ARTICLE
1 December 2025

China's Cybersecurity Law Amendment – Key Changes And Compliance Recommendations

FP
Fangda Partners

Contributor

We have approximately 800 lawyers in our seven offices in Beijing, Guangzhou, Hong Kong, Nanjing, Shanghai, Shenzhen and Singapore.

Our lawyers collaborate seamlessly across practice groups and locations to provide our clients with exceptional service, sophisticated advice and practical solutions founded on our legal expertise, sound knowledge of market practice, deep understanding of the industry landscape and proven ability to assist our clients achieve their business objectives.

On October 28th, 2025, the amendment to China's Cybersecurity Law (the"CSL Amendment") was officially promulgated during the 18th session of the Standing Committee...
China Technology
Kate Yin’s articles from Fangda Partners are most popular:
  • in United States
  • with readers working within the Media & Information industries
Fangda Partners are most popular:
  • within Technology, Insurance and Corporate/Commercial Law topic(s)
  • with Inhouse Counsel

1. Background

On October 28th, 2025, the amendment to China's Cybersecurity Law (the“CSL Amendment”) was officially promulgated during the 18th session of the Standing Committee of the 14th National People's Congress (“NPCSC”). It will take effect on January 1st, 2026.

The CSL Amendment focuses on the following three key areas: first, the alignment between the Cybersecurity Law (“CSL”) and other laws and regulations concerning cybersecurity and data compliance, such as the Personal Information Protection Law (“PIPL”) and the Data Security Law (“DSL”); second, it addresses new technologies like AI and algorithms; and, third, and most importantly, it has increased the penalties for certain well-established cybersecurity violations, and established new penalty standards for other illegal activities.

As a background note, the CSL was first implemented on June 1, 2017. A proposal to amend the CSL was first announced in September 2022, so it has taken more than three years to complete the amendment.

2. Key Summary

More Penalties if an Organization Fails to Safeguard Cybersecurity

Organizations must carry out reasonable cybersecurity protection measures from both technical and organizational perspectives. The CSL Amendment increases penalties for failure to carry out such measures. Strictly speaking, the penalties come in three levels: no harm, harm or substantial harm.

If there is no harm, i.e., the failure is detected by competent regulators but has not resulted in any harmful consequence, then the fine imposed can be anything up to RMB50,000. It is worth noting that under the CSL prior to this amendment, regulators are not permitted to impose fines and the organization can get away with only a warning.

If there is harm, i.e., if the failure resulted in harmful consequence such as business disruption, or the concerned organization fails to put right the situation after being notified by regulators, fines can rise up to RMB500,000, or up to RMB1 million if critical information infrastructure (“CII”) is adversely affected. As a side note, CII is similar to critical infrastructure as defined under cybersecurity laws in other jurisdictions such as US federal laws.

If there is substantial harm, such as circumstances involving massive data breaches or the partial or major loss of functionalities of CII, the fines on the organization can be as high as RMB10 million, and the directly responsible persons-in-charge could have personal liabilities and face fines of up to RMB1 million.

The increased penalty in both corporate liability and personal liability is intended to compel those in charge to take enforcement more seriously by giving them more incentives to invest in cybersecurity or, rather, to deter them from ignoring cybersecurity controls.

New Penalties for Distributing Vulnerable Critical Network Products

The CSL Amendment has put in place a penalty for selling or providing vulnerable critical network products that do not pass mandatory state-certification. This penalty appears to be independent from product liability. Specifically, penalties under the CSL Amendment include: punishments such as orders to stop selling or providing such products; confiscation of illegal gains; and fines of up to five times the illegal gains.

More Penalties on Cybersecurity Firms

Cybersecurity firms that assume a watchdog role, such as those in charge of security assessment, multi-level protection scheme (“MLPS”) audit and publishing threat alerts will bear higher legal obligations for violations, with maximum fines set at RMB1 million for the organization and RMB100,000 for the directly responsible personnel. We understand that due to limited resources of the regulators they are willing to delegate some functions to licensed market organizations. However, they want these organizations to take their roles more seriously to avoid foul play.

More Penalties for Publishing Illegal Content

Those who fail to stop publishing illegal content having been warned not to do so face fines of, in the most severe cases, up to RMB10 million. In the context of AI, leveraging common generative AI tools that are not available on the market in China, such as CoPilot or ChatGPT, may trigger illegal content issues because they don't have content moderation tools that meet Chinese regulatory requirements. For example, if the marketing team uses a generative AI to generate a map of China that gets the borderline wrong and has included it in the marketing materials, it may be seen as disrespectful to China's sovereignty, which could trigger severe repercussions. Human review of all content before publishing is therefore a top priority.

New Leniency Provisions and Penalty Guidelines for Cybersecurity Violations

By linking with the provisions of the Administrative Punishment Law (行政处罚法), the CSL Amendment introduces clauses allowing for lenient treatment, reduced penalties, or exemptions from administrative sanctions in certain circumstances, which can help organizations build up affirmative defenses in case of enforcement. These mitigation factors include: proactively reducing or eliminating harm; proving that the harm is minimal; first-time violation; demonstrating no malicious intent, etc. With these leniency provisions, a company may have less to fear when deciding whether to report a data breach that involves very few people, for example, employees. Note that at the provincial level, in big municipalities such as Beijing and Shanghai, local regulators have already put in place detailed guidelines on how penalties should be applied for cybersecurity violations. We anticipate these local guidelines will be updated to reflect the change in CSL.

Extraterritorial Impact

The CSL Amendment stipulates that the regulators have the power to hold overseas organizations or individuals legally accountable for activities that endanger the cybersecurity of China. This provision gives Chinese regulators power to punish overseas organizations, such as hacker groups, cyber units in foreign government, or private firms collaborating with foreign government to launch cyberattacks on Chinese interests. The possible punishments could be that these entities are put on China'sunreliable entity list, which will subject these organizations to economic sanctions and their executives to travel bans.

3. What do Organizations Need to do to conform to the CSL Amendment?

CSL is amended such that the punishments are standardized for various types of violations. This will make the job of law enforcement agencies easier when apply the penalties for those found to be in violation. This is an indication that we can expect greater levels of enforcement. It is therefore time for organizations to ramp up their affirmative defenses by building a strong China cybersecurity compliance program, following a “know it, do it, test it” approach that we recommend.

Know it
Organizations must clearly understand their business, infrastructure, and data. They should be able to explain which systems support which functions and what data is processed. This requires internal cybersecurity and data teams maintaining vigilance in their organizations' use or data – including on a daily basis - and maintaining strong data mapping practices to ensure visibility and accountability.

Do it
A robust cybersecurity program should combine top-down and bottom-up approaches. From the top down, leaders should prioritize key compliance measures such as MLPS certification for local networks, proper mechanisms for cross-border data transfers, and oversight of third-party processors. These steps help establish essential technical and administrative controls. From the bottom up, those responsible should focus on data governance by maintaining aRecord of Processing Activities and conducting Privacy Impact Assessments, where necessary. This ensures transparency and enables tailored controls, such as timely privacy notices.

Test it

After implementation, organizations must verify the effectiveness of their program by regular testing. This includes incident response drills, privacy audits, and IT security reviews. Maintaining documentation of these activities is critical, as audit reports provide evidence of compliance and serve as a strong defense in regulatory inquiries.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More