From the course: Cloud Security Considerations for General Industry

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Risk and compliance requirements in Asia

Risk and compliance requirements in Asia

From the course: Cloud Security Considerations for General Industry

Start my 1-month free trial

Risk and compliance requirements in Asia

- [Instructor] Starting with Asia and China. According to the Cyber Safety Law, operators of key information infrastructure shall store personal information and important data, collected and generated during its operations within the territory of China. Key information infrastructure includes public telecommunications and message service, energy, transportation, water conservation, financing, public service, e-government, as well as those that may severely threaten national security, people's livelihoods, and public interest, once such key information infrastructure is damaged, malfunctioned, or suffers data loss. Information and data are prohibited from being transferred overseas. Those sectors include, but are not limited to, credit investigation, banking and financing, health information, any map data, government information, enterprise accounting information, and human inheritance resource information. In India…

Contents