On September 16, 2025, the Cyberspace Administration of China (CAC) released typical recent law enforcement cases regarding cybersecurity, data security, and personal information protection. A total of 10 cases are included in this batch, with specific summaries as follows:
(1) Case of Webpage Tampering by a Technology Co., Ltd. in Guangdong
The company failed to fulfill its cybersecurity protection obligations in accordance with the law, did not adopt necessary technical measures to ensure cybersecurity, and failed to promptly fix system vulnerabilities, resulting in webpage tampering. This violates the relevant provisions of the Cybersecurity Law.
(2) Case of Webpage Tampering by an Internet Technology Co., Ltd. in Xinjiang
As a provider of network products and services, the company failed to promptly detect security flaws and vulnerabilities in the website it developed, did not take immediate remedial measures, and failed to inform users and report to the competent authority in accordance with regulations. This violates the relevant provisions of the Cybersecurity Law.
(3) Case of Data Leakage by a Medical Laboratory Co., Ltd. in Shandong
The company’s system failed to retain relevant network logs in accordance with the law and did not adopt technical and other necessary measures to ensure data security, resulting in data leakage. This violates the provisions of laws and regulations including the Cybersecurity Law, Data Security Law, and Regulations on the Security Management of Network Data.
(4) Case of Data Theft from a Technology Co., Ltd. in Zhejiang
The company’s system did not adopt technical and other necessary measures to ensure data security, leading to data theft. This violates the provisions of laws and regulations including the Cybersecurity Law, Data Security Law, and Regulations on the Security Management of Network Data.
(5) Case of Data Theft from a Technology Company in Chongqing
The company’s system did not adopt technical and other necessary measures to ensure data security, resulting in data theft. This violates the provisions of laws and regulations including the Cybersecurity Law, Data Security Law, and Regulations on the Security Management of Network Data.
(6) Case of Data Theft from an Insurance Agency Co., Ltd. in Guangdong
The company’s system failed to retain relevant network logs in accordance with the law and did not adopt technical and other necessary measures to ensure data security, leading to data theft. This violates the provisions of laws and regulations including the Cybersecurity Law, Data Security Law, and Regulations on the Security Management of Network Data.
(7) Case of Potential Data Leakage Risk at a Technology Co., Ltd. in Hunan
The enterprise failed to fulfill its cybersecurity and data security protection obligations in accordance with the law, did not establish cybersecurity and data security management systems, and its system did not adopt technical and other necessary measures to ensure data security, resulting in potential data leakage risks. This violates the provisions of laws and regulations including the Cybersecurity Law, Data Security Law, and Regulations on the Security Management of Network Data.
(8) Case of Over-Scope Collection of Personal Information by an App Operated by a Technology Co., Ltd. in Beijing
The App collected and uploaded information about the installation and uninstallation of the user’s applications in the background when the user did not use any of its functions. When the user used functions such as uploading AI avatars, the App requested unnecessary storage permissions. These acts exceeded the "minimum necessary" scope for achieving the purpose of personal information processing, violating the provisions of laws and regulations including the Cybersecurity Law, Personal Information Protection Law, and Regulations on the Security Management of Network Data.
(9) Case of Illegal Collection of Facial Information by a Technology Co., Ltd. in Shanghai
The company’s vending machines collected facial information without consent during the user payment process. Additionally, the enterprise failed to establish a personal information protection impact assessment system, and its relevant system had high-risk SQL injection vulnerabilities. This violates the provisions of laws and regulations including the Cybersecurity Law, Personal Information Protection Law, and Regulations on the Security Management of Network Data.
(10) Case of Failure to Conduct Security Assessment for Deep Synthesis Services Provided by an App Operated by a Technology Co., Ltd. in Zhejiang
The App provided AI face-swapping services without conducting the required security assessment, and the relevant deep synthesis content was not marked prominently, posing significant security risks. This violates the provisions of regulations including the Administrative Provisions on Deep Synthesis of Internet Information Services, Interim Measures for the Management of Generative Artificial Intelligence Services, Administrative Provisions on Algorithmic Recommendation of Internet Information Services, and Provisions on the Security Assessment of Internet Information Services with Public Opinion Attributes or Social Mobilization Capabilities.
Source: CAC
https://www.cac.gov.cn/2025-09/16/c_1759741437315419.htm