Apple Intelligence’s Unauthorized Rollout in China: A Technical Accident or a Deliberate Regulatory Game?

(By You Yunting) In the early morning of March 31, 2026, Apple rolled out Apple Intelligence to some Chinese users whose iPhones had been updated to iOS 26.4, but the rollout was quickly halted. Today, we will examine the potential legal liabilities involved, the likelihood of regulatory penalties, and whether the rollout was merely a technical accident or a deliberate regulatory game.

I. A Three-Hour Unauthorized Rollout of Apple Intelligence in China

In the early morning of March 31, 2026, some users of China-version iPhones running iOS 26.4 discovered that Apple Intelligence had unexpectedly become available on their devices. The “Siri” entry in the Settings menu was renamed as “Apple Intelligence & Siri”. User feedback indicated that models from Baidu’s ERNIE and Alibaba’s Qwen were integrated into Apple Intelligence in China-version iPhones. For visual analysis functions, some users reported that the image recognition technology associated with Google was invoked.

READ MORE

Outbound Personal Information Transfer Is Better Regulated – A Brief Analysis of Regulations on Standard Contract for Cross-Border Transfer of Personal Information (Exposure) and Security Certification Procedures for Cross-Border Handling Activities of Personal Information

(By Wang Hongliang) Many businesses are perplexed by the practical problem about outbound personal information transfer compliance, especially for foreign-inveested businesses that need to provide personal information abroad in many scenarios, for example when they have to provide personal information to their headquarters or affiliates.

Article 38[1] of the Personal Information Protection Law provides that in addition to other premises, security assessment, personal information protection certification and standard contract are approaches to outbound personal information transfer compliance. According to Article 4[2] of the Measures for Data Outbound Transfer Security Assessment (Exposure), the security assessment mainly applies to the situations when personal information is collected or generated by critical information infrastructure operators, personal information handlers processing personal information of one million people or more transfer personal information abroad or personal information of over 100 thousand people or sensitive personal information of over 10 thousand people is cumulatively transferred abroad.

READ MORE