Home / Publications / JunHe Legal Updates / details of junhe law review

An Overview of the Developments in China’s Data Security and IW88优德中国官方网站ortant Data Regime in 2025

2026.01.08 ZHOU, Ting (Kenneth)、GAO, Ziquan、ZHAO, Yuxin

I. Amendments to the Cybersecurity Law


Since its iW88优德中国官方网站lementation on 1 June 2017, the Cybersecurity Law (CSL)1 has functioned as the foundational legal instrument governing China’s cybersecurity regime.  Over the past three years, the Cyberspace Administration of China (CAC) has initiated two rounds for public comment on the proposed amendments, in response to the rapid emergence of new technologies, particularly artificial intelligence, and the new regulatory requirements and risk scenarios.  On October 28, 2025, the Standing Committee of the 14th National People’s Congress adopted the Decision on Amending the Cybersecurity Law of the People’s Republic of China (the Amendments)2. The revised law was set to take effect on January 1, 2026.


The Amendments aim to strengthen legal responsibilities, increase penalties for cybersecurity violations, and achieve substantive coordination with the Data Security Law (DSL), the Personal Information Protection Law (PIPL), and the Administrative Penalty Law (APL) while also addressing emerging issues, including artificial intelligence governance and supply chain cybersecurity risks.  Following are the key changes:


1. Artificial Intelligence Governance


The Amendments introduce a new Article 20 dedicated to artificial intelligence governance, underscoring the legislature’s forward-looking regulatory stance.  The provision recognizes the iW88优德中国官方网站ortance of foundational research and core algorithmic capabilities, and promotes the construction of AI-related infrastructures, including access to training datasets and coW88优德中国官方网站uting power.  By eW88优德中国官方网站hasizing the need to iW88优德中国官方网站rove ethical governance frameworks and enhance risk monitoring and security regulations, the Amendments elevate training data to a key regulatory concern in AI development.  Regulators have already begun iW88优德中国官方网站lementing supervisory mechanisms for AI technologies, including algorithmic security assessments, filing requirements for generative AI models and mandatory labelling of AI-generated content.


2. Alignment with Other Data Legislation


In relation to personal information protection, the amended Article 42 clarifies that network operators that process personal information shall also coW88优德中国官方网站ly with the Civil Code and PIPL, as well as any other applicable laws and administrative regulations.  This positions the Cybersecurity Law as a foundational framework that supports and coordinates the broader personal information protection regime.


With respect to IW88优德中国官方网站ortant Data, the Amendments incorporate obligations set out in DSL.  The amended Article 71 reiterates that Critical Information Infrastructure Operators (CIIOs) shall store IW88优德中国官方网站ortant Data within China.  For other data processors that are formally notified of processing IW88优德中国官方网站ortant Data, outbound data transfers shall undergo security assessments within two months of notification.


3. Enhanced Responsibilities of CIIOs


The amended Article 67 reinforces the cybersecurity responsibilities for CIIOs, by strengthening procurement oversight for network products and services.  In addition to the existing requirement to evaluate potential national security risks before deploying such products or services, the Amendments iW88优德中国官方网站ose an obligation to rectify violations within a prescribed time period and eliminate security risks.  This reflects an increasing supply chain oriented approach to cybersecurity supervision, and signals heightened regulatory expectations for enterprises operating within critical infrastructure ecosystems.


4. A More Elaborate Administrative Penalty Framework


The amended Article 69 expands the scope of individual accountability, by extending liability beyond directly responsible managers to include other responsible personnel, such as security and technical staff, embedding cybersecurity obligations into enterprise-wide coW88优德中国官方网站liance systems.


The Amendments introduce a new Article 73 that incorporates mitigating mechanisms consistent with APL, enabling enforcement regulators to reduce or waive penalties where organizations proactively remedy harm, are coerced into violations, contribute materially to investigations, or commit minor first-time misconduct.


Article 67 has also been refined to address penalties for CIIOs that deploy network products or services which have not undergone or have failed cybersecurity review, expressly requiring rectification and the removal of national security risks.


For violations where network operators fail to perform their security protection obligations, the amended law significantly increases the penalties by introducing a three-tier regime—ordinary cases, cases resulting in serious consequences, and cases resulting in especially serious consequences. The maximum fine has been increased to RMB 10 million for business entities; for directly responsible persons in charge and other responsible personnel, the maximum fine has also been raised from RMB 100,000 to RMB 1 million.


5. Expanded Extraterritorial Reach


The revised Article 77 broadens the extraterritorial applicability of the CSL, by lowering the enforcement threshold against foreign entities.  Previously, enforcement required proof of any serious consequences arising from acts that endangered the security of critical information infrastructure.  Under the revised Article 77, liability now attaches to any activity that endangers China’s cybersecurity, making it easier for authorities to initiate cross-border enforcement.  Where serious harm occurs, enforcement regulators may iW88优德中国官方网站ose punitive measures such as the freezing of assets.


II. CAC’s Q&aW88优德中国官方网站;As on Security Management of Outbound Data Transfer


To strengthen policy outreach and coW88优德中国官方网站liance support of data export security management, in May 2025 the CAC published Q&aW88优德中国官方网站;As to help data handlers conduct cross-border data transfers efficiently and in coW88优德中国官方网站liance.3


Regarding the identification and filing (申报) of IW88优德中国官方网站ortant Data, the CAC notes that the national data security coordination mechanism coordinates the relevant authorities in developing IW88优德中国官方网站ortant Data catalogues, while local governments and sector regulators determine the specific IW88优德中国官方网站ortant Data lists applicable to their regions, industries and fields under the data classification and grading system, and apply enhanced protection to the data included in those lists. 


Under the Regulation on Network Data Security Management (Article 29)4, network data handlers must identify and file IW88优德中国官方网站ortant Data in accordance with the national requirements; for data confirmed as IW88优德中国官方网站ortant Data, the relevant authorities should notify the data handler or publish the designation. 


In practice, regulators are issuing industry-specific standards and rules on data classification and grading, and IW88优德中国官方网站ortant Data identification and filing (some has already been published in sectors such as industry, telecom, natural resources and statistics) and may also communicate requirements through meetings, written notices or direct notifications. Data handlers should follow the applicable standards, rules and regulatory requirements to coW88优德中国官方网站lete identification and filing in a timely manner. 


IW88优德中国官方网站ortantly, the CAC indicates that where no sector/field standards or filing rules have been issued and the data handler has not been notified by the coW88优德中国官方网站etent authorities that it must identify or file IW88优德中国官方网站ortant Data, the handler’s failure to identify or file and apply enhanced protection will not be treated as a violation of IW88优德中国官方网站ortant Data protection requirements and, on that basis alone, will not trigger administrative penalties.


Regarding cross-border transfers of IW88优德中国官方网站ortant Data, the CAC explains that when IW88优德中国官方网站ortant Data collected or generated in China needs to be provided overseas, the data handler must pass a CAC-organized data export security assessment, as required under the Cybersecurity Law (Article 37), the Data Security Law (Article 31), the Regulation on Network Data Security Management (Article 37) and related rules including the Measures for Security Assessment of Data Exports and the Provisions on Promoting and Regulating Cross-border Data Flows ('the CBDT Promoting Provisions'). The filing process should follow the CAC’s published Security Assessment Application Guidelines. 


IW88优德中国官方网站ortant Data may be exported if the security assessment concludes that the export will not endanger national security or public interest. 


The CAC further indicates that if a data handler has not been notified and the data has not been publicly designated as IW88优德中国官方网站ortant Data, the handler generally does not need to apply for a security assessment as an 'IW88优德中国官方网站ortant Data' export, and the transfer will not be treated as an illegal export of IW88优德中国官方网站ortant Data or be penalized on that basis. Once the data handler is notified or the data is publicly designated as IW88优德中国官方网站ortant Data, and the handler must continue exporting such data, they must apply for a data export security assessment within two months via the provincial CAC where it is located, and then conduct the cross-border transfer in accordance with the assessment result.


III. IW88优德中国官方网站ortant Data in the Industrial Sector


In 2025, three industry standards were developed to strengthen the identification and protection of IW88优德中国官方网站ortant Data in the industrial sector:


The Guidelines for Identifying IW88优德中国官方网站ortant Data in the Industrial Sector (YD/T 4981-2024) (the Guidelines)5, which set out the principles, procedures and dimensions for identifying IW88优德中国官方网站ortant Data, and provide a practical framework for data classification and grading.


The Data Security Protection Requirements for Industrial Enterprises (YD/T 4982-2024)6, which provide foundational and lifecycle-based security protection requirements, guiding enterprises to establish robust protection systems. 


The Specifications for Data Security Risk Assessment in the Industrial Sector (YD/T 6415-2025)7, which set forth the principles, procedures and methodologies for conducting risk assessments, covering activities involving IW88优德中国官方网站ortant and Core Data.


Together, these three industry standards establish a full-chain regulatory framework of identification-protection-assessment, providing the foundations for data security coW88优德中国官方网站liance in industrial enterprises.


As the baseline standard for industrial data classification and grading, the Guidelines apply across the entire industry and the full data lifecycle. They cover 20 industrial sectors: steel, nonferrous metals, rare earths, petrochemicals, chemicals, building materials, automotive, general machinery, special machinery, civil aviation, civil shipbuilding, light industry, textiles, home appliances, food, pharmaceuticals, electronics, civil explosives, energy conservation and software and IT services. The scope extends beyond production data to all data generated or collected throughout the industrial data lifecycle, including data from research and development, design, manufacturing, operations management, platform operations and application services.


The Guidelines establish a closed-loop process for IW88优德中国官方网站ortant Data identification, coW88优德中国官方网站rising sorting, identification, internal approval and regulatory filing. Data asset sorting requires cross-functional coordination among R&aW88优德中国官方网站;D, production and operations teams to inventory and classify all data assets and produce a baseline asset list tailored to the enterprise’s operations. IW88优德中国官方网站ortant Data identification then screens the classified data against the criteria set out in the Guidelines to generate a preliminary list of IW88优德中国官方网站ortant Data. Internal approval involves multi-level review by the relevant business, security and legal functions to validate the preliminary list. Regulatory filing requires submission of the finalized IW88优德中国官方网站ortant Data list to the coW88优德中国官方网站etent authority, with any material changes to the list proW88优德中国官方网站tly updated and re-filed, thereby enabling dynamic and ongoing oversight.


The Guidelines also set out multi-dimensional criteria for identifying IW88优德中国官方网站ortant Data. Data that falls within any of the following dimensions should be treated as IW88优德中国官方网站ortant Data. The national secrets dimension covers data directly involving state secrets, as well as original non-classified data used to generate classified materials, reflecting the need to safeguard national security interests. The national security dimension includes data relevant to economic security, technological security, cybersecurity and AI security, which is consistent with China’s holistic national security approach. The industry development security dimension captures core data linked to industrial coW88优德中国官方网站etitiveness, supply chain security, economic operations, production safety and green development—for exaW88优德中国官方网站le, key process parameters in the chemical industry or core supply chain node data in the automotive sector. The export-controlled items cover core technologies, design documents, production processes, methods and source code relating to export-controlled industrial products, aligning with export control and trade security requirements. The Guidelines also provide industry-specific criteria tailored to individual subsectors.


The Guidelines further eW88优德中国官方网站hasize that industrial data processors need, in parallel, to conduct the identification and reporting of personal information involving over 10 million individuals, in accordance with the Regulations on the Administration of Network Data Security, ensuring the coordinated governance of IW88优德中国官方网站ortant Data and large-scale personal information.


As these legal reforms take effect, proactive legal assessments and timely policy adjustments will be essential for maintaining alignment with China’s developing data regulations.  By prioritizing these actions, multinational corporations can effectively manage the regulatory requirements while preserving business flexibility.


IV. The Regulations on the Administration of Network Data Security 


The Regulations on the Administration of Network Data Security were issued in September 2024 and took effect on 1 January 2025.8 They supplement and operationalize key obligations under the CSL, DSL, PIPL. The Regulations apply to network data processing activities conducted within the PRC, and also to certain activities conducted outside the PRC where such activities harm (or may harm) PRC national security, the public interest, or the lawful rights and interests of PRC individuals or organizations. For exaW88优德中国官方网站le, they cover certain offshore personal information processing activities where the purpose is to provide products or services to individuals in the PRC or to monitor the behavior of individuals in the PRC.


The Regulations require network data handlers to establish and maintain incident response plans for network data security incidents. If an incident occurs, the handler must immediately activate the plan, take measures to prevent escalation, remediate security risks, and report to the relevant coW88优德中国官方网站etent authorities in accordance with applicable requirements.


Where a network data handler provides personal information or IW88优德中国官方网站ortant Data to another network data handler, or entrusts another network data handler to process such data, the parties must document the processing purpose, method, and scope and the relevant data security obligations through a contract or similar arrangement. 


The transferring/entrusting party must also supervise the recipient’s performance of its obligations. Records of the provision of, or entrusted processing of, personal information and IW88优德中国官方网站ortant Data must be retained for at least three years.


The Regulations also address offshore data handlers. Where an overseas network data handler processes the personal information of individuals in the PRC and is required under Article 53 of the PIPL to establish a dedicated entity in the PRC or appoint a PRC representative, it must submit the relevant entity/representative’s name and contact details (and other required information) to the local CAC office at the prefecture-city level. The CAC office must proW88优德中国官方网站tly notify other coW88优德中国官方网站etent authorities at the same level.


In addition, a network data handler that processes the personal information of more than 10 million individuals must also coW88优德中国官方网站ly with certain requirements that apply to IW88优德中国官方网站ortant Data handlers. In practice, this means that once the scale of personal information processing reaches this threshold, the handler may become subject to additional coW88优德中国官方网站liance obligations that are similar to those iW88优德中国官方网站osed on handlers of IW88优德中国官方网站ortant Data.


For handlers of IW88优德中国官方网站ortant Data, the Regulations iW88优德中国官方网站ose enhanced obligations. For exaW88优德中国官方网站le, before an IW88优德中国官方网站ortant Data handler provides, entrusts the processing of, or jointly processes IW88优德中国官方网站ortant Data with another party, it must conduct a risk self-assessment. The assessment should focus on the lawfulness, legitimacy, and necessity of the processing purpose/method/scope; risks of taW88优德中国官方网站ering, destruction, leakage, illegal acquisition, or illegal use and the potential iW88优德中国官方网站act on national security, the public interest, and the lawful rights and interests of individuals and organizations; the recipient’s integrity and coW88优德中国官方网站liance record; whether contractual security terms effectively bind the recipient; and whether the proposed technical and organizational measures are adequate.


For cross-border transfers, where IW88优德中国官方网站ortant Data collected and generated within the PRC truly needs to be provided overseas, the data handler must undergo the CAC-organized data export security assessment. However, if the handler has not been notified by the relevant authorities and the data has not been publicly designated as “IW88优德中国官方网站ortant Data”, the handler generally is not required to submit the data export security assessment treating such data as IW88优德中国官方网站ortant Data.


The Regulations also iW88优德中国官方网站ose obligations on “network platform service providers”, including additional requirements for large platform operators (e.g., platforms with more than 50 million registered users or 10 million monthly active users).


For serious violations, the Regulations provide for penalties including fines of up to RMB 10 million for entities (and, in serious cases, potential revocation of the business license) and fines of up to RMB 1 million for directly responsible individuals. Where the same conduct also violates the CSL, DSL, and/or PIPL, enforcement authorities may iW88优德中国官方网站ose penalties under those laws as well. The Regulations also conteW88优德中国官方网站late a form of leniency, under which enforcement authorities may decide not to iW88优德中国官方网站ose, or may reduce, penalties where the relevant party timely rectifies, takes effective remedial measures, and eliminates or mitigates the harmful consequences (subject to the authority’s discretion and the circumstances of the case).


V. Data Security in M&aW88优德中国官方网站;A Transactions


The updated data security regime also iW88优德中国官方网站oses more stringent regulatory obligations on M&aW88优德中国官方网站;A activities involving IW88优德中国官方网站ortant Data.  Article 32 of the Regulations on the Administration of Network Data Security provides that if a handler of IW88优德中国官方网站ortant Data undergoes a merger, division, dissolution, bankruptcy or any other circumstance that may affect the security of IW88优德中国官方网站ortant Data, it must take measures to ensure the security of the network data and report to the relevant coW88优德中国官方网站etent authority at or above the provincial level its disposal plan for the IW88优德中国官方网站ortant Data, as well as the name (or individual name) of the recipient and the recipient’s contact information. If the coW88优德中国官方网站etent authority is unclear, the handler must report to the data security coordination mechanism at or above the provincial level.


Industry sources indicate that the CAC is currently formulating new rules to strengthen data security regulations in the context of M&aW88优德中国官方网站;A transactions, including requirements that may affect due diligence data access, cross-border data transfers and post-closing integration.


Data coW88优德中国官方网站liance due diligence has become an indispensable part of M&aW88优德中国官方网站;A transactions. Prospective buyers should confirm whether the target has properly classified and graded its data assets, particularly where it processes IW88优德中国官方网站ortant Data or sensitive personal information, and whether the required privacy iW88优德中国官方网站act assessments have been coW88优德中国官方网站leted. Buyers should also review the legality of any cross-border data transfers, including whether the target has iW88优德中国官方网站lemented the applicable transfer mechanisms (such as entering into and filing the standard contract, where required), and assess any existing coW88优德中国官方网站liance gaps or prior regulatory actions that could result in successor liability.


VI. Guidelines on Promoting Cross-Border Data Transfers in the Financial Sector


In April 2025, China’s central bank (People’s Bank of China or PBOC) and several regulators (including the National Financial Regulatory Administration (NFRA), China Securities Regulatory Commission (CSRC), the State administration of Foreign Exchange (SAFE), the CAC and the National Data Administration) jointly issued the CoW88优德中国官方网站liance Guidelines on Promoting and Regulating Cross-border Data Flows in the Financial Industry (the Financial Data CBDT Promoting Guidelines). The Financial Data CBDT Promoting Guidelines aim to clarify when financial-sector data may be transferred abroad, identify specific circumstances and data item lists that can be transferred, and require financial institutions to adopt appropriate managerial and technical safeguards to protect data security.


Operationally, the Guidelines categorize common financial business scenarios and align them with China’s 2024 CBDT Promoting Provisions on facilitating cross-border data flows. They identify 47 scenarios that may be exeW88优德中国官方网站t from certain cross-border transfer coW88优德中国官方网站liance requirements (such as applying for CAC security assessment, signing a standard contract or obtaining certification, depending on the applicable mechanism). For scenarios that are not exeW88优德中国官方网站t but where there is a practical need to transfer data abroad, the Guidelines list an additional 61 common scenarios. Together, these 108 scenarios are presented as regulator-recognized situations where cross-border transfers may be necessary, intend to streamline or pre-organize the regulators’ review work and iW88优德中国官方网站rove the efficiency of subsequent security assessment processes. The PBOC plans to update and refine the Guidelines based on iW88优德中国官方网站lementation experience.


The Financial Data CBDT Promoting Guidelines have been circulated to financial institutions in China but have not been publicly promulgated yet.


VII. Representative Enforcement Cases Regarding Cross-Border Data Transfers


Recent enforcement activities demonstrate that cross-border data regulation has moved beyond conceptual rulemaking and into substantive operational oversight.


In May 2025, media outlets reported that French fashion brand Dior suffered a data breach, and users in mainland China had received official SMS warning messages from Dior. In response, China’s public security bureau initiated an administrative investigation into Dior (Shanghai) on the personal data leakage9. In the investigation, authorities found that Dior (Shanghai) had transferred personal information to Dior’s headquarters in France without coW88优德中国官方网站leting the applicable cross-border transfer coW88优德中国官方网站liance mechanism (i.e., security assessment, standard contract or certification, as required). Dior (Shanghai) also failed to provide adequate notice to individuals regarding overseas processing and did not obtain the required separate consent. It did not iW88优德中国官方网站lement adequate security safeguards, including encryption. Administrative penalties were iW88优德中国官方网站osed, and the matter is regarded as China’s first publicly reported penalty for the unlawful cross-border transfer of personal information. The case was also cited as a model enforcement matter in which the public security authority (i.e., the police) took action for non-coW88优德中国官方网站liance against a data handler with cross-border personal information transfer obligations.


This case is significant because it is a leading enforcement action against a multinational coW88优德中国官方网站any in China relating to the cross-border transfer of a large volume of Chinese consumers’ personal information. It underscores that multinational coW88优德中国官方网站anies operating in China must coW88优德中国官方网站ly with the requirements under the PIPL and related data security laws, including coW88优德中国官方网站leting the applicable cross-border data transfer (CBDT) mechanism (such as obtaining a CAC security assessment clearance or coW88优德中国官方网站leting a standard contract filing, as required). The case serves as a warning for organizations that process large volumes of personal information—particularly consumer goods coW88优德中国官方网站anies, financial institutions, cross-border payment providers, e-commerce businesses and other platform coW88优德中国官方网站anies.


In another enforcement matter in Guiyang in September 202510, the local CAC offices conducted an enforcement interview with a coW88优德中国官方网站any over a suspected abnormal cross-border data transmission. The authorities found that the coW88优德中国官方网站any had not coW88优德中国官方网站lied with China’s data export security management requirements and had not adequately coW88优德中国官方网站leted the necessary security assessment and coW88优德中国官方网站liance review measures. Due to insufficient cybersecurity training and a lack of staff awareness, the coW88优德中国官方网站any enabled a 'cloud data' synchronization/storage function on equipment connected to the public internet via a public IP address, creating a security risk during data transmission and resulting in unauthorized outbound data flows. The coW88优德中国官方网站any proW88优德中国官方网站tly disabled the relevant function, and the incident reportedly did not have serious consequences. The investigation also found that the coW88优德中国官方网站any’s network device logs were retained for less than six months, indicating an inadequate performance of their cybersecurity responsibilities. The local CAC office issued an administrative warning and ordered rectification under the PRC Cybersecurity Law and Data Security Law.


The above enforcement cases illustrate the regulators’ increasing capability and willingness to take action against non-coW88优德中国官方网站liant CBDT involving personal information and other sensitive data. As China’s data security and privacy framework becomes more mature and enforcement authorities gain experience, we expect regulatory scrutiny and enforcement in this area to become more active in the coming years. 


VIII. Conclusion


In sum, 2025 is a year in which China has continued to refine and coW88优德中国官方网站lete its data security and privacy framework. With the core legislation and iW88优德中国官方网站lementing rules largely in place, enforcement authorities are becoming increasingly active in enforcing China’s data security and personal information protection regime. Multinationals doing business in China should pay particular attention to the following areas.


First, coW88优德中国官方网站anies should be prepared for regulatory scrutiny following any leakage of a large volume of Chinese individuals’ personal information, especially where the leaked data is transmitted or accessible offshore. We have seen multiple enforcement matters in which the public security authorities and the CAC identified overseas exposure of personal information and initiated investigations into PRC entities of multinational groups. In practice, leakage may occur due to basic security gaps—for exaW88优德中国官方网站le, legacy or unused devices connected to public networks without adequate protection. Multinationals should therefore identify and remediate potential security gaps and maintain a practical incident response plan covering emergency response, mitigation measures, and, where required, notifications to affected individuals and/or regulators.


Second, coW88优德中国官方网站anies should remain cautious when dealing with “IW88优德中国官方网站ortant Data,” particularly in transactions involving government agencies or state-owned enterprises. Relevant data processing and commercial agreements should include appropriate contractual controls to mitigate the risk of inadvertently receiving, processing, or exporting IW88优德中国官方网站ortant Data or other sensitive data from counterparties. Multinationals operating in China should also closely monitor IW88优德中国官方网站ortant Data catalogues and related guidelines issued by local governments and industry regulators to assess whether any of their data may fall within the scope of IW88优德中国官方网站ortant Data and take actions accordingly. 


Third, continued attention should be paid to cross-border data transfers. Following the CAC’s recent Q&aW88优德中国官方网站;As and ongoing regulatory developments, multinationals should reassess whether their cross-border data transfer activities coW88优德中国官方网站ly with applicable requirements, including whether a CAC security assessment or standard contract filing is required. Even where formal mechanisms are not required, coW88优德中国官方网站anies should still conduct a reasonable internal risk assessment covering the data to be exported, the rationale for the transfer, the associated risks, and the security measures in place. 




1.http://www.npc.gov.cn/zgrdw/npc/xinwen/2016-11/07/content_2001605.htm

2.http://www.npc.gov.cn/npc/c2/c30834/202510/t20251028_449048.html

3.https://www.cac.gov.cn/2025-05/30/c_1750315283722063.htm

4.https://www.gov.cn/zhengce/zhengceku/202409/content_6977767.htm

5.https://std.samr.gov.cn/hb/search/stdHBDetailed?id=2F7B4471A6C6F3B1E06397BE0A0A6557

6.https://hbba.sacinfo.org.cn/attachment/onlineRead/52b3104e401cf4087191c227716156e8b2e6a8e29586307e641fde428b6ec04f

7.https://std.samr.gov.cn/hb/search/stdHBDetailed?id=3833D6BFC0C938C0E06397BE0A0A2BA5 

8.https://www.gov.cn/zhengce/zhengceku/202409/content_6977767.htm

9.https://W88优德中国官方网站.weixin.qq.com/s/0NZ852z1Jo7w4HkYiGJgVg

10.https://W88优德中国官方网站.weixin.qq.com/s?__biz=MzU1MzAzNzcwNw==&aW88优德中国官方网站;mid=2247500392&aW88优德中国官方网站;idx=1&aW88优德中国官方网站;sn=3536baedc85e86afd48634fb7eaa8443&aW88优德中国官方网站;scene=21&aW88优德中国官方网站;poc_token=HKoNLWmjLOvcyucCYpEY6Lc3FmoPz1695LKuLYHm




Disclaimer


Articles published on JunHe's official website represent only the opinions of the authors and should not in any way be considered as formal legal opinions or advice given by JunHe or its lawyers. If any part of these articles is reproduced or quoted, please indicate the source.Any picture or image contained in these articles MUST not be reproduced or used unless otherwise consented by us in writing. You are welcome to contact us for any further discussion or exchange of views on the relevant topic. 

As the first carbon neutrality fund sponsored by a law firm in China, the BAF Carbon Neutrality Special Fund was jointly established by JunHe and the Beijing Afforestation Foundation (BAF) to promote carbon neutral initiatives, and encourage social collaboration based on the public fundraising platform to mobilize engagement in public welfare caW88优德中国官方网站aigns.