🏛️ Regulatory Guide

CAC Security Assessment Guide 2025: Cross-Border Data Transfer from China

Navigate China's mandatory security assessment for cross-border data transfers. Understand triggers, thresholds, the application process, and realistic timeline expectations.

📋 Table of Contents

1. What is CAC Security Assessment?

The CAC (Cyberspace Administration of China) Security Assessment is a mandatory government review process for certain cross-border data transfers from China. Introduced under the Measures for Security Assessment of Outbound Data Transfers (effective September 1, 2022), it represents the most stringent mechanism for legally transferring personal information and "important data" outside China.

Unlike the other two mechanisms (Standard Contractual Clauses and certification), CAC security assessment is a government approval process—meaning you need explicit regulatory sign-off before transferring data.

Why It Matters

For companies operating in China with global data flows, CAC assessment can be:

Key Insight: Many multinational companies have been caught off-guard by CAC requirements. Early assessment of whether you trigger the thresholds is essential for business continuity planning.

2. What Triggers the Requirement?

CAC security assessment is required when any of the following conditions apply:

🚨 You Must Apply for CAC Assessment If:

  • You are a Critical Information Infrastructure Operator (CIIO)
  • You process personal information of 1 million+ individuals in China
  • You have cumulatively transferred personal info of 100,000+ individuals abroad since January 1 of prior year
  • You have transferred sensitive personal info of 10,000+ individuals abroad since January 1 of prior year
  • You transfer "important data" as defined by sector regulators

Understanding "Critical Information Infrastructure"

CIIOs are operators in key sectors whose disruption could impact national security, economy, or public welfare:

Sector Examples
Public Communications Telecom operators, internet service providers
Information Services Major platforms, cloud service providers
Energy Power grid, oil & gas, nuclear facilities
Transportation Railways, aviation, ports, public transit
Water & Utilities Water supply, sewage treatment
Finance Banks, securities, insurance companies
Public Services Healthcare, education, social security
E-Government Government service platforms
Defense Defense industry suppliers

Understanding "Important Data"

"Important data" (重要数据) is a critical concept that extends beyond personal information:

Important: The thresholds are cumulative since January 1 of the prior year. If you start the year below threshold but grow rapidly, you may trigger the requirement mid-year. Monitor your numbers continuously.

3. Understanding the Thresholds

Threshold Comparison: Which Mechanism Applies?

Threshold Required Mechanism Government Approval?
CIIO (any volume) CAC Security Assessment Yes - mandatory approval
1M+ personal info subjects processed CAC Security Assessment Yes - mandatory approval
100K+ personal info subjects transferred abroad (cumulative since Jan 1) CAC Security Assessment Yes - mandatory approval
10K+ sensitive info subjects transferred abroad (cumulative since Jan 1) CAC Security Assessment Yes - mandatory approval
Important data (any volume) CAC Security Assessment Yes - mandatory approval
Below CAC thresholds, above 10K transfers Standard Contractual Clauses + filing No - file after signing
Smaller volumes Certification OR SCCs No - third-party certification

How to Count Your Numbers

Accurate threshold calculation is crucial:

Pro Tip: Build internal dashboards tracking these metrics monthly. Many companies discover they've crossed thresholds only after an audit—by then, they're already non-compliant.

4. Application Process Step-by-Step

Self-Assessment & Gap Analysis

Before applying, conduct thorough internal assessment:

  • Map all cross-border data flows (what data, to whom, where, why)
  • Identify gaps against PIPL, DSL, and Cybersecurity Law requirements
  • Implement necessary technical and organizational measures
  • Prepare data flow diagrams and system architecture documentation

Prepare Self-Assessment Report

Draft comprehensive self-assessment covering:

  • Legality, legitimacy, and necessity of the data transfer
  • Overseas recipient's data protection capabilities
  • Volume, scope, types of data being transferred
  • Risks to national security, public interest, and individual rights
  • Security measures and their effectiveness
  • Individual rights protection mechanisms

Finalize Legal Agreements

Execute binding agreements with overseas recipients:

  • Data transfer agreement specifying obligations
  • Recipient commitments on data protection standards
  • Provisions for Chinese individual rights exercise
  • Audit rights for Chinese entity
  • Termination and data return/deletion provisions

Submit Application to Provincial CAC

File your application with the provincial CAC where your entity is registered:

  • Complete declaration form (申报书)
  • Submit self-assessment report and all supporting documents
  • Provincial CAC reviews completeness within 5 working days
  • If incomplete, you'll receive a request for supplementary materials

Provincial CAC Review

Provincial CAC conducts preliminary review:

  • Verifies documentation completeness and accuracy
  • May conduct on-site inspections
  • If no issues, forwards to national CAC within 15 working days
  • May return with questions requiring response

National CAC Assessment

National CAC conducts substantive security assessment:

  • Evaluates national security and public interest impact
  • Assesses adequacy of recipient's protection measures
  • May require additional materials or clarifications
  • May organize expert review panels for complex cases
  • Official timeline: 45 working days (extendable)

Assessment Result & Approval

Receive final determination:

  • Approved: Receive written approval, valid for 2 years
  • Conditionally approved: Must address specific issues first
  • Rejected: Cannot proceed with data transfer; may revise and reapply
After Approval: Approval is valid for 2 years. You must reapply before expiration. Also, reassessment is required if there are material changes to data types, purposes, overseas recipients, or security environment.

5. Required Documentation

Prepare these documents before starting your application:

Core Application Documents

Document Description
Declaration Form (申报书) Official application form with company information, data transfer overview, and declarations
Self-Assessment Report Comprehensive analysis of transfer legality, necessity, risks, and safeguards (typically 30-50+ pages)
Data Transfer Agreement Legally binding contract between Chinese entity and overseas recipient
PIPIA Report Personal Information Protection Impact Assessment for affected processing activities

Supporting Documentation

Document Purpose
Business license copy Verify applicant entity identity
Data flow diagrams Visualize how data moves across borders
System architecture documentation Technical context for security review
Security measure specifications Detail encryption, access controls, monitoring
Overseas recipient credentials Prove recipient's data protection capabilities
Privacy policies (Chinese) Demonstrate user disclosure compliance
Consent mechanisms screenshots Show how consent is obtained
Internal policies and procedures Evidence of organizational measures
Language Requirement: All documents must be in Chinese. If originals are in another language, certified translations are required. Budget time and cost for professional translation.

6. Timeline Expectations

Official vs. Realistic Timeline

The regulations specify official timeframes, but actual experience often differs significantly:

Preparation
2-4 months (not in official timeline)

Internal assessment, documentation preparation, legal agreement negotiation, gap remediation

Completeness Check
Official: 5 working days | Realistic: 1-3 weeks

Provincial CAC verifies submission completeness; often requires supplementary materials

Provincial Review
Official: 15 working days | Realistic: 1-2 months

Preliminary review; may include multiple rounds of Q&A and document updates

National Review
Official: 45 working days | Realistic: 3-6 months

Substantive security assessment; can be extended for complex cases; expert panels may be convened

Final Decision
Official: 7 working days | Realistic: 2-4 weeks

Notification of result; if conditionally approved, additional time to address conditions

Total Realistic Timeline: 6-18 months from preparation start to final approval. Complex cases involving CIIOs or sensitive sectors may take longer. Plan your business operations accordingly.

Factors That Extend Timeline

7. Common Pitfalls

❌ Pitfall 1: Incomplete Data Mapping

Many companies don't fully understand their own data flows. If your application doesn't match what regulators find during investigation, credibility is damaged. Conduct thorough data discovery before applying—don't just document what you think happens.

❌ Pitfall 2: Vague Necessity Justification

"Business needs" is not sufficient justification. You must specifically explain why this data must leave China, why local processing isn't feasible, and how you minimize transferred data. Regulatory reviewers push back hard on weak necessity arguments.

❌ Pitfall 3: Weak Recipient Commitments

Generic data processing agreements don't satisfy CAC requirements. Overseas recipients must make specific commitments aligned with Chinese law standards, including audit rights, data localization upon termination, and response to Chinese individual rights requests.

❌ Pitfall 4: Ignoring the "Important Data" Question

Companies focus on personal information thresholds but overlook that any "important data" triggers assessment regardless of volume. If you're unsure whether your data qualifies, proactively consult with sector regulators or legal counsel.

❌ Pitfall 5: Underestimating Timeline

Starting the process 3 months before a business deadline is a recipe for problems. The process takes 6-18 months. Build assessment into project planning from the beginning, not as an afterthought.

❌ Pitfall 6: Transferring Data While Waiting

Some companies continue transfers while the assessment is pending, reasoning that they're "in the process." This is a violation. If assessment is required, you must halt transfers until approval is received. Plan interim solutions.

❌ Pitfall 7: Not Planning for Renewal

Approvals are valid for only 2 years. Companies that celebrate approval often forget to calendar the renewal. Start the renewal process 6+ months before expiration to avoid gaps in authorization.

Success Factor: Engage experienced legal and compliance advisors early. Companies with advisors who have completed CAC assessments have significantly higher success rates and shorter timelines than those navigating the process alone.

8. Frequently Asked Questions

What triggers a CAC security assessment requirement?

CAC security assessment is mandatory if you: (1) are a Critical Information Infrastructure Operator (CIIO), (2) process personal information of 1 million+ individuals, (3) have cumulatively transferred data of 100,000+ individuals abroad since January 1 of the prior year, or (4) have transferred sensitive personal information of 10,000+ individuals abroad.

How long does CAC security assessment take?

The official timeline is 45-60 working days after acceptance, but in practice, the full process typically takes 6-18 months. This includes preparation time, multiple rounds of supplementary questions, and potential revisions. Complex cases or those involving critical infrastructure can take longer.

What documents are required for CAC security assessment?

Required documents include: (1) Security assessment declaration form, (2) Self-assessment report covering data types, purposes, and security measures, (3) Legal documents between Chinese entity and overseas recipient, (4) Technical security measures documentation, (5) Personal information protection impact assessment (PIPIA), and (6) Overseas recipient's data protection commitments.

What happens if my company fails the CAC security assessment?

If your application is rejected, you cannot legally transfer data abroad. You may revise and resubmit, but transferring data without approval can result in penalties up to 50 million RMB or 5% of revenue, business suspension, and personal liability for responsible managers. Some companies restructure their data architecture to avoid cross-border transfers.

Can I transfer data while waiting for CAC assessment approval?

No. If CAC assessment is required, you must wait for approval before transferring data abroad. Transferring data during the assessment period is a violation. Companies should plan for this timeline and may need to implement interim local data processing solutions.

Does CAC assessment apply to all types of data?

CAC security assessment applies to personal information and "important data" being transferred abroad. The definition of "important data" varies by industry—each sector regulator may define categories specific to their industry. If uncertain whether your data qualifies, consult with legal experts or the relevant industry regulator.

How often must CAC assessment be renewed?

CAC security assessment approvals are valid for 2 years. You must reapply before expiration to continue transfers. Additionally, reassessment is required if there are significant changes to data categories, purposes, overseas recipient, or the security environment.

Need Help with CAC Security Assessment?

Our data compliance experts have successfully guided companies through the CAC assessment process. Get a preliminary evaluation of your requirements and timeline.

Get Free Consultation →