Welcome!

News Feed Item

China's Data Privacy Laws Pose Challenges for Corporate Foreign Corrupt Practices Act Compliance

Lack of a Single, All-Encompassing Law Creates Additional Hurdles for Multinationals Conducting Third-Party Due Diligence

SAN FRANCISCO, CA--(Marketwired - May 13, 2014) - Companies that do business in China are under intense scrutiny because of the Chinese government's crackdown on bribery and corruption and continued efforts by U.S. and U.K. regulators to enforce their own compliance regulations. To further complicate matters, China's mosaic of privacy laws governing the gathering, use, and storage of data present significant compliance challenges for multinationals conducting due diligence of their third parties. 

"With the March 15th implementation of additional revisions to privacy rules, companies must ask themselves how they can conduct due diligence on Chinese principals based on the Foreign Corrupt Practices Act (FCPA) without violating the country's data privacy laws," says Dennis Haist, General Counsel and Compliance Advisor for San Francisco-based STEELE (CIS), a leading global business advisory and compliance intelligence firm. "China's goal of protecting consumer privacy is laudable but, since the country lacks any all-encompassing guidelines that corporations can turn to, multinationals face many issues regarding what is legally obtainable data."

Mr. Haist is a co-author of "Legally Obtainable Data in China," a white paper that provides insight on how privacy laws are likely to affect third-party due diligence and management programs. "In order to comply with the FCPA, multinationals must conduct reasonable, risk-based due diligence of their third parties," he says. "That very likely includes looking at the principals of an entity. It's vital to engage a company that understands data privacy regulations, because the Chinese government closely monitors those involved in due diligence in a manner similar to its monitoring of journalists."

In fact, there are at least 13 different laws that address data privacy in China. "Local in-depth knowledge of China data privacy law and the practical realities of conducting third-party due diligence is a must," says Mr. Haist.

To reduce the risk of violations and comply with the letter and spirit of Chinese law, he recommends that multinationals borrow data privacy concepts that use an inclusive definition of personally identifiable information, including an individual's name, resident identity cards, driver's license numbers, birthplace, telephone number and birthday, and possibly more. Corporations also need to obtain the consent of individuals included in the due diligence effort and, in general, only collect information that would be available to the subjects themselves.

"It's almost impossible to do business in China without engaging third parties to interact with Chinese officials," Mr. Haist points out, "and we are seeing an unprecedented level of anti-bribery and anti-corruption (ABAC) enforcement directed at foreign multinationals. An enhanced level of due diligence is no longer optional."

A copy of "Legally Obtainable Data in China" is available free from STEELE CIS by clicking here

About STEELE (CIS)

STEELE Compliance and Investigation Services (CIS) is a global business advisory and compliance intelligence firm offering comprehensive third-party due diligence solutions that help organizations comply with regulatory requirements and align with best practices. With more than 20 years of experience, STEELE CIS provides Fortune 1000 companies and mid-sized businesses with pragmatic solutions, including Regulatory Due Diligence, Third-Party Program Advisory Services, Program Management Services, and Compliance Analytics and Benchmarking Services. With engagements in over 170 countries, STEELE CIS delivers local and regional expertise with 'on-the-ground' resources.

For additional information regarding risk-based third-party management, please contact a STEELE CIS third-party compliance expert. Call +1.415.781.4300, email [email protected],or visit www.steelecis.com.

The following files are available for download:

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
SaaS companies can greatly expand revenue potential by pushing beyond their own borders. The challenge is how to do this without degrading service quality. In his session at 18th Cloud Expo, Adam Rogers, Managing Director at Anexia, discussed how IaaS providers with a global presence and both virtual and dedicated infrastructure can help companies expand their service footprint with low “go-to-market” costs.
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, discussed using predictive analytics to mon...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...