Key updates on the amended cybersecurity law of China

Hogan Lovells
Contact

Hogan Lovells

[co-author: Xun Li]

On October 28, 2025, China adopted the first major amendments to the 2017 Cybersecurity Law, which took effect on January 1, 2026. The revised Law establishes an additional tiered penalty regime featuring stricter fines for material cybersecurity violations. It further aligns liability-related provisions with the Personal Information Protection Law (PIPL) and the Data Security Law (DSL), and incorporates a statutory provision that supports AI innovation while emphasizing requirements for improving AI ethics governance and strengthening risk monitoring and assessment.

On October 28, 2025, the Standing Committee of the National People’s Congress adopted the first significant amendments to the Cybersecurity Law of the People’s Republic of China, which originally took effect on June 1, 2017 (the “2017 CSL”). The 2017 CSL established the foundational regulatory framework for cybersecurity in China. The newly amended version (the “Amended CSL”), which came into force on January 1, 2026, introduces stricter compliance requirements, higher penalties, and expanded regulatory powers. Below are the key takeaways we would like to draw your attention to.

1. What types of noncompliance will be subject to heightened penalties under the Amended CSL?

Compared to the 2017 CSL, the latest amendments primarily focus on strengthening and restructuring the penalty regime.

The Amended CSL introduces a supplemental tiered penalty framework to address the non-compliance with cybersecurity protection obligations set out below, aligned with the severity of harm, thereby enhancing the deterrent effect and promoting stricter compliance with cybersecurity obligations.

  1. non-compliance with the Multi-Level Protection Scheme;
  2. mishandling of cybersecurity incidents;
  3. non-compliance with specific cybersecurity protection obligations by critical information infrastructure operators (CIIO);
  4. non-compliance with cybersecurity protection obligations by network products/services providers, including deployment of malicious programs, failure to promptly remedy security defects or vulnerabilities in its products or services, and failure to timely notify users and report to the competent authorities;
  5. carrying out activities such as cybersecurity certification, testing, and risk assessment, and disseminating to the public information endangering cybersecurity including system vulnerabilities, computer viruses, cyberattacks, and cyber intrusions, in violation of applicable provisions.

For a clear overview of how the violation and penalty framework has changed under the Amended CSL, please see the comparison table below (with the changes highlighted in bold).

2017 CSL

Amended CSL

General Network Operators:

Violations constituting item (a) or (b) may result in an order to rectify and warning.

For cases involving refusal to rectify or resulting harm, fines for enterprises range from RMB 10,000 to 100,000. Personal fines for directly responsible persons-in-charge range from RMB 5,000 to 50,000.

General Network Operators:

Violations constituting item (a) or (b) may result in an order to rectify and warning, as well as fines ranging from RMB 10,000 to 50,000. The imposition of fines no longer requires a “refusal to rectify or resulting harm” as a condition.

For cases involving refusal to rectify or resulting harm, fines for enterprises range from RMB 50,000 to 500,000. Personal fines for directly responsible persons-in-charge and other directly liable personnel range from RMB 10,000 to 100,000.

CIIOs:

Violations constituting item (c) may result in an order to rectify and warning.

For cases involving refusal to rectify or resulting harm, fines for CIIOs range from RMB 100,000 to 1,000,000. Personal fines for directly responsible persons-in-charge range from RMB 10,000 to 100,000.

CIIOs:

Violations constituting item (c) may result in an order to rectify and warning, as well as fines ranging from RMB 50,000 to 100,000. The imposition of fines no longer requires a “refusal to rectify” as a condition.

For cases involving refusal to rectify or resulting harm, fines for CIIOs range from RMB 100,000 to 1,000,000. Personal fines for directly responsible persons-in-charge and other directly liable personnel range from RMB 10,000 to 100,000.

Network Products/Services Providers:

Violations constituting item (d) may result in an order to rectify and warning.

For cases involving refusal to rectify or resulting harm, fines for enterprises range from RMB 50,000 to 500,000. Personal fines for directly responsible persons-in-charge range from RMB 10,000 to 100,000.

Network Products/Services Providers:

While the basic penalty remains unchanged under the amended CSL, enhanced penalties apply where serious cybersecurity consequences occur. Please see below for further details.

 

General Network Operators:

Violations constituting item (e) may result in an order to rectify and warning.

For cases involving refusal to rectify or serious circumstances, fines for enterprises range from RMB 10,000 to 100,000. Personal fines for directly responsible persons-in-charge and other directly liable personnel range from RMB 5,000 to 50,000. The authorities may also order the suspension of relevant business activities, mandate operational rectification, shut down websites and revoke relevant permits or business licenses.

 

General Network Operators:

Violations constituting item (e) may result in an order to rectify and warning, as well as fines ranging from RMB 10,000 to 100,000. The imposition of fines no longer requires a “refusal to rectify or resulting harm” as a condition.

For cases involving refusal to rectify or serious circumstances, fines for enterprises range from RMB 100,000 to 1,000,000. Personal fines for directly responsible persons-in-charge and other directly liable personnel range from RMB 10,000 to 100,000. The authorities may also order the suspension of relevant business activities, mandate operational rectification, shut down websites and applications and revoke relevant permits or business licenses.

No elevated penalty tier based on severity of cybersecurity consequences.

 

Where the violations constituting item (a), (b), (c), (d) or (e) lead to serious cybersecurity consequences, such as large-scale data breaches or partial functional disruption of critical information infrastructure (CII), the relevant competent authorities shall impose a fine of RMB 500,000 to two million on the violating entity, and a fine of RMB 50,000 to 200,000 on the directly responsible persons-in-charge and other directly liable personnel.

For cases involving extremely grave consequences, including the complete disruption of CII’s core functions, the relevant competent authorities shall impose a fine of RMB two million to ten million on the violating entity, and a fine of RMB 200,000 to one million on the directly responsible persons-in-charge and other directly liable personnel.

In addition, the Amended CSL increases the upper limit of applicable fines for network operators' non-compliance with information content management obligations, including:

  1. failure to cease the transmission of, remove, or otherwise take disposition measures in respect of information published by its users that is prohibited from publication or dissemination under laws and administrative regulations, as well as failure to retain relevant records (with the Amended CSL further adding “failure to report to the competent authorities” as a violation);
  2. failure by electronic messaging service providers and application software distribution service providers to fulfil their security management obligations, including failure to stop providing services, take disposition measures, retain relevant records, and report to the competent authorities when they know that their users have set up malicious programs or disseminated information prohibited by laws and administrative regulations;
  3. failure to cease the transmission of, remove, take disposition measures, or retain relevant records regarding prohibited information as required by the competent authorities.

For a clear overview of how the penalty framework has changed under the Amended CSL, please see the comparison table below (with the changes highlighted in bold).

2017 CSL

Amended CSL

Violations constituting item (a) and (b) may result in an order to rectify, warning and confiscation of illegal income.

For cases involving refusal to rectify or serious circumstances, fines range from RMB 100,000 to 500,000. Personal fines for the directly responsible persons-in-charge and other directly liable personnel range from RMB 10,000 to 100,000. The authorities may also order the suspension of relevant business activities, mandate operational rectification, shut down websites and revoke relevant permits or business licenses.

Violations constituting item (a), (b) or (c) may result in an order to rectify, warning, public notice and fines ranging from RMB 50,000 to 500,000. The imposition of fines no longer requires a “refusal to rectify or serious circumstances” as a condition.

For cases involving refusal to rectify or serious circumstances, fines range from RMB 500,000 to 2,000,000. Personal fines for the directly responsible persons-in-charge and other directly liable personnel range from RMB 50,000 to 200,000. The authorities may also order the suspension of relevant business activities, mandate operational rectification, shut down websites and applications and revoke relevant permits or business licenses.

Violations constituting item (c) result in an order to rectify.

For cases involving refusal to rectify or serious circumstances, fines range from RMB 50,000 to 500,000. Personal fines for the directly responsible persons-in-charge and other directly liable personnel range from RMB 10,000 to 100,000.

No elevated penalty tier based on severity of cybersecurity consequences.

 

Where the violations set out above lead to extremely serious impact and extremely serious consequences, the relevant competent authorities shall impose a fine of RMB 2,000,000 to 10,000,000 on the violating entity, and a fine of RMB 200,000 to 1,000,000 on the directly responsible persons-in-charge and other directly liable personnel. The authorities may also order the suspension of relevant business activities, mandate operational rectification, shut down websites and applications and revoke relevant permits or business licenses.

2. How does the Amended CSL affect the provision of “network critical equipment” and “cybersecurity dedicated products” to the China market

The Amended CSL underscores China’s growing commitment to equipment and supply chain security. It introduces penalties for selling or providing network critical equipment or cybersecurity dedicated products without undergoing security certification or testing, or with fake security certification or non-compliant security testing results.

Violating entities may face sales bans, warnings, confiscation of illegal gains, fines (RMB 20,000 to 100,000 if there are no illegal gains or the illegal gains are less than RMB 100,000; or one to five times the illegal gains if the illegal gains are RMB 100,000 or more), and, in severe cases, suspension of relevant business or business suspension for rectification, or revocation of relevant business permits or business licenses.

3. What are the implications of the Amended CSL for the PIPL and the DSL?

The Amended CSL streamlines the legal liability framework for non-compliance with personal information protection and data protection obligations under the law. It explicitly refers all such liability to specialized laws and administrative regulations, primarily the PIPL, DSL and their implementing rules, covering the full scope of relevant violations. This revision eliminates fragmented liability provisions across different laws and achieves seamless alignment with specialized personal information protection and data protection legislation, ensuring consistent and rigorous enforcement of legal liabilities in this domain.

4. How does the Amended CSL interact with China’s emerging AI regulatory framework?

The Amended CSL explicitly supports artificial intelligence (AI) innovation and security within China’s cybersecurity framework. Notably, it introduces—for the first time at the statutory level—an exclusive clause addressing AI. It encourages the advancement of foundational AI research, algorithmic innovation, and the deployment of new technologies, including AI, to enhance cybersecurity management. While these provisions remain highlevel and do not establish technical standards, they articulate a clear policy direction and are likely to be supplemented by more detailed, sectorspecific rules in due course.

Importantly, this clause also emphasizes requirements for improving AI ethics governance, strengthening risk monitoring and assessment, enhancing safety supervision, and promoting the healthy development and application of AI. This signals a holistic regulatory approach in which technological development and robust oversight are expected to progress in parallel.

5. What are the implications for companies outside of China?

Although companies outside of China are not required to comply with the requirements of the Amended CSL that companies in China are, the Amended CSL grants regulators significant new powers to take action against companies outside of China whose actions compromise cybersecurity inside China. Under the 2017 CSL, enforcement was primarily focused on overseas activities that harmed CII within China. The Amended CSL significantly broadens its extraterritorial reach, now covering any overseas organizations or individuals whose actions compromise China’s cybersecurity more generally. Authorities are empowered to investigate and fine such overseas actors. In cases of serious consequences, the Public Security Bureau and other agencies may impose sanctions such as asset freezes or other necessary measures. This shift signals China’s more assertive approach to cross-border cyber activities and highlights the importance for multinational companies to assess cybersecurity risks that may have a nexus to China, even if their operations are offshore.

6. What should enterprises do to comply?

While the Amended CSL does not impose entirely new obligations, it reflects a continued tightening of China’s cybersecurity regulatory environment. Enterprises should consider the following actions:

  • Review and Update Compliance Programs

    Enterprises should closely monitor legislative developments and ensure that their cybersecurity and data compliance programs are up to date. This includes conducting internal audits, addressing any compliance gaps, and documenting efforts to support mitigation if violations occur.

  • Strengthen Incident Response and Cooperation Mechanisms

    Enterprises should establish clear procedures for incident containment, self-reporting, and cooperation with regulatory investigations. Proactively eliminating harm and cooperating with authorities can help mitigate penalties in the event of a violation.

  • Assess and Manage Cross-Border Risks

Given the expanded extraterritorial application of the Amended CSL, companies with overseas operations connected to China should evaluate their potential exposure. This includes preparing for possible cross-border law enforcement actions and ensuring that supplier and product compliance is robust.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations. Attorney Advertising.

© Hogan Lovells

Written by:

Hogan Lovells
Contact
more
less

What do you want from legal thought leadership?

Please take our short survey – your perspective helps to shape how firms create relevant, useful content that addresses your needs:

Hogan Lovells on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide