
China's Approach to Cross-Border Data Flow Governance in the Context of Global Competition
Wanxiu Xu, Xiaodong Zuo
Strategic Study of CAE ›› 2025, Vol. 27 ›› Issue (1) : 111-121.
China's Approach to Cross-Border Data Flow Governance in the Context of Global Competition
Currently, the digital power struggle centered around cross-border data flows has entered a critical phase, with the global competition landscape taking shape. China places high importance on the security governance of cross-border data flows and, after several iterations and optimizations, has developed a unique governance model that balances data security and development. This model offers a Chinese solution to the global data governance challenge. This study analyzes the multiple challenges in achieving secure and trusted cross-border data circulation, deconstructing the existing global governance competition from three perspectives: international organizations, trade agreements, and major economies. It provides a comprehensive examination of China's governance model that balances data security and development. Grounded in the overall national security concept, this model aims to "coordinate security and development", with secure and trusted data circulation as the evaluation benchmark. It reflects strong Chinese characteristics and innovative elements, supporting strategic goals such as national security, digital trade promotion, and expanding opening-up. Based on this, the study offers policy recommendations for the further enhancement of China's governance framework from a global perspective. These recommendations focus on optimizing governance principles, fostering international cooperation, prioritizing technological governance, strengthening talent development, and advancing international advocacy initiatives.
global data competition / cross-border data flow governance / data security / digital trade / Chinese solution
[1] |
Manyika J, Lund S, Bughin J, et al. Digital globalization: The new era of global flows [EB/OL].(2016-02-24)[2024-11-25]. https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/digital-globalization-the-new-era-of-global-flows.
|
[2] |
Burri M. Cross-border data flows and privacy in global trade law: Has trade trumped data protection? [J]. Oxford Review of Economic Policy, 2023, 39(1): 85‒97.
|
[3] |
茶洪旺, 付伟, 郑婷婷. 数据跨境流动政策的国际比较与反思 [J]. 电子政务, 2019 (5): 123‒129.
Cha H W, Fu W, Zheng T T. International comparison and reflection on cross-border data flow policies [J]. E-Government, 2019 (5): 123‒129.
|
[4] |
陈兵, 徐文. 数据跨境流动的治理体系建构 [J]. 中国特色社会主义研究, 2021, 12(4): 67‒75.
Chen B, Xu W. Establishing a governance system of the flow of data across borders [J]. Studies on Socialism with Chinese Characteristics, 2021, 12(4): 67‒75.
|
[5] |
单文华, 邓娜. 欧美跨境数据流动规制: 冲突、协调与借鉴——基于欧盟法院"隐私盾"无效案的考察 [J]. 西安交通大学学报(社会科学版), 2021, 41(5): 94‒103.
Shan W H, Deng N. Conflict, coordination and reference of transborder data flow regulation between the EU and the U.S.: Comment on the "schremsⅱ" of CJEU [J]. Journal of Xi'an Jiaotong University (Social Sciences), 2021, 41(5): 94‒103.
|
[6] |
冯硕. 美国数据霸权的建构与法律应对 [J]. 太平洋学报, 2023, 31(8): 45‒58.
Feng S. Construction of the U.S. data hegemony and China's legal responses [J]. Pacific Journal, 2023, 31(8): 45‒58.
|
[7] |
O'Hara K, Hall W. Four internets: Data, geopolitics, and the governance of cyberspace [M]. Oxford: Oxford University Press, 2021.
|
[8] |
Timasheff N S. The basic concepts of sociology [J]. American Journal of Sociology, 1952, 58(2): 176‒186.
|
[9] |
Cory N, Dascoli L. How barriers to cross-border data flows are spreading globally, what they cost, and how to address them [EB/OL].(2021-07-19)[2024-11-25]. https://itif.org/publications/2021/07/19/how-barriers-cross-border-data-flows-are-spreading-globally-what-they-cost/.
|
[10] |
孙宝云, 李艳, 齐巍. 网络安全影响政治安全的微观分析——以"剑桥分析"事件为例 [J]. 保密科学技术, 2020 (4): 27‒34.
Sun B Y, Li Y, Qi W. Micro-analysis on the influence of network security on political security—Taking "Cambridge analysis" as an example [J]. Secrecy Science and Technology, 2020 (4): 27‒34.
|
[11] |
University D, Li W, Leung A, et al. Where is IT in information security? the interrelationship among IT investment, security awareness, and data breaches [J]. MIS Quarterly, 2023, 47(1): 317‒342.
|
[12] |
Apple. Report: 2.6 billion personal records compromised by data breaches in past two years—Underscoring need for end‑to‑end encryption [EB/OL]. (2023-12-07)[2024-11-25]. https://www.apple.com/newsroom/2023/12/report-2-point-6-billion-records-compromised-by-data-breaches-in-past-two-years/.
|
[13] |
Perez C. Technological revolutions and techno-economic paradigms [J]. Cambridge Journal of Economics, 2010, 34(1): 185‒202.
|
[14] |
陈兵. 数字企业数据跨境流动合规治理法治化进路 [J]. 法治研究, 2023, 146(2): 34‒44.
Chen B. The legal approach to compliance governance of cross border data flow in digital enterprises [J]. Rearch on Rule of Law, 2023, 146(2): 34‒44.
|
[15] |
World Economic Forum. Agile governance: Reimagining policy‐making in the Fourth Industrial Revolution [R]. Davos Kloster: World Economic Forum, 2018.
|
[16] |
Kobrin S J. Territoriality and the governance of cyberspace [J]. Journal of International Business Studies, 2001, 32(4): 687‒704.
|
[17] |
Mayne A J, Collingridge D. The social control of technology [J]. The Journal of the Operational Research Society, 1982, 33(8): 771.
|
[18] |
中国信息通信研究院. 全球数字经贸规则年度观察报告(2024年) [EB/OL]. (2024-09)[2024-11-25]. https://www.caict.ac.cn/kxyj/qwfb/bps/202409/P020241212359348707348.pdf.
China Academy of Information and Communications Technology. Annual observation report on global digital economic and trade rules (2024) [EB/OL]. (2024-09)[2024-11-25]. https://www.caict.ac.cn/kxyj/qwfb/bps/202409/P020241212359348707348.pdf.
|
[19] |
薛志华, 曾德华, 孟奇勋. 日本跨境数据流动监管的制度实践及中日合作展望 [J]. 国际贸易, 2024 (6): 24‒31.
Xue Z H, Zeng D H, Meng Q X. Institutional practice of cross-border data flows regulation in Japan and prospects for Sino-Japanese cooperation [J]. Intertrade, 2024 (6): 24‒31.
|
[20] |
范婴. 印度数据本地化的范式评述及其对中国的启示 [J]. 中国科学院院刊, 2023, 38(8): 1177‒1186.
Fan Y. Paradigm review of data localization in India and its implications for China [J]. Bulletin of Chinese Academy of Sciences, 2023, 38(8): 1177‒1186.
|
[21] |
王超. 数据安全视角下国际数据跨境流动模式分析 [J]. 保密科学技术, 2023 (1): 14‒19.
Wang C. Analysis of international data cross-border flow mode from the perspective of data security [J]. Secrecy Science and Technology, 2023 (1): 14‒19.
|
[22] |
Xu W X, Wang S, Zuo X D. Global data governance at a turning point? Rethinking China‒U.S. cross-border data flow regulatory models [J]. Computer Law & Security Review, 2024, 55: 106061.
|
[23] |
刘跃进. 非传统的总体国家安全观 [J]. 国际安全研究, 2014, 32(6): 3‒25, 151.
Liu Y J. Non-traditional concept of overall national security [J]. Journal of International Security Studies, 2014, 32(6): 3‒25, 151.
|
[24] |
许皖秀, 左晓栋. 关于借鉴欧盟政策加强个人信息跨境传输安全认证制度建设的建议 [J]. 网络安全与数据治理, 2022, 41(12): 40‒44.
Xu W X, Zuo X D. Suggestions on learning from EU policies to strengthen cross-border transfer of personal information for the construction of a security certification system [J]. Cyber Security and Data Governance, 2022, 41(12): 40‒44.
|
[25] |
梅傲, 陈子文. 总体国家安全观视域下我国数据安全监管的制度构建 [J]. 电子政务, 2023 (11): 104‒115.
Mei A, Chen Z W. System construction of data security supervision in China from the perspective of overall national security concept [J]. E-Government, 2023 (11): 104‒115.
|
[26] |
洪延青. 国家安全视野中的数据分类分级保护 [J]. 中国法律评论, 2021 (5): 71‒78.
Hong Y Q. Data classification and hierarchical protection in the vision of national security [J]. China Law Review, 2021 (5): 71‒78.
|
[27] |
左晓栋. 我国数据安全法治治理体系建设的回顾与展望 [J]. 国家治理, 2023 (23): 32‒37.
Zuo X D. Review and prospect of the construction of data security governance system by law in China [J]. Governance, 2023 (23): 32‒37.
|
/
〈 |
|
〉 |