with the frequent occurrence of network and data security events, such as snowden event, prism event, google ireland event, countries attach great importance to data exit security and continuously strengthen data exit management system, posing new challenges to enterprise data exit security compliance.
article 37 of the cyber security law says, “the operators of key information infrastructure”and “the general network operators”, contains the network owner, manager and service provider, which means the vast majority of enterprises who engaged in network operations need to apply for security assessment when individual information and important data are involved.
personal information and important data exit security assessment measures defines the data exist as, provides personal information and important data that collected and generated in the process of network operating in china to overseas institutions, organizations and individuals. according to the definition, some special scenarios are classified into data exist, such as whose data center is in china and can be access to from overseas, or the data are transmitted inside a transnational group across many international branches. in the meantime, information security technology data exit security assessment guidelines says the data exist assessment mode is “self assessment in general case assessment oraganized by industry competent department in special case cac is responsible for overall assessment”. the following three conditions are described as data exist:
◆provides personal information and important data to domestic main body who are not subject to national jurisdiction or have not registered in china.
◆data that not being transferred and stored outside china, but is accessed and viewed by institutions, organizations and individuals outside the country.
◆transfer the internal data of network operating group to overseas, involves personnal information and important data that collected and generated in domestic operating process.