The Ministry of Industry and Information Technology (MIIT), along with several other government departments, has released new guidelines outlining the rules and requirements for companies in the auto industry to export important data and personal information (PI) outside of China.
While the data export regulations for companies in the auto industry are the same as for companies in other industrial sectors, the guidelines, officially the Guidelines for the Security of Cross-Border Transfer of Vehicle Data (2026 Edition) provide specific definitions and scenarios related to the auto industry, helping companies to better identify whether they are subject to China’s data and PI export regulations, and how to identify which data is restricted from being exported without undergoing certain compliance procedures.
Key Takeaways for Foreign Auto Companies

The guidelines clarify that the rules apply to all “vehicle data processors” exporting “vehicle data”.
Vehicle data is defined as either PI or important data involved in processes such as the design, production, sales, use, and maintenance of vehicles.
Vehicle data processors, meanwhile, are organizations and individuals who independently determine the method and purpose of data processing in the process of carrying out vehicle data processing activities. They include manufacturers, components and software suppliers, telecom operators, autonomous driving service providers, platform operators, dealers, maintenance organizations, and mobility service companies. Hereinafter they are referred to as “auto companies” or “companies”.
Auto companies that export vehicle data outside of China and meet one of the following criteria are considered to be carrying out export activities:
Under China’s Personal Information Protection Law (PIPL) and its implementation regulations, companies that process the PI of large numbers of individuals are required to undergo either a PI export security assessment, a higher compliance bar, or choose to either enter into a standard PI export security contract with the overseas recipient or undergo PI export security certification by an accredited third-party institution.
The thresholds for triggering one of the two levels of compliance for automotive companies are the same as for companies in other industries, as summarized in the table below.
Compliance Requirements for Export of Vehicle Data |
|
|---|---|
| Must conduct a data export security assessment | Must sign a standard contract or undergo data export security certification |
| Companies that provide important data* overseas | Companies that have exported the PI of between 100,000 and up to (not including) 1 million people since January 1 of the current year**, not including sensitive PI |
| Companies that have exported the PI of one 1 million people or more since January 1 of the current year**, not including sensitive PI | Companies that have exported the sensitive PI of under 10,000 people since January 1 of the current year |
Companies that have exported the sensitive PI of 10,000 people or more since January 1 of the current year |
|
Critical information infrastructure operators |
|
Other circumstances stipulated in national regulations |
|
| * Where surveying and mapping geographic information data includes spatial coordinates, imagery, point clouds, and their attribute information, entities must lawfully gain approval or fulfill map review processes for their provision to foreign entities before submitting the data export security assessment. ** Deduplicated data based on number of natural persons. |
|
Companies that fall below the thresholds listed above – that is any entity excluding CIIOs that have exported the PI of less than 100,000 people since January 1 of the current year – are not required to undergo any additional compliance procedures to be able to export the data outside of China.
In addition to this, there are a range of other scenarios under which companies can freely export data, introduced as a means of reducing the compliance burden on companies. These are:
Cybersecurity incidents should be handled in accordance with the Emergency Response Plan for Public Internet Cybersecurity Incidents, while data security incidents are handled in accordance with the Emergency Response Plan for Data Security Incidents in the Industrial and Information Technology Sector (Trial).
Note that all PI mentioned above does not include important data.

The guide provides an extensive breakdown of the scenarios under which different types of data in the auto industry can be designated as “important”, as well as description of the rules
Importantly, this is not a catalog of “important data” within the auto industry; rather, it is a catalog of the scenarios and rules for determining whether any given data is considered “important”. The scenarios include situations in which the data is related to goods and technologies that are subject to export control regulations, as well as data that could touch on sensitive geographic areas such as military or government facilities.
The catalog is broken down into six different fields across the auto value chain:
Below is a sample of the tables provided for determining whether automotive data is considered important.
| Field | Data type | Applicable rules |
|---|---|---|
| Production R&D (Entities collecting and generating bills of materials, R&D design documents, and development source code data during the process of integrating global R&D resources and collaborative product design and development.) | Design Bill of Materials (BOM): List of raw materials, components or assemblies required during the design phase, including material specifications, quantities, hierarchical relationships, etc.; formulation schemes, chemical formulas, and material quantities for key materials such as positive and negative electrode active materials, electrolyte, separator, and binder in power batteries. |
Relevant data that meet any of the following conditions: 1. Are supported by national major projects or national key research and development programs; 2. Fulfil relevant technical “key control points” control points in the Catalog of Technologies Prohibited and Restricted from Export in China; or 3. Involve items included in the Export Control List of Dual-Use Items of the People’s Republic of China. |
Manufacturing (Entities collecting and generating bills of materials and production control program source code during the automotive manufacturing process.) |
BOM for automotive products, parts, or components; R&D technical solutions for power batteries, including process parameters and process window ranges for core processes such as electrode preparation, assembly, electrolyte injection, formation, and capacity testing. | |
Automotive driving (Entities collecting and generating algorithmic, training, and feature data during the development, deployment, and application of combined driver assistance or autonomous driving functions) |
Driver decision datasets used to train and validate combined driver assistance or autonomous driving algorithm models, including gear position information, accelerator pedal opening, brake pedal opening, steering wheel angle, etc. |
When integrated with external real-time imagery and radar data, data that meets any one of the following criteria:
|
Software upgrade services (Source code for a software package that allows entities to upgrade vehicle safety and battery management functions) |
Source code corresponding to the software package for upgrading safe driving and battery management functions |
Data that meet all of the following conditions:
|
Network operations (Entities collecting and generating the following during the operation of connected vehicles: Vehicle identification numbers, telematics card identifiers, vehicle keys, vehicle digital certificates, and control commands) |
Original Vehicle Identification Number (VIN), de-identified and reversible VIN |
Data that meet the following criteria: Entities that since January 1 of the current year, have provided information to overseas entities that, when combined with other exported data, can identify the personal identities of a cumulative total of 1 million people or more. |
The process for auto companies to export data from China is the same as for companies in other industries.
Before beginning the process, companies should compile an important data catalog and file it with the local industry regulatory authority as required in the Measures for Data Security Management in the Industrial and Information Technology Sector (Trial). The catalog can be done in line with the guidelines on classifying important data provided in these measures, as well as the official standards [GB/T 43697-2024] titled Rules for data classification and grading.
On the basis of the important data catalog, companies must identify which data they handle requires the stricter compliance procedure of an export security assessment, and which will require the company to sign a standard contract or undergo PI export certification. Only after completing this can they proceed to steps 2 or 3.
For any data identified that requires a security assessment, the company must conduct and submit the assessment through their domestic legal entity. The requirements for conducting the assessment are outlined in the Measures for Data Export Security Assessment.
Companies must also conduct a self-assessment of data export risks and address any risks identified, in accordance with the Measures for Data Export Security Assessment, the Regulations on Promoting and Standardizing Cross-border Data Flows, and the Guidelines for Data Export Security Assessment Application (Third Edition), and submit the materials to the CAC.
If the data export security assessment is passed, the company may then proceed to carry out the data export activities. However, if any situation arises that could affect the security of the exported data, a new assessment must be submitted.
For data that falls below the threshold for a full security assessment but is still not exempt from compliance procedures, companies can choose to either sign a standard contract or undergo third-party export security certification.
Standard contract route
To sign a standard contract, companies must first carry out a personal information protection impact assessment (PIPIA) in line with the Measures for Standard Contracts for Cross-border Transfer of Personal Information (the Standard Contract Measures) and the Guidelines for Filing Standard Contracts for Cross-border Transfer of Personal Information (Second Edition). The company can then sign a standard contract for the cross-border transfer of PI with the overseas recipient of the data, which must align with the contents of the official template provided with the Standard Contract Measures.
Companies can only commence the data export activity after the standard contract takes effect. Within 10 days of the contract taking effect, the company must also file requisite materials with the local provincial-level cybersecurity office, which include the standard contract, the PIPIA, and documents relating to the company and its legal representatives.
If all the materials meet the requirements, the company will receive a filing number. However, if circumstances are found within the materials that could affect the rights of PI holders, the company must conduct a new PIPIA and sign a new standard contract, and file them again.
Data export security certification route
If the company chooses to undergo third-party data export security certification, it must first conduct a PIPIA and address risks that arise in accordance with the Measures for Certification of Cross-border Transfer of Personal Information. The company can then apply for certification from a qualified professional certification body, with which they must cooperate throughout the certification process. Only after passing certification can the company begin to export the data in question. If the export activity at any point ceases to meet the certification requirements, the company will have to conduct a new PIPIA and apply for certification again.
Note that certification must be conducted by professional institutions that have obtained official qualifications for PI protection certification. Currently, only three institutions have been approved to carry out data export certification: China Cybersecurity Review, Authentication and Market Supervision Big Data Center, Cyberspace Administration of China (CAC) Data and Technology Support Center, and Beijing CESI Certification Co., Ltd.

In addition to the specific compliance procedures for the export of vehicle data and related PI, auto companies must also meet a series of additional administrative, system, technical, and procedural requirements to ensure the security of the data throughout the export process.
Management and personnel
Auto companies are required to set up a vehicle data export management department to coordinate and promote data export security management and supervise and inspect the implementation of relevant management requirements for data export. They must also designate a person in charge of vehicle data export security to supervise data export activities and the protective measures taken, and be responsible for the security of data export activities.
System and approval
Companies must designate system requirements for cybersecurity, data security, and PI protection, and specify specific requirements for vehicle data export security management.
They must also establish an internal registration and approval mechanism for vehicle data export, set approval authority and processes, and organize and archive approval materials.
Security for cross-border data transfer
Companies must implement the following protective measures:
Cross-border data security monitoring and inspection
Companies must conduct security monitoring of network communications, host or system operations during cross-border data transfer, generating and retaining security alert logs.
Additionally, platforms or systems supporting direct cross-border transfer of automotive data must have the technical capabilities for cross-border data security inspection, retaining network traffic associated with data transmission while supporting data tamper-proofing and content parsing.
For full retention, outbound network communication traffic records shall be retained based on start and end time for a period of one week. For sampled retention, the system shall support retaining outbound network communication traffic records based on start and end time and IP address range, with a retention period of no less than one month.
Network traffic logs
Companies must record network communication activities involving the cross-border transfer of automotive data. Records shall include at minimum: date, time, source IP address, destination IP address, source port, destination port, transport layer protocol, application layer protocol, and data volume. These must be compiled into network traffic logs for retention.
Operational activity logs
Automotive data processors must record operational activities of hosts directly transmitting automotive data overseas. This should include user information, operation time, operation target, operation type, login IP, device information, operation outcome, and changes to data access permissions. Operational activity logs shall be generated and retained.
Log retention
Companies must retain network traffic logs, operational behavior logs, and security alert logs in a tamper-proof manner for a period of no less than three years.
Log auditing
Companies must audit network traffic logs, operational activity logs, and security alert logs. Upon detecting security risks such as unauthorized operations, they must respond and address the issue promptly.
Companies must establish capabilities to address unauthorized cross-border transfers of automotive data. Upon detecting abnormal behavior, they must take remedial action and report the incident to the relevant local industry regulatory authorities as required.
See also the regulations on cybersecurity incident reporting for companies in China.
Given the broad scope of data and processing activity that falls within China’s cross-border data transfer rules, any foreign car maker or designer with operations in the country will have to undergo the often cumbersome compliance procedures for data export. Moreover, within this industry there is a high likelihood that data will fall under the “important” category and thus trigger the highest level of security procedures, the data export security assessment. Companies employing automotive R&D systems, software services, and self-driving platforms should assess the data classification rules carefully as they are highly likely to be handling important data due to the nature of their operations, but any company within the industry could find themselves in this position.
Due to the multiple steps involved – from data identification to internal data impact assessments to security evaluations – the process can become rather burdensome and costly, in particular for large companies with operations across a wide array of fields and subsidiaries. Companies should therefore get the ball rolling early and consider employing external help to ensure procedures are executed smoothly.
While the information provided in the guidelines is not strictly new, they send a signal to companies that the automotive industry is a priority sector and may be closely monitored for violations, further highlighting the importance of compliance for companies.
For this reason, automotive is likely only the first of several critical sectors that will be given the guideline treatment. Further draft regulations and guidelines are expected to be released over the course of 2026, so companies in other industries should anticipate rising compliance expectations and take steps to embed compliance procedures into operations to comply with existing regulations on data security and PI protection.