he hulianwang yonghu geren xinxi baohu guiding [Telecommunications and Internet Personal User Data Protection Regulations]","author":"Ministry of Industry and Information Technology","year":"2013"},{"key":"2022121515104837500_bib58","article-title":"Zhonghua renmin gongheguo xiaofeizhe quanyi baohufa [Consumer Rights Protection Law of the People's Republic of China]","author":"Standing Committee of the National People's Congress","year":"2013"},{"key":"2022121515104837500_bib59","article-title":"Fan kongbuzhuyifa cao'an [Anti-Terrorism Law (Draft)]","author":"National People's Congress","year":"2014"},{"key":"2022121515104837500_bib60","article-title":"Zhonghua renmin gongheguo wangluo anquan fa [Cybersecurity Law of the People's Republic of China]","author":"National People's Congress","year":"2016"},{"key":"2022121515104837500_bib61","first-page":"66","article-title":"Ping \u201cwangluo anquan fa\u201d dui shuju anquan baohu zhi de yu shi [On the Gain and Loss of Cybersecurity Law of China on Data Protection","volume":"1","author":"Hong","year":"2017","journal-title":"Zhengce Pinglun (Pol Rev)"},{"key":"2022121515104837500_bib62","doi-asserted-by":"crossref","first-page":"711","DOI":"10.2307\/840631","article-title":"Sources of order in Chinese law","volume":"42","author":"Keller","year":"1994","journal-title":"Am J Compar Law"},{"key":"2022121515104837500_bib63","article-title":"Zhongguo hulianwang guanli jiang dapo \u2018jiulong zhishui\u2019 geju [The situation of \u201cnine dragons governing the water\u201d in China's Internet management will be smashed]","author":"Xinhuanet","year":"2014"},{"key":"2022121515104837500_bib64","article-title":"Guanxian xinxi jichu sheshi anquan baohu tiaoli [Critical Information Infrastructure Security Protection Regulations]","author":"Cyberspace Administration of China","year":"2017"},{"key":"2022121515104837500_bib65","article-title":"Guanyu \u201cgeren xinxi he zhongyao shuju chujing anquan pinggu banfa\u201d gongkai zhengqiu yijian de tongzhi [Notice on the Public Consultation on the \u201cMeasures for the Security Evaluation of the Exit of Personal Information and Important Data\u201d]","author":"Cyberspace Administration of China","year":"2017"},{"key":"2022121515104837500_bib66","article-title":"Xinxi anquan jishu shuju chujing anquan pinggu zhinan [Information Security Technology - Guidelines for Data Cross-border Transfer Security Assessment]","author":"Standardization Administration of China","year":"2017"},{"key":"2022121515104837500_bib67","article-title":"Communication From the United States - Measures adopted by China relating to its cybersecurity law","author":"United States Trade Representative","year":"2017"},{"key":"2022121515104837500_bib68","article-title":"Kanqing APEC \u201ckuajing yinsi baohu guize\u201d tixi beihou de zhengzhi he jingji [Clearly see the politics and economics behind the APEC \u201cCross-border Privacy Protection Rules\u201d system]","author":"Hong","year":"2017"},{"key":"2022121515104837500_bib69","article-title":"Beyond the worst-case assumptions on China's Cybersecurity Law","author":"Sacks","year":"2017"},{"key":"2022121515104837500_bib70","article-title":"Guanyu \u201cgeren xinxi chujing anquan pinggu banfa\u201d gongkai zhengqiu yijian de tongzhi [Notice on publicly soliciting opinions on the \u201cPersonal Information Outbound Transfer Security Assessment Measures\u201d]","author":"Cyberspace Administration of China","year":"2019"},{"key":"2022121515104837500_bib71","article-title":"Shuju anquan guanli banfa (zhengqiu yijian gao [Data security management measures (Draft for comment)]","author":"Cyberspace Administration of China","year":"2019"},{"key":"2022121515104837500_bib72","article-title":"Public security ministry aligns with Chinese data protection regime in draft rules","author":"Sacks","year":"2018"},{"key":"2022121515104837500_bib73","article-title":"Wangluo anquan dengji baohu tiaoli (zhengqiu yijian gao) [Regulations on Graded Cyber Security Protection (Draft for solicitation of comments)]","author":"Ministry of Public Security","year":"2018"},{"key":"2022121515104837500_bib74","article-title":"Ertong geren xinxi wangluo baohu [Regulations on the Protection of Children's Personal Information Online]","author":"Cyberspace Administration of China","year":"2022"},{"key":"2022121515104837500_bib75","article-title":"Xinxi anquan jishu geren xinxi Anquan guifan [Information Security Technology\u2014Personal Information Security Specification]","author":"National Information Security Standardization Technical Committee","year":"2017"},{"key":"2022121515104837500_bib76","article-title":"Xinxi anquan jishu geren xinxi anquan yingxiang pinggu [Principles and criteria from China's Draft Privacy Impact Assessment Guide]","author":"National Information Security Standardization Technical Committee","year":"2022"},{"key":"2022121515104837500_bib77","article-title":"Geren xinxi baohu changyi shu [Proposal on Personal Information Protection]","author":"Internet Society of China","year":"2018"},{"key":"2022121515104837500_bib78","article-title":"Nide geren xinxi anquan ma? [Is your personal information safe?]","author":"Wang","year":"2018"},{"key":"2022121515104837500_bib79","article-title":"What the Facebook scandal means in a land without Facebook: A look at China's burgeoning data protection regime","author":"Lu","year":"2018"},{"key":"2022121515104837500_bib80","article-title":"Zhonghua Renmin Gongheguo dianzi shangwu fa [E-Commerce Law of the People's Republic of China]","author":"National People's Congress","year":"2018"},{"key":"2022121515104837500_bib81","article-title":"App weifa weigui shouji shiyong geren xinxi zi pinggu zhinan [App Self-Assessment Guide for Collecting and Using Personal Information in Violation of Laws and Regulations]","author":"App Working Group","year":"2019"},{"key":"2022121515104837500_bib82","article-title":"Gong'anbu tongbao \u201cJingwang 2019\u201d zhuanxiang xingdong dianxing anli [The Ministry of Public Security announces typical cases of the \u201cNet Net 2019\u201d special action]","author":"Ministry of Public Security","year":"2019"},{"key":"2022121515104837500_bib83","article-title":"Guanyu shuru fa deng 33 kuan app weifa weiguid shouji shiyong geren xinxi qingkuang de tongbao [Notification on the illegal collection and use of personal information in 33 apps including input methods]","author":"Cyberspace Administration of China","year":"2022"},{"key":"2022121515104837500_bib84","article-title":"Changjian leixing yidong hulianwang yingyong chengxu biyao geren xinxi fanwei guiding [Regulations on the Scope of Necessary Personal Information for Common Types of Mobile Internet Applications]","author":"Cyberspace Administration of China","year":"2022"},{"key":"2022121515104837500_bib85","article-title":"Yidong hulianwang yingyong chengxu geren xinxi baohu guanli zanxing guiding [Interim Provisions on the Management of Personal Information Protection of Mobile Internet Applications]","author":"Ministry of Industry and Information Technology","year":"2021"},{"key":"2022121515104837500_bib86","article-title":"What's behind China's regulatory storm?","author":"Naughton","year":"2021"},{"key":"2022121515104837500_bib87","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1162\/isec_a_00383","article-title":"China's grand strategy under Xi Jinping: Reassurance, reform, and resistance","volume":"45","author":"Goldstein","year":"2020","journal-title":"Int Secur"},{"key":"2022121515104837500_bib88","article-title":"Zhonghua Renmin Gongheguo geren xinxi baohu fa [Personal Information Protection Law of the People's Republic of China]","author":"National People's Congress","year":"2021"},{"key":"2022121515104837500_bib89","article-title":"Zhonghua Renmin Gongheguo shuju Anquan fa [Data Security Law of the People's Republic of China]","author":"National People's Congress","year":"2021"},{"key":"2022121515104837500_bib90","article-title":"Shuju anquan guanli shijiao xia de shuju fenlei yanjiu [Research on data classification from the perspective of data security management]","author":"Hong","year":"2020"},{"key":"2022121515104837500_bib91","article-title":"Dui \u201cshuju anquan fa\u201d de lijie he renshi [Understanding and recognition of the \u201cData Security Law\u201d]","author":"Hong","year":"2020"},{"key":"2022121515104837500_bib92","article-title":"Shuju chujing anquan pinggu banfa (zhengqiu yijian gao) [Outbound Data Transfer Security Assessment Measures (Draft for comment))","author":"Cyberspace Administration of China","year":"2021"},{"key":"2022121515104837500_bib93","article-title":"Wangluo shuju anquan guanli tiaoli (zhengqiu yijian gao) [Online Data Security Management Regulations (Draft for comment)]","author":"Cyberspace Administration of China","year":"2021"},{"key":"2022121515104837500_bib94","article-title":"Qiche shuju Anquan guanli ruogan guiding (zhengqiu yijian gao) [Several Provisions on the Management of Automobile Data Security (Draft for comment)]","author":"Cyberspace Administration of China","year":"2021"},{"key":"2022121515104837500_bib95","article-title":"Dui \u201cDidi Chuxing\u201d qidong wangluo anquan shencha de gonggao [Announcement on launching a cybersecurity review of \u201cDidi Travel\u201d]","author":"Cybersecurity Review Office","year":"2021"},{"key":"2022121515104837500_bib96","article-title":"Guanyu xiajia \u201cDidiChuxing\u201d app de tongbao [Announcement on the removal of \u201cDidi Travel\u201d App]","author":"Cyberspace Administration of China","year":"2021"},{"key":"2022121515104837500_bib97","first-page":"589","article-title":"Foreign capital in Chinese telecommunication companies: from the Variable Interest Entity model to the draft of the new Chinese Foreign Investment Law","volume":"4","author":"Santoni","year":"2018","journal-title":"Ital Law J"},{"key":"2022121515104837500_bib98","article-title":"Guanyu dui \u201cYunmanman\u201d \u201cHuochebang\u201d \u201cBoss Zhipin\u201d qidong wangluo anquan shencha de gonggao [Announcement on launching a cybersecurity review of \u201cYunmanman\u201d, \u201cTruck Gang\u201d, and \u201cBoss Direct Appointment\u201d]","author":"Cybersecurity Review Office","year":"2021"},{"key":"2022121515104837500_bib99","article-title":"Wangluo anquan shencha banfa [Cybersecurity review measures]","author":"Cyberspace Administration of China","year":"2021"},{"key":"2022121515104837500_bib100","volume-title":"With auto data, China buckles In for security and opens up for future tech","author":"Schaefer","year":"2021"},{"key":"2022121515104837500_bib101","article-title":"Zhongguo hulianwan qiye xu bushang \u201chegui\u201d qianzhang [Chinese Internet companies need to make up \u201ccompliance\u201d debts]","author":"Fang","year":"2022"},{"key":"2022121515104837500_bib102","article-title":"Zhonghua Renmin Gongheguo minfadian [Civil Code of the People's Republic of China]","author":"National People's Congress","year":"2020"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/8\/1\/tyac011\/47918796\/tyac011.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/8\/1\/tyac011\/47918796\/tyac011.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T23:09:21Z","timestamp":1671145761000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyac011\/6674794"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":102,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1,28]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyac011","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2022,1,1]]},"published":{"date-parts":[[2022,1,1]]},"article-number":"tyac011"}}