Our Expert in China
No results available
Last updated: May 13, 2026
China’s cross-border data transfer rules entered a new phase in 2026 with the Certification Measures for the Cross‑Border Transfer of Personal Information taking effect on 1 January, giving data exporters a third lawful route alongside the CAC security assessment and Standard Contractual Clauses (SCCs). At the same time, amendments to the Cybersecurity Law have sharpened enforcement, and sector‑specific guidance, notably the February 2026 automotive data rules, has narrowed the margin of error for connected‑vehicle platforms. Shanghai’s April 2026 cross‑border pilot is already stress‑testing streamlined filing procedures that industry observers expect other cities to adopt.
This guide provides the practical, platform‑level checklist that General Counsel, DPOs, and product leads at CDP/CRM, AI and connected‑vehicle companies need to achieve China data export compliance right now.
Before diving into the detail, here is the priority checklist every compliance team should act on today:
Three overlapping regulatory developments make 2026 a turning point for cross-border data transfer China obligations.
The Cyberspace Administration of China (CAC) finalised the Measures for the Certification of the Cross‑Border Transfer of Personal Information in late 2025, and they came into force on 1 January 2026. For the first time, mid‑scale data exporters, those that fall below the mandatory CAC security assessment thresholds but still transfer PI overseas, have access to a structured, third‑party certification route. An authorised certification body reviews the exporter’s data‑protection practices, PIPIA, and operational controls, and issues a certificate that serves as the lawful basis for the transfer under PIPL Article 38.
Amendments to China’s Cybersecurity Law that took effect in 2026 increased administrative penalties for non‑compliant cross‑border transfers and strengthened the supervisory role of sectoral regulators. Industry observers note that the practical effect is to raise the stakes for platforms that have relied on informal or partial compliance, enforcement is expected to be more granular and more frequent.
Shanghai launched its cross‑border data transfer pilot in April 2026, offering streamlined filing procedures and faster approval timelines for qualifying enterprises. The pilot functions as a regulatory sandbox: companies operating within the pilot zone can test certification and SCC processes with closer CAC engagement. Early indications suggest that the pilot’s lessons will inform national‑level procedural guidance later in the year.
| Date | Measure / Event | Practical Impact |
|---|---|---|
| Mar 23, 2024 | Provisions on Promoting and Regulating the Cross‑Border Flow of Data (promulgation) | Established the framework for facilitating regulated cross‑border flows, including exemptions for certain scenarios. |
| Nov 2025 | Certification Measures finalised (legal commentary) | Firms must choose between certification, SCCs, or CAC assessment; thresholds clarified. |
| Jan 1, 2026 | Certification Measures effective | New certification route becomes available for mid‑scale exporters, affects route selection immediately. |
| Feb 2026 | Automotive / connected‑vehicle guidance (SCIO / State Council) | Automotive data processors required to perform security assessments before transfers, specific to vehicles/telematics. |
| Apr 2026 | Shanghai cross‑border pilot launch | Early‑adopter city pilot, operational testing ground for certification and streamlined filings. |
Choosing the correct lawful route is the single most consequential compliance decision a data exporter makes. The framework under PIPL Article 38 now offers three primary paths, each with distinct eligibility criteria, documentation burdens, and timelines. Use the text‑based decision tree below to determine which route applies to your organisation.
Decision tree (step‑by‑step):
The certification route suits organisations that transfer PI overseas on a meaningful but not massive scale and want an ongoing, auditable compliance mechanism. The process works as follows:
If your organisation meets any of the mandatory thresholds, CIIO status, large‑scale PI processing, or transfers involving important data, you must submit to the CAC security assessment. The process requires:
The likely practical effect of the cybersecurity law 2026 amendments is that CAC reviewers will scrutinise engineering controls more closely than in earlier assessment cycles, documentation alone is no longer sufficient.
For organisations below the mandatory security assessment thresholds, SCCs remain a viable route. The exporter and overseas recipient execute a contract based on the CAC’s standard template, and the exporter files a record with the local provincial‑level cyberspace administration. Key points:
Generic compliance frameworks are not enough for platforms that process high‑velocity, high‑volume personal data. CDP, CRM, and AI pipelines have unique data flows, real‑time event ingestion, model training on behavioural data, cross‑border analytics queries, that require tailored controls. This section provides the operational checklist that product and security teams can act on directly.
Accurate classification is the foundation of every subsequent compliance step. Use the matrix below to categorise the data attributes commonly found in CDP/CRM and AI platforms.
| Data Attribute | Likely Classification | Transfer Route Implication |
|---|---|---|
| Name, phone, email, ID number | Personal Information (PI) | All three routes available (subject to volume thresholds) |
| Biometric data (facial, voiceprint) | Sensitive PI | Heightened PIPIA requirements; may trigger security assessment if volume thresholds met |
| Device identifiers (IDFA, IMEI, MAC) | PI (when linkable to individual) | Standard routes; ensure anonymization where possible |
| Behavioural / clickstream data | PI (when linkable) | Standard routes; aggregation reduces compliance burden |
| Geolocation (precise, continuous) | Sensitive PI | Heightened controls; connected‑vehicle platforms see Section 4 |
| Aggregated / anonymized analytics outputs | Not PI (if truly irreversible) | May fall outside cross‑border transfer restrictions entirely |
| Sector‑classified “important data” | Important Data | Mandatory CAC security assessment; data localization China requirements may apply |
Every PIPL cross-border transfer requires a completed personal information protection impact assessment. The PIPIA is not a one‑time checkbox, it must be updated whenever processing purposes, data categories, or recipient arrangements change. At a minimum, a compliant PIPIA should include:
Regulators, and certification bodies, increasingly expect demonstrable technical controls, not just policy documents. For CDP/CRM and AI platforms, the following engineering checklist is essential:
Platform operators that rely on overseas SaaS vendors, analytics providers, or cloud sub‑processors must tighten vendor governance:
Connected vehicles generate a unique combination of personal information (driver identity, biometrics, precise geolocation) and data that may be classified as “important” under China’s sectoral catalogues (mapping data, road infrastructure data, vehicle fleet telemetry). The February 2026 automotive guidance issued by relevant authorities added sector‑specific requirements that sit on top of the general PIPL framework.
The February 2026 guidance requires automotive data processors to conduct pre‑transfer security assessments for vehicle telematics and sensor data that may contain important data. Key elements of the guidance include:
For OEMs, Tier 1 suppliers, and fleet‑management platforms, the following operational controls address the automotive guidance:
Whether you use the SCC route or supplement a certification with contractual safeguards, your agreements with overseas recipients must include specific protective clauses. Below is a checklist of essential contractual provisions.
| Clause Category | Required Content | Who Signs |
|---|---|---|
| Purpose limitation | The overseas recipient may only process PI for the specified purposes disclosed in the PIPIA and consented to by data subjects. | Exporter + Recipient |
| Data minimization | Only the minimum categories and volume of PI necessary for the stated purpose may be transferred. | Exporter + Recipient |
| Security measures | The recipient must implement technical and organisational measures at least equivalent to those required under PIPL. | Exporter + Recipient |
| Sub‑processing restrictions | No onward transfer to third parties without the exporter’s prior written consent and equivalent contractual protections. | Recipient + Sub‑processor |
| Data‑subject rights | The recipient must assist the exporter in responding to access, correction, and deletion requests from data subjects. | Exporter + Recipient |
| Audit right | The exporter (or appointed auditor) may inspect the recipient’s compliance at reasonable intervals. | Exporter + Recipient |
| Breach notification | The recipient must notify the exporter of any data breach without undue delay, and cooperate with CAC‑mandated reporting. | Exporter + Recipient |
| Termination and data return/deletion | On termination, the recipient must return or securely delete all PI and certify deletion in writing. | Exporter + Recipient |
When drafting or reviewing cross‑border agreements, ensure the following clauses are present and enforceable. These are indicative, tailor them to your specific transfer scenario:
| Route | Typical Timeline | Common Pitfalls |
|---|---|---|
| Cross‑border data transfer certification | 2–6 months (depending on organisational readiness and certifier queue) | Incomplete PIPIA; missing vendor audit clauses; inadequate anonymization evidence; failure to maintain certification post‑issuance |
| CAC security assessment | 3–9 months (including supplementary question rounds) | Under‑classification of important data; insufficient engineering evidence; delays from incomplete self‑assessment reports |
| Standard Contractual Clauses (filing) | 1–3 months for contract execution + filing | Modifying the prescribed SCC format (invalidating the filing); using SCCs when the security assessment is actually mandatory; failing to re‑file after material changes |
The major cost drivers for China data export compliance include external legal fees, certification body charges, internal engineering effort for technical controls, and ongoing audit and monitoring. To manage costs effectively:
The 2026 changes to China’s cross-border data transfer rules are not incremental, they restructure how organisations select, document, and maintain their lawful transfer basis. The certification route creates a viable middle path for many CDP, CRM, and AI platforms, but it demands rigorous preparation: current PIPIAs, demonstrable engineering controls, and airtight vendor contracts. Connected‑vehicle platforms face an additional layer of sector‑specific obligations that cannot be addressed by generic templates alone.
The organisations that will navigate this landscape most effectively are those that treat cross-border data transfer China compliance as an integrated programme, combining legal, engineering, and vendor‑management workstreams rather than addressing them in isolation. Start with the eight‑point checklist at the top of this guide, work through the decision framework and platform‑specific controls, and engage qualified data‑protection counsel early. For specialist guidance from practitioners with direct experience in Chinese data‑protection enforcement, consult the Global Law Experts China lawyer directory.
This article was produced by Global Law Experts. For specialist advice on this topic, contact Maggie Meng at Beijing Global Law Office, a member of the Global Law Experts network.
posted 11 minutes ago
posted 36 minutes ago
posted 59 minutes ago
posted 2 hours ago
posted 2 hours ago
posted 3 hours ago
posted 3 hours ago
posted 3 hours ago
posted 4 hours ago
posted 4 hours ago
posted 5 hours ago
posted 5 hours ago
No results available
Find the right Advisory Expert for your business
Sign up for the latest advisor briefings and news within Global Advisory Experts’ community, as well as a whole host of features, editorial and conference updates direct to your email inbox.
Naturally you can unsubscribe at any time.
Global Law Experts is dedicated to providing exceptional legal services to clients around the world. With a vast network of highly skilled and experienced lawyers, we are committed to delivering innovative and tailored solutions to meet the diverse needs of our clients in various jurisdictions.
Global Advisory Experts is dedicated to providing exceptional advisory services to clients around the world. With a vast network of highly skilled and experienced advisors, we are committed to delivering innovative and tailored solutions to meet the diverse needs of our clients in various jurisdictions.
Send welcome message