Hogan Lovells - Asia-Pacific Data, Privacy and Cybersecurity Guide 2025 - Flipbook - Page 19
Asia-Pacific Data Privacy and Cybersecurity Guide 2025
19
such as data of undisclosed territorial land,
territorial waters, and airspace;
· Data reflecting the overall operation,
development and security protection
of critical information infrastructure
and its core software and hardware
asset information and supply chain
management, which could be used to carry
out cyberattacks on critical information
infrastructure, such as data related to system
configuration information, system topology,
emergency plans, assessments, operation
and maintenance, and audit logs of critical
information infrastructure;
· Data which could be used by other countries
or organisations to launch a military strike
against China, or reflect China’s strategic
reserves, emergency mobilisation, combat
capabilities, etc., such as geographical data
which meets certain accuracy indicators or
data related to the capabilities and reserves
of strategic goods;
· Data directly affecting the order of market
economy, such as data which supports the
core business operations of industries and
fields with critical information infrastructure
or the production of important
economic sectors;
· Data reflecting the characteristics of China’s
language and writing system, history,
customs and habits, national values, etc.,
such as data which records historical and
cultural heritage;
· Data reflecting the physical security
protection of key targets and important
places or the location of undisclosed
geographical targets, which could be used
by terrorists and criminals to cause damage,
such as construction drawings, internal
structures, and security data describing
key security units, important production
enterprises, and important national assets
(such as railways and oil pipelines);
· Data related to China’s scientific
strength, affecting China’s international
competitiveness, or related to export control
items, such as data reflecting major national
scientific and technological innovation
achievements, or describing the design
principles, process flows, and production
methods of export-restricted or
export-prohibited items, as well as data
involving source codes, integrated circuit
layouts, technical solutions, important
parameters, experimental data, and
test reports;
· Data involving undisclosed attack methods,
attack tools production methods, or attack
support information, which could be used
to launch supply chain attacks, social
engineering attacks, and other cyberattacks
on key targets, such as sensitive customer
lists of governments, military units, etc., as
well as undisclosed data on the procurement
of products and services and undisclosed
data on major vulnerabilities;
· Data which reflect the basic conditions of
the natural environment, the production
and living environment, or which could
be used to cause environmental safety
incidents, such as undisclosed data related
to soil, meteorological observations, and
environmental monitoring;
· Data reflecting the reserves and development
and supply of resources, including water
resources, energy resources, land resources
and mineral resources, such as unpublished
data describing hydrological observation
results, changes in cultivated land area
or quality;
· Data which reflect the situation of nuclear
materials, nuclear facilities, and nuclear
activities, or which could be used to cause
nuclear damage or other nuclear safety
incidents, such as data related to the design
drawings of nuclear power plants and the
operation of nuclear power plants;