Reed Smith In-depth

The long-awaited Chinese standard contractual clauses (SCCs) and the Chinese SCC Regulations were finally released by the Cyberspace Administration of China (CAC) on 24 February, with effect from 1 June 2023. This indicates that all three major legal mechanisms under China’s Personal Information Protection Law (PIPL) (namely, CAC-led security assessment, certification by licensed professional institutions and Chinese SCCs) are all fully established with the necessary details for implementation.

Scope of application

According to the SCC Regulations, business organisations are only allowed to adopt the Chinese SCCs for transferring China-collected or generated data abroad if they have satisfied all of the following conditions as data exporters:

  1. They are not a critical information infrastructure operator (CIIO, which is broadly defined to cover business entities in financial, energy, telecom, public utility, health care, transportation, e-government and other sectors which are critically important to China for reasons of national security and the public interest).
  2. They have not processed the personal data of more than one million individuals.
  3. They have not made aggregate transfers of the personal data of more than 100,000 individuals since 1 January of the preceding year.
  4. They have not made aggregate transfers of the sensitive personal data of more than 10,000 individuals since 1 January of the preceding year.

It is worth noting that the above thresholds for Chinese SCCs are closely aligned with those for cross-border data transfers which are subject to the CAC-led security assessment. Under the Measures on Security Assessment for Outward Data Transfer (issued by CAC in August 2022 and effective from 1 September 2022), any international data transfer from China is required to go through the CAC-led security assessment if it falls short of any of the above four conditions.

The SCC Regulations explicitly prohibit businesses from transferring China-collected or generated data abroad by breaking down the data volume to circumvent the CAC security assessment mechanism.

Specific requirements for Chinese SCCs

Unlike the GDPR SCCs, which cover four different models for controller (C) and processor (P) transfers, namely C-C, C-P, P-P and P-C, the Chinese SCCs only have one universal template, regardless of the role and function of the parties.