Cross-Border Data Compliance Services

Standardized
multilingual reporting
Real-time network
security monitoring
Certified experts and streamlined workflows

Initial
Consultation
Data transfer interviews & questionnaires
Cross-border scenario identification

Comprehensive
Security Evaluation
Gap analysis & risk assessment
Detailed compliance reporting

Remediation
Support
Tailored corrective
action plans

Regulatory
Submission Assistance
Documentation and
authority liaising

Ongoing
Compliance Oversight
Staff training & compliance audits
Proactive security inspections
on Cross-Border Data Transfers
2017 ——
Cybersecurity Law
Measures for Security Assessment of Personal Information and Important Data (Draft for Comments)
Information Security Technology – Guidelines for Security Assessment of Data (Draft for Comments)
2019 ——
Measures for Security Assessment of Personal Information (Draft for Comments)
2021 ——
Data Security Law
Personal Information Protection Law
Measures for Security Assessment of Data Export (Draft for Comments)
Regulations on the Management of Cyber Data Security (Draft for Comments)
2022 ——
Guidelines for Cybersecurity Standards Practice – Security Certification Specifications for Cross-Border Processing Activities of Personal Information (Draft for Comments)
Provisions on Standard Contracts for Cross-Border Personal Information Transfer
Measures for Security Assessment of Data Export
2023 ——
Measures for Standard Contracts for Cross-Border Personal Information Transfer
Implementation Guidelines for Standard Contracts on Cross-Border Personal Information Flow in the Guangdong-Hong Kong-Macao Greater Bay Area (Mainland, Hong Kong)


Security Capabilities Assessment

Assessment
Team

Policy and Procedures

Document Management

Audit
Reports

Emergency Response

Security Tools

Risk
Management

Physical
Security

Security Vulnerabilities

Viruses and Worms

Other Risks

Security Awareness

Weak
Passwords

System Configuration

Data Classification and Identification

Personal Information

Important Data

Critical Information

Other Data

Data
Lifecycle

Data Transfer (During Export)

Data
Archiving

Data Transfer (Sharing)

Data Usage (Post-Export)

Data
Deletion

Cross-Border
Data

Legal
Basis

Security Assessment

Legality

Necessity

Transparency and Disclosure

Security Certification

Standard Contracts

Current Situation Analysis

Preliminary Outbound Interviews

Outbound Survey Questionnaire

Outbound Scenario Identification

Security Assessment

Gap Analysis

Security Risk Services

Evaluation Report

Rectification Assistance

Rectification Plan

Rectification Assistance

Declaration

Declaration Assistance

Compliance Monitoring

Security Knowledge Training
