{"id":19122,"date":"2022-01-20T06:00:27","date_gmt":"2022-01-20T14:00:27","guid":{"rendered":"https:\/\/www.trulioo.com\/?p=19122"},"modified":"2023-08-24T16:00:31","modified_gmt":"2023-08-24T16:00:31","slug":"china-data-protection-law","status":"publish","type":"post","link":"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law","title":{"rendered":"China data protection law &#8211; what\u2019s the impact?"},"content":{"rendered":"\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">China\u2019s Personal Information Protection Law (PIPL) went into effect on 1<\/span><span style=\"font-weight: 400;\">st<\/span><span style=\"font-weight: 400;\"> November 2021. With the Cybersecurity Law and the Data Security Law, the PIPL is the third of three Chinese laws designed to provide a comprehensive approach to cybersecurity, data security and data privacy.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-cybersecurity-law\"><b>The Cybersecurity Law<\/b><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/www.chinalawtranslate.com\/en\/2016-cybersecurity-law\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Cybersecurity Law<\/span><\/a><span style=\"font-weight: 400;\"> (CSL) went into effect on June 1, 2017, and effectively amalgamated a number of regulations and laws related to cybersecurity under one umbrella. The CSL is intended to protect China\u2019s national security, combat online crime and improve information and network security.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">It is supplemented by a number of standards and guidelines, some of which are not legally binding.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The CSL expanded the focus of cybersecurity law in China from focusing solely on ISPs (defined as operators or providers of websites) to include both ISPs and network operators. \u2018Network operators\u2019 are very broadly defined as any company owning or operating a computer network.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Some key concepts in the CSL:<\/span><\/p>\n\n\n\n<ul>\n<li><span style=\"font-weight: 400;\">Critical information infrastructure operators (CII operators)<\/span>\n<ul>\n<li><span style=\"font-weight: 400;\">Defined as an organization processing data which has the potential to seriously endanger Chinese national security, national welfare, peoples\u2019 livelihood or public interest if destroyed, damaged or leaked, CII operators are subject to more stringent requirements and oversight due to the sensitivity of the information they handle<\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Data localization<\/span>\n<ul>\n<li><span style=\"font-weight: 400;\">Certain categories of data must be stored in China, rather than overseas<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Restrictions on cross-border transfers<\/span><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Increased the requirements for disclosure to and consent of individuals whose data is being collected<\/span><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-data-security-law\"><b>The Data Security Law<\/b><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/en.npc.gov.cn.cdurl.cn\/2021-06\/10\/c_689311.htm\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Data Security Law<\/span><\/a><span style=\"font-weight: 400;\"> (DSL) became effective September 1, 2021. It expands on areas of the CSL, focusing on national security as well as classifying data based on its import to Chinese national security. This in turn has a flow-through effect on how the data may be stored and transferred.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The two primary categories are core data, or data which can be broadly defined as data that involves Chinese national or economic security, Chinese citizens\u2019 welfare or significant public interests and important data, which is the next level below core data. However, the precise definitions of core and important data are not made entirely clear in the DSL itself.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The DSL also expands on the data localization and cross-border transfer requirements for core and important data, as well as adding some restrictions on CII operators. CII operators must ensure, for example, that data generated in China is stored in China and that a security assessment is completed before China-generated data is transferred abroad.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">A key point under the DSL, which has led to it being seen in some circles as a response to the USA\u2019s CLOUD act, prohibits CII operators and other types of network operators from providing any data stored in China to any foreign judicial or law enforcement body without the approval of Chinese authorities.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The DSL also brings in rules around establishing and improving data security, as well as data breach notifications to users and authorities. Companies operating in China who handle important or core data are required to designate an individual or team responsible for data security and to submit periodic risk assessments to the authorities. Penalties run to approximately $100K CAD, as well as the potential for a business to lose its license to operate.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Like the PIPL, the DSL has extra-territorial scope, meaning that where companies outside China handle data covered by the DSL those companies are also required to comply with the requirements of the DSL.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-personal-information-protection-law\"><b>The Personal Information Protection Law<\/b><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">The most recent of the three laws, the <\/span><a href=\"https:\/\/en.npc.gov.cn.cdurl.cn\/2021-12\/29\/c_694559.htm\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Personal Information Protection Law<\/span><\/a><span style=\"font-weight: 400;\"> (PIPL), has a number of elements strongly reminiscent of the EU GDPR and went into effect on November 1, 2021. The PIPL is designed to protect personal information, regulate its processing and promote the reasonable use of personal information. Unlike the CSL and DSL, it also restricts itself to information about natural persons.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The PIPL also has extraterritorial scope whenever businesses outside China process the personal information of Chinese residents for the purpose of:<\/span><\/p>\n\n\n\n<ul>\n<li><span style=\"font-weight: 400;\">Providing products or services to domestic natural persons<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Analyzing and evaluating the activities of domestic natural persons<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Other circumstances as provided by laws and administrative regulations<\/span><\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-weight: 400;\">Personal information under PIPL is defined as information related to identified or identifiable natural persons recorded by electronic or other means, which is broadly similar to other <\/span><a href=\"https:\/\/iapp.org\/news\/a\/analyzing-chinas-pipl-and-how-it-compares-to-the-eus-gdpr\/#\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">comparable laws such as GDPR<\/span><\/a><span style=\"font-weight: 400;\"> or <a href=\"\/blog\/trust-and-safety\/pipeda\">PIPEDA<\/a>.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">As with the GDPR, PIPL differentiates between personal information processors, roughly equivalent to a GDPR data controller, and entrusted parties, which are close to the GDPR data processor.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">A personal information processor decides:<\/span><\/p>\n\n\n\n<ul>\n<li><span style=\"font-weight: 400;\">the purpose, period and means of processing<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">the categories of personal information to be processed<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">the necessary protection measures<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">the rights and obligations of both parties&nbsp;&nbsp;<\/span><\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-weight: 400;\">The entrusted party processes information in accordance with the agreement and may not process personal information beyond those parameters, or engage sub-processors without the consent of the personal information processor.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Cross-border transfers require either an assessment or certification, contractual terms in place or compliance with other measures set out by law and regulation. Separate disclosure to and consent from the individual is also required.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Crucially, the PIPL also reserves the right for the national cyberspace department to add companies and individuals infringing on the individuals\u2019 rights in PIPL to a restricted list and \/ or take countermeasures against any country or region placing prohibitive, restrictive or discriminatory measures against China.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Similarly to GDPR, the PIPL provides for individuals\u2019 rights in regards to their personal information:<\/span><\/p>\n\n\n\n<ul>\n<li><span style=\"font-weight: 400;\">Individuals have the right to be informed, the right to make decisions on the processing of their information and to restrict or refuse processing unless otherwise provided by law and regulation<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Individuals may consult and duplicate their information unless an exception applies<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Processors must provide such information in a timely manner<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Individuals may request the transfer of their information to another processor<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Individuals may request the processor to update or correct their information<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Individuals may request deletion of their information<\/span><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-overall-impact\"><b>Overall impact<\/b><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">With the rollout in 2021 of the DSL and the PIPL, China\u2019s laws on data security and personal information have aligned much more closely to other international benchmarks.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">It is worth noting that in many areas the PIPL is pending supplementation from <\/span><a href=\"https:\/\/www.lexology.com\/library\/detail.aspx?g=1b659cca-f0fa-446c-b679-67fc56b17ddd\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">regulation as yet to go into effect<\/span><\/a><span style=\"font-weight: 400;\">. Crucial areas that regulation may clarify include notification requirements, the threshold for the amount of personal information that would qualify a personal information processor for more stringent requirements and retention periods.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">By and large, compliance with GDPR will serve organizations working with the personal data of Chinese residents well, but companies should be reviewing the requirements of the DSL and PIPL to ensure that they are compliant and also well-placed to comply with the anticipated regulation. These moves on China\u2019s part to better protect personal information and grant individuals more access to and rights over their data are welcome measures for those working in the privacy field and with that data.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"China\u2019s Personal Information Protection Law (PIPL) went into effect on 1st November 2021. With the&#8230;","protected":false},"author":7,"featured_media":19123,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"footnotes":""},"categories":[337],"post-types":[133],"post-topics":[209,143],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.1 (Yoast SEO v22.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>China data protection law - what\u2019s the impact?<\/title>\n<meta name=\"description\" content=\"China\u2019s Personal Information Protection Law (PIPL), Cybersecurity Law and the Data Security Law are designed for cybersecurity, data security\/privacy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"China data protection law - what\u2019s the impact?\" \/>\n<meta property=\"og:description\" content=\"China\u2019s Personal Information Protection Law (PIPL), Cybersecurity Law and the Data Security Law are designed for cybersecurity, data security\/privacy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law\" \/>\n<meta property=\"og:site_name\" content=\"Trulioo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/trulioo\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-20T14:00:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-24T16:00:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2022\/01\/China-data-privacy-law.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bond Lai\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trulioo\" \/>\n<meta name=\"twitter:site\" content=\"@trulioo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bond Lai\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law\"},\"author\":{\"name\":\"Bond Lai\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/c019180cc6a5cff73b8cce8518bd97b8\"},\"headline\":\"China data protection law &#8211; what\u2019s the impact?\",\"datePublished\":\"2022-01-20T14:00:27+00:00\",\"dateModified\":\"2023-08-24T16:00:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law\"},\"wordCount\":1156,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trulioo.com\/#organization\"},\"articleSection\":[\"Trust and Safety\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law\",\"url\":\"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law\",\"name\":\"China data protection law - what\u2019s the impact?\",\"isPartOf\":{\"@id\":\"https:\/\/www.trulioo.com\/#website\"},\"datePublished\":\"2022-01-20T14:00:27+00:00\",\"dateModified\":\"2023-08-24T16:00:31+00:00\",\"description\":\"China\u2019s Personal Information Protection Law (PIPL), Cybersecurity Law and the Data Security Law are designed for cybersecurity, data security\/privacy.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trulioo.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trust and Safety\",\"item\":\"https:\/\/www.trulioo.com\/post-topics\/trust-and-safety\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"China data protection law &#8211; what\u2019s the impact?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trulioo.com\/#website\",\"url\":\"https:\/\/www.trulioo.com\/\",\"name\":\"Trulioo\",\"description\":\"Building trust online (online identity verification services)\",\"publisher\":{\"@id\":\"https:\/\/www.trulioo.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trulioo.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.trulioo.com\/#organization\",\"name\":\"Trulioo\",\"url\":\"https:\/\/www.trulioo.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"contentUrl\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"width\":2784,\"height\":1464,\"caption\":\"Trulioo\"},\"image\":{\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/trulioo\",\"https:\/\/twitter.com\/trulioo\",\"https:\/\/www.linkedin.com\/company\/trulioo\",\"https:\/\/www.instagram.com\/trulioo_global\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/c019180cc6a5cff73b8cce8518bd97b8\",\"name\":\"Bond Lai\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f17fb4de5ef8ab9d1c56147ad8d3b08?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f17fb4de5ef8ab9d1c56147ad8d3b08?s=96&d=mm&r=g\",\"caption\":\"Bond Lai\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"China data protection law - what\u2019s the impact?","description":"China\u2019s Personal Information Protection Law (PIPL), Cybersecurity Law and the Data Security Law are designed for cybersecurity, data security\/privacy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law","og_locale":"en_US","og_type":"article","og_title":"China data protection law - what\u2019s the impact?","og_description":"China\u2019s Personal Information Protection Law (PIPL), Cybersecurity Law and the Data Security Law are designed for cybersecurity, data security\/privacy.","og_url":"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law","og_site_name":"Trulioo","article_publisher":"https:\/\/www.facebook.com\/trulioo","article_published_time":"2022-01-20T14:00:27+00:00","article_modified_time":"2023-08-24T16:00:31+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2022\/01\/China-data-privacy-law.jpg","type":"image\/jpeg"}],"author":"Bond Lai","twitter_card":"summary_large_image","twitter_creator":"@trulioo","twitter_site":"@trulioo","twitter_misc":{"Written by":"Bond Lai","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law#article","isPartOf":{"@id":"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law"},"author":{"name":"Bond Lai","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/c019180cc6a5cff73b8cce8518bd97b8"},"headline":"China data protection law &#8211; what\u2019s the impact?","datePublished":"2022-01-20T14:00:27+00:00","dateModified":"2023-08-24T16:00:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law"},"wordCount":1156,"commentCount":0,"publisher":{"@id":"https:\/\/www.trulioo.com\/#organization"},"articleSection":["Trust and Safety"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law","url":"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law","name":"China data protection law - what\u2019s the impact?","isPartOf":{"@id":"https:\/\/www.trulioo.com\/#website"},"datePublished":"2022-01-20T14:00:27+00:00","dateModified":"2023-08-24T16:00:31+00:00","description":"China\u2019s Personal Information Protection Law (PIPL), Cybersecurity Law and the Data Security Law are designed for cybersecurity, data security\/privacy.","breadcrumb":{"@id":"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trulioo.com\/blog\/trust-and-safety\/china-data-protection-law#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trulioo.com\/"},{"@type":"ListItem","position":2,"name":"Trust and Safety","item":"https:\/\/www.trulioo.com\/post-topics\/trust-and-safety"},{"@type":"ListItem","position":3,"name":"China data protection law &#8211; what\u2019s the impact?"}]},{"@type":"WebSite","@id":"https:\/\/www.trulioo.com\/#website","url":"https:\/\/www.trulioo.com\/","name":"Trulioo","description":"Building trust online (online identity verification services)","publisher":{"@id":"https:\/\/www.trulioo.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trulioo.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.trulioo.com\/#organization","name":"Trulioo","url":"https:\/\/www.trulioo.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","contentUrl":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","width":2784,"height":1464,"caption":"Trulioo"},"image":{"@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/trulioo","https:\/\/twitter.com\/trulioo","https:\/\/www.linkedin.com\/company\/trulioo","https:\/\/www.instagram.com\/trulioo_global\/"]},{"@type":"Person","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/c019180cc6a5cff73b8cce8518bd97b8","name":"Bond Lai","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8f17fb4de5ef8ab9d1c56147ad8d3b08?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f17fb4de5ef8ab9d1c56147ad8d3b08?s=96&d=mm&r=g","caption":"Bond Lai"}}]}},"_links":{"self":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/19122"}],"collection":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/comments?post=19122"}],"version-history":[{"count":1,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/19122\/revisions"}],"predecessor-version":[{"id":37129,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/19122\/revisions\/37129"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/media\/19123"}],"wp:attachment":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/media?parent=19122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/categories?post=19122"},{"taxonomy":"post-types","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/post-types?post=19122"},{"taxonomy":"post-topics","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/post-topics?post=19122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}