Publication Cover
The International Spectator
Italian Journal of International Affairs
Volume 59, 2024 - Issue 2
694
Views
0
CrossRef citations to date
0
Altmetric
Digital Policies and Perceptions of the PRC

Justifying a Privacy Guardian in Discourse and Behaviour: The People’s Republic of China’s Strategic Framing in Data Governance

ABSTRACT

The People’s Republic of China’s (PRC) approach to data governance, centred on data sovereignty, is much debated in academic literature. However, it remains unclear how the PRC’s different state actors justify this approach. Based on an analysis of the discourse and behaviour of the PRC’s state actors through strategic framing theory, their role as a privacy guardian can arguably be described as strategically constructed. The Chinese government and legislative bodies have tailored their communications to present themselves as champions of individual privacy, aiming to secure support for state policies. This strategic framing encompasses four mechanisms: the reframing of privacy threats through political narratives; legal ambiguities; selective framing; and the implementation of censorship to influence public discourse. An examination of how the Chinese government responded differently to data breaches in the cases of Didi and the Shanghai National Police Database leak highlights the Chinese government’s efforts in maintaining framing consistency to construct itself as a guardian, rather than a violator, of individual privacy.

The People’s Republic of China’s (PRC) approach to data governance has recently become a topic of public debate, as the country has increasingly institutionalised legal and policy tools to regulate the collection and flow of data. A key concept in the PRC’s approach is ‘data sovereignty’ (shuju zhuquan数据主权) (Kokas Citation2022; Cai and Wang Citation2020; Barrinha and Christou Citation2022; Que and Wang Citation2022; Borgogno and Savini Zangrandi Citation2023). It involves “the control of data flows via national jurisdiction” (Hummel et al. Citation2021, 2). Despite considerable debate surrounding the PRC’s stance on data sovereignty and cyber governance (for example, see Gao and Chen Citation2022; Gao Citation2022), the justification provided by the Chinese government for its approach to data sovereignty warrants deeper scholarly examination. In the PRC, the concept of data sovereignty is employed as a means for the state to assert its exclusive jurisdiction over data collection and cross-border data flow. When it comes to striking a balance between safeguarding national security and protecting individual privacy in data sovereignty practices, some scholars within the PRC tend to view individual privacy as an integral component of state sovereignty. In other words, the protection of individual privacy aligns with the broader objectives of defending national security and ensuring regime stability.

This is particularly important to understanding the PRC’s approach to global governance, especially considering the mobile nature of data, which may have implications for the international landscape of data governance. Numerous state actors are increasingly promoting the concept of data sovereignty, each with their own unique interpretations and practices (He Citation2021). The PRC’s approach to data sovereignty diverges from that of the European Union (EU) and the United States (US). The EU places a stronger emphasis on safeguarding consumers rights (Moerel and Timmers Citation2021), considering data sovereignty as a key element within its strategic autonomy and human rights agenda, wherein data sovereignty revolves around the EU’s control of its citizens’ data (Broeders et al. Citation2023). On the other hand, the US prioritises the economic potential of Information and Communications Technology (ICT) companies, accommodating the data collection and algorithm training needs of technology players (Que and Wang Citation2022). Despite this subtle distinction, both the US and EU are attentive to the location of data storage and its ramifications for data sovereignty. For instance, the 2018 Clarifying Lawful Overseas Use of Data (CLOUD) Act, enables the US government to request data stored on servers belonging to US-based technology companies, regardless of the servers’ physical locations. This provision comes into conflict with the EU’s General Data Protection Regulation (GDPR) Article 48, which restricts foreign courts’ requests for access to personal data collected within the EU (Wood and Lewis Citation2023).

The PRC's approach carries global implications, as it is progressively asserting itself as a leader in setting norms and regulations within the realm of cyberspace (Gao Citation2022, 15; Segal Citation2020). In the PRC’s perspective on data sovereignty, national security and regime stability take precedence. Chinese scholar Cao Jun (Citation2013) contends that data sovereignty serves as a fundamental prerequisite for any other rights related to data. Scholars have also helped portray the Chinese government as a guardian of individual privacy rights who would protect individuals from the mishandling of data collection and algorithm training by technology companies (Cai and Wang Citation2020, 52-3). Others depict the state’s role as that of a mediator that intervenes between citizens and technology companies to rectify the asymmetrical power dynamic between them (Wang Citation2022).

How do the Chinese government and legislative bodies justify their role as a privacy guardian instead of a violator, which is one of the key prerequisites of legitimating strong state control over data flow? Furthermore, how does the Chinese government overcome the disparity between its discourse and behaviour to construct a coherent image as a guardian of privacy? Using strategic framing as an analytical tool, we argue that the PRC's regulatory authorities have strategically framed the state’s role in data governance, selectively emphasising certain data breaches while downplaying others. We also compare how the Chinese government responded differently to the data breaches in the cases of Didi and the Shanghai National Police Database. The disproportionate penalties and conspicuous silence in the latter demonstrate the Chinese government’s efforts to maintain framing consistency in constructing itself as a guardian, rather than a violator, of individual privacy.

The PRC’s approach to data governance

For the purpose of this article, we draw a distinction between cyber sovereignty and data sovereignty. The concept of cyber sovereignty holds greater significance in terms of national security, particularly concerning the protection of critical infrastructure and networks against deliberate cyber attacks by foreign actors. The PRC's approach in this regard was first introduced in its 2016 Cybersecurity Law, emphasising the state's capacity to defend itself against cyberattacks originating from foreign entities. Subsequent discussions on data sovereignty emerged with a more specific focus on state control over cross-border data flow, encompassing the participation of companies, organisations and the daily online activities of citizens (Hang and Zhou Citation2022).

Data comprises sets of symbols used by computer systems and is a fundamental by-product of the internet (O’Hara et al. Citation2021). When data is endowed with social significance and meaning, it transforms into information. Data is inherently mobile and divisive, which poses challenges in pinpointing specific territorial locations. The locations of users, data collectors and data infrastructures may vary, collectively presenting challenges to territorial jurisdictions. This diversity has prompted different states and state actors to develop various approaches to territorialise data. In this regard, the PRC's approach to data sovereignty is not markedly distinct from the ‘Western’ approach, as exemplified by the CLOUD Act and GDPR, both of which aim to establish territorial control over data. Nonetheless, the PRC places a significant emphasis on data sovereignty, primarily linked to national security, in contrast to the EU’s prioritisation of privacy protection and the US’s inclination towards technological advancement (Priol and Vincent-Galtie Citation2022, 4)

The party-state manages data governance through a combination of policy responsiveness, legislative measures and law enforcement (Jia Citation2023). It is worth noting that, while national security remains a top priority, Chinese regulators struggled to strike a balance among competing interests, including those related to economic development. The PRC's policy formulation process is the result of interactions among various state agencies and corporate entities; its approach has been shaped by the interplay of competing interests within the domestic business landscape and interactions between businesses in both domestic and transnational contexts (Shen Citation2016).

The tensions stemming from the competing needs of safeguarding national security, fostering economic development and ensuring individual privacy protection become apparent in conflicting priorities within different laws. For instance, the 2021 Personal Information Protection Law (PIPL) prohibits the illegal collection, use, processing, or transfer of personal information, while the 2021 Data Security Law (DSL) encourages “reasonable” and “effective” use of data to develop the digital economy (Xinhua Citation2021). Given the legal ambiguities in the PRC, this could result in labelling the same circumstances as either illegal or reasonable, depending on the specific context. Furthermore, although privacy protection has traditionally been associated with democratic practices, autocracies are increasingly embracing the rhetoric of privacy protection to bolster their legitimacy in the face of widespread digital abuse (Jia Citation2023).

These tensions underscore a crucial gap in understanding the disparity between the PRC's official stance and its practices in specific contexts. This article endeavours to bridge this gap through a two-fold approach. Firstly, at the discursive level, it scrutinises how the PRC’s different state actors have framed the state’s role as the guardians of privacy. Secondly, at the behavioural level, it analyses when and how the state intervenes in data breach incidents. The strategic framing in terms of discourse and varying responses to different cases in terms of practice collectively function to construct a cohesive image of the Chinese state as a guardian of privacy protection.

Methodology and theoretical framework

We use strategic framing as an analytical lens to examine the PRC’s discourse and behaviour, and to understand how Beijing justifies its approach to data sovereignty, particularly the strong state control over data flows. This article adopts a combination of qualitative text analysis and comparative case studies to understand the relationship between discourse and behaviour. At the discursive level, we use document analysis of the PRC's legislative regulations and official statements on data governance from 2016 to mid-2023. This timeframe covers the inception of the PRC's publication of cyber-related legislation, including the Cybersecurity Law and its subsequent policies and legislation (see ), and provides a contemporary lens for analysis. At the behavioural level, we use comparative case studies of two major data breach incidents in 2022 to show how the Chinese government used strategic framing to construct its image as privacy guardian, instead of violator, by attempting to align its actions with its rhetorical commitments.

Figure 1. The PRC’s data governance legislation and policies.

Figure 1. The PRC’s data governance legislation and policies.

Strategic framing

We employed Rodger Payne's (Citation2001) strategic framing as an analytical lens to better understand how the PRC justifies its approach to data sovereignty. Frames play a pivotal role as cognitive tools, allowing individuals or groups to organise their experiences and provide guidance for their actions (Snow et al. Citation1986). They achieve this by offering a structured set of assumptions through which events and information can be comprehended and interpreted. This can be likened to picture frames, where specific frames emphasise particular aspects of the pictures they enclose (Kuypers Citation2009). Through the act of framing issues in specific ways, individuals can ascribe meaning and significance to their experiences, thereby influencing their subsequent decisions and behaviours. By highlighting certain elements over others, frames enable people to filter their perceptions in particular ways (Ibid).

As such, framing serves as a discursive tactic used to “name, interpret, and dramatize issues”, thereby shaping broader social meanings and providing justifications for specific actions or policies (Payne Citation2001, 43). Framing gives meaning to facts that may otherwise lack intrinsic significance by placing them within a framework that organises and imparts coherence, selecting specific elements while disregarding others (Gamson Citation1989). Therefore, framing is persuasive as it allows certain actors to alter the pre-existing beliefs of others (Finnemore and Sikkink Citation1998). Consequently, framing is a crucial discursive tool for building norms and constructing normative relations (Acharya Citation2004).

However, as Payne (Citation2001) highlights, framing is not always employed by actors following the logic of appropriateness (March and Olsen Citation1998). Some actors use strategic framing to rename or reinterpret issues to minimise audience resistance and advance their hidden agendas (Payne Citation2001). Moreover, an actor can establish frame resonance by aligning new ideas with already accepted ones, making it easier to gain the target audience's trust and reduce resistance (Ibid).

This analytical lens facilitates our examination of the state's strategies in conveying its data governance priorities to various audiences. As our analysis will demonstrate, disparities exist between the state's discourse and its practical responses to different data breaches. Despite the PRC’s discursive efforts to justify its role as a privacy guardian, at the behavioural level, the mishandling of data protection by Chinese local authorities posed significant risks to individual privacy.

We argue that strategic framing functions at both discursive and behavioural levels to help the Chinese government bridge the gap between discourse and behaviour, aiming to construct an image of privacy guardian to justify strong state control over data flows. The strategic framing mechanisms include the reinterpretation of sources of privacy threats through political narratives, fostering legal ambiguity, employing selective framing, and implementing censorship to control public narratives. These mechanisms collectively function to mitigate resistance and legitimise state control over data collection and transfers.

Document analysis

We conducted two rounds of document analysis. Firstly, we examined how the Chinese government framed its role through its global initiative and its position paper Global Digital Governance. These broad efforts served as key frames, encompassing recurring themes that often appeared in other related documents. Secondly, we scrutinised all laws and regulations spanning 2016-23. Key themes emerged during this analysis, such as the securitisation of foreign actors’ handling of cross-border data as a matter of national security.

To code the data, we initially identified activities that had the potential to harm ‘public interests’ or ‘privacy’. These identified activities were then categorised as sources of threats to privacy. Since individual privacy represents just one facet of online human rights (Renieris Citation2023), we deliberately excluded passages that specifically addressed other aspects of digital human rights, focusing solely on privacy-related content during the coding process. Three coders with backgrounds in international relations and computer sciences independently coded the same dataset and convened regularly to review and resolve any discrepancies in coding, thereby ensuring a high level of inter-coder agreement.

The emphasis on the framing of discourses has its limitations. By concentrating on the deliberate use of framing as a tool of persuasion by the state, we primarily focus on the message-producing side rather than the message-receiving side. Although the frames presented in official documents do not guarantee automatic acceptance by either the international community or the state's own citizens, they do provide a framework for social order and stability in terms of normative expectations. Through our comparison of the state's rhetoric with its practices in the two selected cases, we aim to underscore that inconsistencies between discourse and practice can breed resentment and potentially exacerbate existing tensions between citizens and ICT companies on the one hand and the state on the other.

Comparative case studies

At the behavioural level, we use two cases of major data breach incidents in 2022 to demonstrate how the Chinese government employed strategic framing to construct its role as a privacy guardian. Both incidents took place in 2022 and entailed a substantial amount of data being exposed. Meanwhile, 2022 also witnessed the conceptualisation and implementation of broader regulatory frameworks for data governance. However, the Chinese government's response to these cases varied significantly.

The first case is that of Didi, China’s largest ride-sharing platform. Its overt collection, processing and alleged illegal transfer of data, led to the administrative penalties amounted to approximately RMB 8.026 billion, marking one of the largest regulatory penalties imposed on a Chinese tech company (Reuters Citation2022). The second case is the Shanghai National Police Database leak in July 2022. An extensive trove of data, amounting to 23 terabytes, which included sensitive personal details such as names, places of birth, national ID card numbers and phone numbers, was illicitly offered for sale online by an anonymous hacker (Ni Citation2022). If the scale of the data involved is accurate, this could potentially become the largest data leak scandal involving the Chinese government in the global history of data protection (Goh et al. Citation2022). The conspicuous absence of public discussions in mainstream media, corroborated by reports of relevant information within the Chinese internet being deleted, highlights a double standard when it comes to data breaches involving technology companies and state organs, which is consistent with the strategic framing of the PRC’s state actors as a privacy guardian.

Discursive level: the PRC's self-projection as a privacy guardian in official discourse

Through our document analysis, we find that the Chinese state’s efforts to portray itself as a protector of individual privacy are substantiated by a foundation of legal and policy documents. The PRC’s state organs disguise the potential of the state itself to be a privacy breacher in policy documents and create legal ambiguity in determining if state organs overtly collect or process data. The process of framing is highly strategic, orchestrated through the deliberate drafting and enactment of numerous legislations and policy documents that oversee data governance.

Notably, this institutionalisation process has gained momentum in the late 2010s, primarily as a response to allegations by Western actors regarding covert surveillance activities involving Chinese ICT companies like Huawei and TikTok (Williams Citation2020). As of May 2023, the PRC has enacted seven significant laws and regulations at the central state level. The PRC's legislative process is primarily driven by the state and is distinguished by its comprehensive and systematic approach (Wang Citation2022). The institutionalisation of this process commenced with broad policy appeals and subsequently evolved into the development of more targeted laws, regulations and measures. The rapid proliferation of the PRC's data security regulations primarily underscores its concerns regarding the susceptibility of the vast amount of data collected within its borders to foreign entities. Furthermore, these regulations are in alignment with the pressing need to address the aforementioned international accusations of Chinese companies mishandling user data by establishing domestic regulatory standards.

GIDS (2020) and the Position Paper on Digital Governance (2023)

The Foreign Ministry played a pivotal role in disseminating the PRC's position to both global and domestic audiences through the Global Initiative on Data Security (GIDS) (2020). According to the United Nations Development Group, “data security is crucial in ensuring data privacy and data protection” (United Nations Development Group Citation2017, 5). GIDS shows how the Chinese government understands and legitimises its data privacy protection efforts. It emerged as the overarching framework for government officials, lawmakers and state media to “name, interpret, and dramatize issues” (Payne Citation2001, 43), shaping the broader societal narratives related to privacy threats.

The Chinese government's commitment to data privacy protection is clearly articulated in GIDS, with recurring passages conveying the message that “states should take actions to prevent and put an end to activities that jeopardize personal information through the use of ICTs” (Ministry of Foreign Affairs of the PRC Citation2020). As such, the document highlights the central role of the state in countering data breach incidents by ICT service providers. GIDS was a response to the Clean Network Initiative introduced by the Trump administration to prevent the unauthorised access of sensitive data by Chinese IT vendors. Overall, GIDS established a comprehensive framework comprising eight key expectations for data regulation, offering guidance to both state and non-state entities. These expectations include ensuring supply chain security, safeguarding critical infrastructure, implementing anti-surveillance measures against other states and advocating for data localisation (Ibid).

The PRC's endeavours to engage with international and domestic audiences go beyond GIDS. Another noteworthy document is the Position Paper on Global Digital Governance (2023), which articulates the PRC's perspective on data governance. This position paper was presented to the Global Digital Compact, representing the PRC’s preferences for data governance on both the global and domestic scales (Ministry of Foreign Affairs of the PRC Citation2023). It provides comprehensive guidelines for national security at the collective level and personal privacy at the individual level.

Regarding data privacy protection, the position paper identifies “ICT products and services providers” and “other states” as potential violators, posing the risk of “jeopardiz[ing] personal information and privacy” or “massive surveillance against other states” (Ibid). However, like GIDS, the position paper does not make any references to the constraints placed on state actors themselves when collecting and processing individual privacy data within their own territories. Hence, both documents externalise the threats to data privacy, attributing them to ICT enterprises and other states.

Targeting both an international and domestic audience and widely circulated in both the PRC’s domestic and international media coverage, these two documents set normative expectations for their audiences regarding the Chinese government’s commitment to safeguard individual privacy rights through intra-state, inter-state and inter-stakeholder approaches. The Chinese government also strategically frames data governance issues in such a way that its target audiences can see how the newly proposed initiatives align with accepted ideas and practices related to human rights, such as the right to digital development and digital skills training (Ibid).

In other words, within these frames, the Chinese government consistently positions itself as the defender of individual privacy, attributing potential threats to large ICT service providers and foreign entities. The government portrays itself as actively combating illegal activities that encroach upon public interests and individual privacy, assuming the role of a mediator between ICT companies and the public in order to strike a balance between the ICT sector’s need for large datasets for innovation and the imperative of safeguarding individual privacy. As Mark Jia (Citation2023) observes, this image is beneficial for an authoritarian state. From a top-down perspective, the state must cultivate trust to foster the growth of its digital economy. From a bottom-up viewpoint, the invasion of privacy can potentially serve as a source of social instability, as the widespread use of personal data by the state, such as facial recognition technologies, may drive people to protest. Hence, authoritarian regimes derive advantages by presenting themselves as guardians of individual privacy, as this strategy helps bolster their perceived legitimacy. The benefit associated with monopolising privacy protection incentivises the authoritarian state to maintain framing consistency. Consequently, in specific cases, the state has to adapt its framing to ensure that its actions appear consistent with the image it has constructed.

Domestic legal framework development

Domestically, the PRC has been actively developing its legal and policy framework regulating data collection and flows. These efforts build upon the 2016 Cybersecurity Law, with the security component drawing upon the principles outlined in the 2015 National Security Law. Most data governance regulations have been introduced since 2021 (see ). While there are commitments made in promoting national security, safeguarding public interests and advancing economic digitisation, this legal and policy framework contains areas where policy goals may clash due to legal ambiguities.

For example, Article 28 of the 2016 Cybersecurity Law delineates the obligation of network operators to provide technical support for public and national security organs in protecting national security and investigating criminal activities, in compliance with legal provisions. In this context, when deemed essential, national security considerations supersede concerns related to the protection of privacy. The legislation also operates on the premise that potential threats to public interests associated with privacy protection predominantly emanate from technology companies and foreign entities. This also aligns with our findings from the document analysis of the abovementioned GIDS and the PRC’s position paper.

Moreover, Article 37, in a more specific vein, deals with data localisation, obligating network operators to store their data within the territorial confines of the PRC and to obtain authorisation from the Cyber Administration of China (CAC) and State Council when planning cross-border data transfers. This law grants the state significant authority to intervene in the operations of technology companies by defining whether a certain data breach becomes an issue of national security. Furthermore, it obliges companies to ‘alert’ the government when engaging in cross-border data transfers, thereby affording the government the capability to halt such transfers if necessary.

The legislative landscape is shaped by laws enacted by the National People's Congress, most notably the 2021 PIPL and the 2021 DSL. Modelled on the GDPR, PIPL represents the PRC's first comprehensive legislation designed to regulate the protection of personal information (Junck et al. Citation2021). It does not overlook the possibility of data privacy breaches within government organisations either. Section 3 of the law specifically outlines the requirements for state organs.

However, legal ambiguity arises when state organs are mandated to confine their utilisation of personal data within the “scope and limits necessary to fulfil statutory duties” (Xinhua Citation2021), as the legislation does not elucidate the precise definition of what qualifies as ‘necessary’ in this context. It also mandates that state organs notify individuals when processing personal information. Nevertheless, there is an exception to the notification requirement when a notification could impede the ability of state organs to carry out their official duties. Afterall, state organs have significant authority in determining the extent and constraints they consider ‘necessary’ when it comes to their own collection of personal data. This legal ambiguity creates room for state organs to justify their breaches of the PIPL in practice. Likewise, Chapter V of the DSL is dedicated to limiting the authority of state organs in their acquisition and utilisation of personal data. While it instructs state organs to act within the confines required to fulfil their statutory obligations, it leaves room for open interpretation regarding the precise scope necessary for the state, the CAC and data operators.

When framing threats to individual privacy, the PRC classifies data based on its potential to be used against national security concerns and its sheer volume. The DSL places heightened emphasis on the categorisation of ‘core data’ and substantial volumes of data in cross-border flows, deeming them as more critical to national security and therefore necessitating more stringent state controls. Article 21 of the DSL defines ‘core data’ as data pertaining to national security, the lifelines of the national economy, important aspects of people's lives and major public interests. This framing enables the state to categorise specific data as a security concern, distinguishing it from both ‘important data’ and ‘other data’ (Bi Citation2021). However, the definition of ‘core data’ remains ambiguous, offering limited guidance to practitioners when it comes to making decisions and taking concrete actions (Lai Citation2021). Hence, the ambiguity surrounding the classification of ‘core data’ may give rise to various interpretations in practice.

In addition to these major legal pillars, the Chinese government, including bodies like the State Council and the Cyberspace Administration of China (CAC), regularly issues supplementary measures and regulations aimed at providing operational-level clarity and guidance.

The State Council has taken steps to provide clarity concerning critical information infrastructure (CII). In 2021, it issued the Regulations on CII Security Protection (关键信息基础设施安全保护条例), which delineated the specific responsibilities of companies designated as CII operators. These regulations outlined their obligations to report security-related issues to both the CAC and the National Security authorities. As will be discussed in the case studies section, this clarification allowed the Party-state to frame Didi Chuxing's excessive collection of personal data as a lapse in its role as a CII operator.

In November 2021, the CAC extended the PRC's data governance jurisdiction beyond its territorial borders. This clarification came in the form of the draft Regulations on Network Data Security Management (网络数据安全管理条例(征求意见稿)). This new draft brought data handlers listed in Hong Kong under the purview of cybersecurity review (Kurth Citation2022). At the time of writing, the draft Regulations on Network Data Security Management remain in the discussion phase, with the Chinese government seeking public feedback.

In February 2022, the CAC, in collaboration with 12 other government organisations, introduced a revised version of the Cybersecurity Review Measures (网络安全审查办法), replacing the prior iteration from April 2020 (Guo and Li Citation2022; Cyberspace Administration of China et al. Citation2022). The involvement of several government organisations underscores the profound national security considerations underpinning these measures. Notably, the National Administration of State Secret Protection and the PRC’s State Cryptography Administration, typically less prominent in day-to-day state affairs, were among the key contributors to this effort. These new measures also provide clarity regarding the threshold at which the sheer volume of data becomes a matter of security concern. According to Article 7, operators holding personal information of more than 1 million users are mandated to undergo a cybersecurity review prior to conducting their overseas initial public offering, as the sheer volume of data itself, if analysed by foreign entities, can potentially yield insights that could pose a threat to national security.

In May 2022, the CAC further clarified the rules for network operators’ activities pertaining to cross-border data transfers through the publications of the Measures for Security Assessment of Cross-Border Data Transfers (数据出境安全评估办法). These measures require operators to report to their local cybersecurity administrations and conduct a thorough security risk assessment before engaging in such transfers. In effect, this empowers cybersecurity administration authorities to terminate cross-border data transfers in the interest of data security.

In summary, at the discursive level, the PRC's Ministry of Foreign Affairs strategically reframes the sources of data privacy threats for both domestic and international audiences. Threats to personal privacy are strategically framed as emanating from ICT products and services providers and other states, effectively redirecting accountability away from state actors operating within their own jurisdictions. In addition, the National People's Congress formulates laws to show the state's commitment to limiting even its own powers to prevent the excessive collection of personal data. Subsequently, the government, mainly the State Council and the CAC, issues measures and regulations to provide further operational-level clarity for the implementation of these laws. However, there is a legal ambiguity concerning the degree to which state organs consider it necessary to fulfil their statutory duties. This ambiguity opens the door to potential contestation by different state organs and leaves a legal loophole that could lead to privacy infringements by state actors themselves.

Behavioural level: comparative case studies of Didi and Shanghai National Police data leak

This section draws a comparison between two significant data breaches in 2022: the delisting of Didi Chuxing, including the subsequent investigation and fine imposed by Chinese authorities, and the Shanghai National Police Database leak. These two cases occurred around the same time but received notably distinct levels of public attention in the PRC due to selective framing and censorship tactics. By using these tactics, the Chinese state has sought to organise events into a cohesive narrative that is aligned with its discursive commitment, bolstering its self-image as a defender of individual privacy and providing rationale for its stringent state control over cross-border data transfers.

Didi

Didi’s data breach and national security infringement were widely publicised in the PRC in 2022. Founded in 2012, Didi swiftly rose to prominence as the country’s largest ride-sharing platform. The company made a significant move in 2016 by acquiring Uber's operations in the PRC, further solidifying its dominance in the Chinese market. By maintaining an extensive repository of consumer data, including crucial location and mapping information, Didi places itself under the jurisdiction of the DSL. Notably, the Didi app gathers detailed information about its drivers, including their location and speed, recorded at intervals of every three seconds (Etherington Citation2016). This wealth of data can be seen as a substantial privacy and national security concern, as possessing detailed knowledge of specific locations and the individuals who frequently access them could potentially enable foreign entities to gather personal information about important governmental officials and strategic sites. Despite claims made by Didi's Chief Technology Officer, Bob Zhang, that the data was anonymised (Ibid), the broad scope of data collected proved to be a source of concern, as evidenced by the CAC’s subsequent charge against it. Didi’s data collection encompasses a staggering 120 types of information, ranging from users’ identity and banking details to their location, device information, and even text data such as nicknames and status updates generated within Didi's ecosystem.

However, the extensive data collection was not solely driven by business concerns. As a platform operating within the PRC, Didi is legally obliged to cooperate with security departments to safeguard the wellbeing of both its drivers and passengers. This means that Didi is obligated to use its data and algorithmic capabilities to help law enforcement identify and prevent ‘unsafe’ behaviour. To this end, Didi has implemented data collection and analysis measures, using sensors and location data from both drivers’ and passengers’ cell phones. An example of Didi-police collaboration pertains to background and safety checks for drivers. To carry out comprehensive screenings, Didi worked with law enforcement to obtain access to drivers’ criminal records and employed facial recognition technology (Didi Global Citation2020). Furthermore, the alarm function in the Didi app, which allows users to contact the police with a single click, facilitates data sharing between the user and law enforcement authorities. Moreover, Didi’s Safe Driving System allows dashboard cameras and microphones to capture a wide range of crucial information, including road conditions, instances of reckless driving, driver-passenger disputes and potential signs of fatigue (Xiao Citation2017).

The substantial volume of data and AI training enabled the company to venture beyond the commercial sector and into digital utilities. The collected data played an indispensable role in the Traffic Information Platform, delivering real-time traffic updates and invaluable insights to transport authorities across the PRC. Through its contributions to this platform, Didi solidified its position as a crucial component of the infrastructure for smart and digital cities. Consequently, Didi emerged as an innovative solution that went beyond ride-sharing services, contributing to tackling urban planning challenges and addressing public discontentment.

While Chinese authorities had enlisted Didi for more efficient security governance and urban planning, they remained uncompromising when accusing the company of breaching privacy after its cross-border data transfers were associated with national security concerns. Shortly after the DSL came into effect, the CAC promptly issued a notice for the removal of Didi from app stores (People’s Daily Citation2021). At the time, the CAC allowed Didi some time to rectify its excessive collection of personal data and did not impose any fines. However, when Didi later decided to list on the New York Stock Exchange (NYSE), the risks associated with cross-border data transfers became more pronounced, underlying the government’s concerns that such data transfers could potentially compromise national security.

On 21 July 2022, the CAC imposed administrative penalties on the company, alleging that Didi had violated all data security laws, including the CSL, DSL and PIPL (People’s Daily Citation2022). The administrative fines amounted to approximately RMB 8.026 billion (EUR 1.043 billion), with Didi's Chairman and CEO, Cheng Wei, and President, Liu Qing, each being fined RMB 1 million (EUR 130 million). This establishes a noteworthy precedent, marking the highest fine imposed in the global history of data protection (Goh et al. Citation2022), surpassing the EUR 743 million fine for Amazon's violation of GDPR.

It is interesting to note that while the substantial fines were primarily driven by concerns about data being exploited by foreign entities and the associated potential national security risks, the charges issued by the CAC primarily framed Didi's violation in terms of its infringement on individual privacy, which resonated more strongly with broader public concerns. The CAC identified 16 types of alleged illegal activities by Didi, none of which were explicitly linked to national security. However, it did assert that Didi's data processing posed risks to CII and data security. These specific risks were not disclosed to the public due to their implications for national security (People’s Daily Citation2022).

The above analysis of the Didi case offers a nuanced perspective, highlighting that the excessive collection of personal data can become a heightened national security concern once cross-border data transfers occur. At this juncture the elevated risk of foreign entities using the data for intelligence and surveillance purposes comes into focus. Given the nature of Didi's business operations, it can easily be categorised as having potential national security implications, owing to the sensitive nature of the information it collects – particularly location information – and the substantial volume of data it amasses, exceeding one million users. The timing of the CAC's investigation, coinciding with Didi's listing on the NYSE, carries significant implications, as it underscores that the key consideration lies in cross-border data transfers in this context.

The Didi case presents an opportunity for the Chinese government to frame itself as a staunch defender of individual privacy against violations by ICT service providers. Didi's privacy infringement issue was not publicly announced and fines were imposed only after cross-border data transfers were identified when the company announced its NYSE listing. In other words, privacy concerns were raised and brought into focus when the potential threat to national security was deemed significant. This created a convergence between individual privacy, national security and regime stability concerns, enabling the government to label Didi as an exploitative company whose excessive collection of personal data poses a threat not only to citizens but to the collective interests of the state. However, within this framing, the contributions of Didi's prior data collection and AI capabilities to government security governance and urban planning are downplayed, which obscures the shared responsibility of state organs in the overt data collection facilitated by Didi.

Shanghai National Police Database Leak

In July 2022, an anonymous hacker known as ‘ChinaDan’, offered to sell over 23 TB of data for 10 bitcoins (approximately equivalent to USD200,000) on the hacker forum Breach Forum. These databases comprise information on 1 billion Chinese national residents, encompassing sensitive details such as ID numbers, mobile numbers and even crime-related information (Goh et al. Citation2022; Ni Citation2022; Hurst Citation2022).

The Chinese authorities have never officially acknowledged the existence of this data privacy breach. Despite receiving extensive coverage in international media and sparking heated discussions on the PRC's social media platforms, which were subsequently censored in the country’s domestic internet domain, the Chinese government refrained from making any official comments and maintained a conspicuous silence regarding the data leak scandal. Nevertheless, The Wall Street Journal managed to verify the accuracy of the hacked information by confirming the story with five affected individuals (The Economist Citation2022).

One hypothesis is that the leak occurred due to the Shanghai Police’s failure to adhere to data security protocols and data protection practices (Goh et al. Citation2022). Another ascribes the leak to an unsecured backdoor link (Xiong et al. Citation2022). The data had been reportedly left unsecured for 14 months on Alibaba’s cloud servers without any protective measures (Kaur Citation2022). It was only when ChinaDan placed it for ransom that it garnered significant attention (Tang Citation2022; Qin Citation2022; Xiong et al. Citation2022). As Alibaba Cloud had secured the bid for the Smart Public Security Comprehensive Service Platform Construction Project of the Shanghai Public Security Bureau on 15 July 2019, the subsequent summoning of executives from its computing division has been seen by some as an indication that the police were shifting the blame to them for the mishandling of the data (Kaur Citation2022; Tang Citation2022). In September 2023, a report revealed that an unnamed contractor had used government data for testing purposes, failing to fulfil its obligations in terms of data security during data processing (Xiaoxiang Morning Herald Citation2023). Lacking a data security management system, its storage systems had vulnerabilities, resulting in the leakage of citizens’ data – which was subsequently sold overseas – and an extensive privacy infringement (Ibid). The Shanghai Municipal Cyberspace Administration collaborated with relevant departments to investigate the matter and subsequently requested that the company take down the website and close the relevant cloud service ports, in addition to imposing administrative penalties (Ibid). Later, it came to light that the contractor had been held accountable for its negligence. The repercussions included the suspension of their services and the imposition of administrative penalties. Interestingly, however, these penalties appeared relatively lenient when juxtaposed with similar instances of data breaches (GoUpSec Citation2024). This suggests that the contractor may have been used as a scapegoat for the government's own negligence.

The way in which the leak has been handled illustrates that even though the state has remained conspicuously silent in public discussions, it is evidently aware of the risks linked to this scandal. As mentioned, in authoritarian states, safeguarding privacy also serves as a means for the regime to bolster its legitimacy (Jia Citation2023). The dramatic failure of the state to comply with its own data protection laws undermines the frame of the state as a guardian of individual privacy. While local authorities attempted to deflect responsibility onto the contractor, it is undeniable that the local authorities, and therefore the state, bear accountability for their failure to adequately oversee the storage of data.

Notably, the government did not raise a significant outcry in this instance. It is likely that the sheer magnitude and sensitivity of the data involved in this case were such that if the government were to acknowledge it, public anger over the government’s own failure in safeguarding privacy might overshadow their anger toward foreign entities. This can pose a risk to regime stability, as it has become a common practice in the PRC for state actors to collect and store vast amounts of data through digital technologies, such as facial recognition and video surveillance (Zeng Citation2022). Ultimately, it is the government that decides to collect and store this data, therefore the discourse surrounding these incidents does more harm than good to the state's framing efforts.

In comparison, the data involved in the Shanghai National Police Database case is a staggering 1,000 times larger than that of Didi, yet the publicly announced penalties imposed on those held accountable were disproportionately lower (see ). This highlights the state's consistent efforts to frame itself as a guardian of individual privacy, selectively emphasising cases where individual privacy protection, national security and regime stability align, while downplaying instances where state actors could face accountability for mishandling data, due to concerns about jeopardising regime stability and legitimacy. Even in cases where there is an apparent government failure, it has sought to frame itself as the victim and shifts the blame onto contractors. Instead of using denial and condemnation to redirect public anger toward foreign entities, the state maintained a conspicuous silence in this instance, thereby avoiding further public attention that could potentially destabilise the regime itself.

Table 1. Privacy infringements by the PRC’s state and non-state actors.

Conclusion

This article illustrated that the Chinese legislative bodies and the government have used strategic framing to construct themselves as a privacy guardian instead of a potential privacy violator, especially when addressing their domestic audience. Such a strategic framing mechanism includes:

  1. Reinterpreting sources of threat in the 2020 GIDS and 2023 position paper

  2. Legal ambiguity in the legislative process to govern data flow

  3. Selective framing and censorship in major data breach incidents, exemplified by two significant scandals – the Didi case and the Shanghai National Police Database leak

As an authoritarian state, the PRC perceives data as a vital resource that necessitates strict state oversight, emphasising territorial control despite the inherently de-territorialised nature of data. The extent to which collected data can be used by foreign entities determines the Chinese government’s level of interference toward privacy infringements in practice. In the case of Didi, government intervention became coercive when the necessity for cross-border data transfers arose. The convergence of individual privacy, national security and regime stability concerns meant that it was in the government's interest to emphasise the illegal activities committed by Didi, even though the government had previously co-opted the company in security governance and urban planning. Interestingly, while the government has asserted that Didi's practices posed a national security risk, all the publicly listed illegal activities were connected to individual privacy. The government exhibited a starkly contrasting stance in the Shanghai National Police Database case, which encompassed data on a scale 1,000 times greater than that of Didi. Nevertheless, the punitive measures were glaringly disproportionate given that state actors were accountable for mismanagement of the database. Overall, through these mechanisms, the Chinese government, mainly the CAC, has sought to maintain coherence across discourse and behaviour in presenting the party-state as the guardian of individual privacy, further justifying strong state control over data collection and flows.

The PRC's approach to data sovereignty, however, also highlights the shared concerns seen in the CLOUD Act and GDPR in terms of the need to exert territorial control over data, despite different motives and norms that have been driving this tendency. As Xinchuchu Gao (Citation2022) argues, the lines between the PRC's sovereignty-oriented approach and the ‘Western’ approach are becoming increasingly blurred. The PRC's emphasis on data sovereignty and concerns about data abuse by foreign entities inevitably resonate with many other countries, both democratic and authoritarian, in the context of rising geopolitical tensions. This warrants further discussion regarding the extent to which various countries converge in their regulatory practices in the data governance realm, as well as the underlying reasons for such convergence.

Acknowledgements

The authors are immensely grateful to the three anonymous reviewers who helped refine the arguments, enhance the analysis, and elevate the overall quality of this paper. They wish to extend their heartfelt thanks to the editors for their exceptional editorial support and timely communication.

Additional information

Notes on contributors

Ruoxi Wang

Ruoxi Wang received her PhD from the School of International Relations at the University of St Andrews, St Andrews, United Kingdom. She is a Research Fellow at the Centre for Global Law and Governance at the University of St Andrews. Email: [email protected]

Chi Zhang

Chi Zhang is an Associate Lecturer at the University of St Andrews, St Andrew, United Kingdom.

Yaxiong Lei

Yaxiong Lei is a PhD candidate at the School of Computer Science at the University of St Andrews, St Andrews, United Kingdom. Email: [email protected]

References