Introduction
Driven by the current wave of digitalization, enterprise data security and compliance have become the cornerstone of stable operations for many enterprises. As an intern lawyer, I was fortunate enough to provide a comprehensive state-owned enterprise data security compliance project for a state-owned retailer under the leadership of Lawyer Zeng Li and Lawyer Fu Yangchun. This project is not only comprehensive, but also in-depth, covering almost all the elements required by state-owned enterprises in terms of data security compliance.
The project covers data security compliance risk assessment, establishment of internal data compliance system, drafting and revision of relevant business texts, and specialized compliance of apps and mini programs. For this project, our team has issued written documents such as a data security compliance risk assessment report, a mini program personal information collection compliance testing report, UI interface optimization suggestions, privacy policy, user agreement, and data delegation processing agreement.
Although the project content is diverse and seemingly scattered, they are actually an organic whole, interrelated. In the process of implementing the project, we always focus on the three core steps of risk investigation, risk identification and analysis, and the formulation and implementation of rectification plans. This method helps us quickly grasp the main thread and main contradictions, ensuring the efficiency and systematicity of compliance work.
The writing logic of this article follows the main line logic of the project implementation mentioned above, aiming to provide reference and ideas for other state-owned or non-state-owned enterprises to achieve data compliance by sharing our experience in this project.
Part One: Risk Investigation
1、 Due diligence: the starting point of risk assessment
As a lawyer affiliated with an external third-party organization of the enterprise, it is necessary to collect and analyze a large amount of information to comprehensively understand the operational status of the enterprise and conduct in-depth analysis of potential risks. Lawyers generally conduct due diligence through methods such as questionnaire surveys and personnel interviews, which often come from various departments and links of the enterprise. The original information presents a scattered and disordered state. These pieces of information come from various departments of the enterprise, such as the Information Department, Comprehensive Department, Product Department, and Operations Department. The collected information is sometimes one-sided and fragmented, making it impossible to connect all the correlations of the information; Sometimes it is too complicated, for example, during the due diligence process, the author received a 106 page computer system construction plan, which was mixed with a large number of computer terms, involving five major categories and dozens of subcategories such as system overview, overall planning, installation and deployment, and system security protection level determination. As a legal practitioner who has not received any computer science education, receiving such high-density computer parameter information in a short period of time can easily lead to confusion in thinking. Therefore, how to effectively sort out this information has become the key to risk investigation, and it is also the focus of this section.
2、 Information sorting: from macro, meso, and micro perspectives
To effectively sort out the diverse and chaotic information, lawyers can start from three perspectives: macro, meso, and micro: (1) external industry models; (2) Internal environment of the enterprise; (3) The entire lifecycle of data. These three perspectives are not independent of each other, but interconnected.
(1) Macro perspective: Insight into different role positioning through external industry models
Data is the mapping of the industrial chain of the material world to the information world, and the transmission of data always has transmission and reception points. Therefore, lawyers can quickly grasp from a macro perspective by observing the industry model in the company's reality:
Who are the other entities involved in data processing activities with the company?
What is the relationship between the two/multiple parties?
What is the role of the company in the data chain?
A simple example:
The company mainly operates B2C e-commerce websites, and its industry model can be roughly summarized as follows:
Third party merchants sell their products or services to end-users through B2C e-commerce websites operated by the company.
Figure 1: Industrial Model
Correspondingly, the following information can be obtained:
(1) Other entities involved in data processing activities with the company must include third-party merchants and C-end customers.
(2) The relationship between multiple parties:
Customers provide address, contact information, name, and other data to B2C e-commerce websites. B2C e-commerce websites then provide this information to third-party merchants, who in turn provide this information to logistics companies to complete shipping and distribution.
Figure 2: Transmission chain of C-end customer address, contact information, and name data
(3) The company's role positioning is mainly as a data recipient, involving data processing activities such as data collection, use, storage, transmission, and possibly processing.
(2) Mid level perspective: Insight into data management processes through the internal environment of the enterprise
In the internal environment of enterprises, the flow and interaction of data run through various operational links. Whether it is data transmission from the parent company to its subsidiaries, data exchange between the parent company and its subsidiaries, or even data sharing between different departments within the company, these data flows are an indispensable part of enterprise operations. They not only affect the operational efficiency of enterprises, but more importantly, they directly involve the data security and compliance standards of enterprises.
By carefully sorting and optimizing the internal business processes of the company, it is possible to clearly identify the data producers, users, regulators, and responsible parties. This process is crucial as it lays a solid foundation for the development of subsequent data compliance improvement plans, the construction or improvement of data compliance systems. This in-depth understanding and effective management of internal data flow is a key step in ensuring enterprise data compliance, maintaining data security, and promoting efficient business operations.
(3) Micro perspective: Revealing the full picture of data processing activities through the entire lifecycle of data
The full lifecycle of data refers to the evolution process of various forms of existence, including data generation, data collection, data transmission, data storage, data usage (including computation, analysis, visualization, etc.), data exchange, and data destruction. The systematic sorting of this continuous process is a key step in revealing the overall picture of enterprise data processing activities and establishing a comprehensive risk management foundation.
Taking shopping apps as an example, their data processing activities can be divided into the following stages:
1. Data collection stage: The shopping app needs to legally collect personal information (such as address, name, phone number, etc.) and shopping preferences with the user's consent, ensuring the legality of the collection and the protection of user privacy.
2. Data storage stage: The collected data must be securely stored on the APP's server through encryption and access control measures to prevent data leakage or unauthorized access.
3. Data usage stage: The APP analyzes and processes user data to provide personalized recommendations and customized marketing strategies, while ensuring transparency in data processing activities and respect for user rights.
4. Data transmission stage: When interacting with third-party partners (such as logistics companies, mobile payment software, etc.), it is necessary to ensure the security of data transmission and clarify the responsibilities and obligations of data sharing through legal means such as contracts.
5. Data destruction stage: When a user cancels their account, in order to prevent data recovery and abuse, the enterprise needs to take effective measures to completely delete the data that is no longer needed and ensure that the destruction process complies with legal and regulatory requirements.
Data mapping analysis: comprehensively examine and organize the processing activities of personal information from multiple perspectives
After completing the sorting of the entire lifecycle process of data, we have a clear understanding of each stage of enterprise data from birth to extinction. Now, we need to translate these understandings into specific steps for data processing and create a detailed data list and easy to understand mapping graph.
At this stage, we need to achieve the following:
Closely integrated with practical scenarios: Analyze the actual situation of personal information processing, including where it is collected, how it is stored and used, and how it is shared and deleted.
Comprehensive research: From the collection to deletion of personal information, we need to have a deep understanding of every step, including why this information is collected, what methods are used to process it, and how to protect it.
● Fully consider the relevant resources and stakeholders involved in the information processing process: it is necessary to consider which systems, tools, and stakeholders are involved in information processing, such as internal systems of the company, external service providers, cloud service providers, platform operators, etc.
Special circumstances: In the research, some special circumstances should also be considered, such as system shutdown, system data consolidation, company merger or acquisition, etc.
Specifically, it can be listed in the following table:
Figure 3: Source from GB/T39335-2020 "Guidelines for Personal Information Security Impact Assessment of Information Security Technologies"
When organizing and analyzing the results of data mapping, we need to:
Classification of personal information processing activities: Personal information processing activities are classified into different categories based on factors such as the type of information, sensitivity, where it is collected, and how it is processed.
● Detailed description of each category: Provide a detailed description of each type of personal information processing activity so that we can better understand and assess potential risks.
Specifically, it can be listed in the following table:
Figure 3: Source from GB/T39335-2020 "Guidelines for Personal Information Security Impact Assessment of Information Security Technologies"
To be continued