Personal Information Protection Law of the People's Republic of China

Personal Information Protection Law of China
National People's Congress
  • Personal Information Protection Law of the People's Republic of China
Territorial extentPeople's Republic of China excluding China's Special Administrative Regions
Enacted by13th National People's Congress
EnactedAugust 20, 2021
CommencedNovember 1, 2021
Related legislation
Cybersecurity Law of the People's Republic of China Data Security Law of the People's Republic of China
Summary
This law is formulated in order to protect the rights and interests of personal information, regulate personal information processing activities, and promote the rational use of personal information.
Keywords
Civil code
Status: In force

The Personal Information Protection Law of the People's Republic of China (Chinese: 中华人民共和国个人信息保护法; pinyin: Zhōnghuá rénmín gònghéguó gèrén xìnxī bǎohù fǎ) referred to as the Personal Information Protection Law or ("PIPL") protecting personal information rights and interests, standardize personal information handling activities, and promote the rational use of personal information. It also addresses the transfer of personal data outside of China.

The PIPL was adopted on August 20, 2021, and is effective November 1, 2021.[1] It is related to, and builds on top of both China's Cybersecurity Law ("CSL") and China's Data Security Law ("DSL").[2]: 131 

A reference English version was published on December 29, 2021.

History

On August 20, 2021, the Standing Committee of the 13th National People's Congress passed the Private Information Protection Law or ("PIPL"). The law, which took effect on November 1, 2021, applies to the activities of handling the personal information of natural persons within the borders of the China.

In comparison to countries in the West, China has developed its privacy laws over time at a slower pace. In recent years, though, China has more actively developed regulations, as the nation is considered a “global cyberforce.” China’s policies differ from Western nations, in that their perception of privacy is different due to historical and cultural reasons.[3]

During the drafting process, the European Union's General Data Protection Regulation ("GDPR") was used as a model and in some areas, PIPL closely tracks the GDPR.[2]: 252 

Provisions

Scope

The PIPL generally covers all organizations operating in China processing personal information.

Long Arm Jurisdiction

Some provisions also include Long Arm Jurisdiction over data collection and processes of organizations outside of China. These apply when:

  1. The purpose is to provide products or services to natural persons inside the borders;
  2. Analyzing or assessing activities of natural persons inside the borders;
  3. Other circumstances provided in laws or administrative regulations.

This presumably applies to offshore or multi-national companies with Chinese customers in China,[4] for example Amazon who might be shipping goods to a Chinese buyer, or Apple who may have Chinese users in the American App Store.

All such entities are required to establish a dedicated entity or appoint a representative within China.

Exemptions

There are few exemptions, but one that was added during late drafting provides a non-consent legal basis for handling employee data, though employee consent is still needed for overseas transfer, such as to a global corporate parent.[5][6]

Key Themes

Individual privacy, control and consent are consistent themes throughout the law, which lays down key principles including:

  • Personal Information - Defining personal information, including sensitive information;
  • Legal Basis - All data collection must have a legal basis for collection. There are several bases, but unlike in the GDPR, there is no legitimate interests basis;
  • Consent - A key legal basis is consent, which, unlike in the GDPR, must be obtained for each type of data processing activity, especially for transferring an individual's data overseas. Consent must also be "informed" with various types of notification and required content specified in the law;
  • Sensitive Data - Some types of personal information is sensitive, and the law provides an open-ended list of examples (unlike the GDPR's specific list of "special categories"), including biometrics, religion, specially-designated status, medical health, financial accounts, and location tracking;
  • Protecting Children - All personal information of minors under the age of 14 is sensitive, and specific consent is required from parents to process this information. This is much stricter than in the GDPR;
  • Individual Rights - The PIPL gives individuals several key rights over their information, such as the right to correct, delete, and view or transfer the data collected about them.
  • Responsibilities - Several articles lay out the various responsibilities of various parties collecting, transferring, and handling personal information;
  • Government Use of Personal Information - The PIPL includes when and how government agencies can collect and process data on individuals, including for national security, emergency, and other purposes;
  • Overseas Transfers - Specific restrictions on transfer of personal data outside of China;
  • Enforcement - Severe penalties for violations.

Definitions

The law defines the following:

  • Personal Information - Any type of information that identifies or can identify natural persons recorded electronically or by other means, but does not include anonymized information.
  • Sensitive Personal Information - Personal information that once leaked or illegally used can easily cause natural persons to suffer encroachments on their dignity or harms to their persons or property; including information such as biometrics (including facial recognition), religious faith, particular identities, medical care and health, financial status, and location tracking, as well as the personal information of minors under the age of 14.
  • Individuals - People whose data is being collected for processed (similar to the GDPR's Data Subject).
  • Personal Information Handlers: - Organizations or individuals that independently make decisions about the purposes and methods of personal information handling in personal information handling activities.
  • Entrusted Persons - External entities who Information Handlers entrust to handle personal information, essentially third parties.
  • Large Processors - Companies that process large amounts of data, as defined in Article 40, including Critical Information Infrastructure Operators ("CIIO") from the China's Critical Infrastructure Regulations.
  • Handling of Personal Information: Personal information handling includes personal information collection, storage, use, processing, transmission, provision, disclosure, deletion, etc.
  • Automated Decision-Making: The use of computer programs to automatically analyse, evaluate, and make decisions on personal information on personal behavior habits, hobbies or economic, health, credit status, and so forth.
  • De-Identification: The process of handling personal information to make it impossible to identify a specific natural person without the help of additional information.
  • Anonymization: The process in which personal information is handled so that it cannot be used to identify a specific natural person and cannot be restored after being so handled.

All personal information collection and processing must have one of the following legal bases:[7]

  1. Individuals’ consent obtained;
  2. Where necessary to conclude or fulfill a contract in which the individual is an interested party, or where necessary to conduct human resources management according to lawfully formulated labor rules and structures and lawfully concluded collective contracts;
  3. Where necessary to fulfill statutory duties and responsibilities or statutory obligations;
  4. Where necessary to respond to sudden public health incidents or protect natural persons’ lives and health, or the security of their property, under emergency conditions;
  5. Handling personal information within a reasonable scope to implement news reporting, public opinion supervision, and other such activities for the public interest;
  6. When handling personal information disclosed by persons themselves or otherwise already lawfully disclosed, within a reasonable scope in accordance with the provisions of this Law.
  7. Other circumstances provided in laws and administrative regulations.

Unlike in the GDPR, there is no legitimate interests basis.[8] Therefore, most consumers will likely be covered by giving their direct consent (such as for cookies, newsletters, etc.) or by contract fulfillment (such as shipping goods to them or providing services).

Consent is a major concern of the PIPL and a key legal basis on which handlers can process personal information.

If there is no other legal basis for processing data, handlers must get consent for data collection and processing, and this consent can be revoked by any individual at any time. Handlers are not allowed to refuse to provide products or services if an individual withholds or withdraws their consent for non-essential processing.

Separate consent is also specifically required in a number of situations:

  • Transfer of personal data by data controllers to third parties (Article 23);
  • Publication of personal data (Article 25);
  • Publication or provision of personal data collected by equipment installed in the public places for security purposes, such as personal images (Article 26);
  • Processing of sensitive personal data (Article 29); and
  • Cross-border transfers of personal data (Article 39).

Consent for these situations cannot be "bundled" and thus must be obtained separately from the individual.[9]

Where a change occurs in the purpose of personal information handling, the handling method, or the categories of handled personal information, the individual's consent shall be obtained again.[7]

Individual Rights

Individuals have several specific rights under the PIPL - they can:[7]

  • Know & Decide - Refuse and limit how their data is handled.
  • Access & Copy - View and copy their data.
  • Correct or Complete - Request to correct inaccurate data.
  • Erasure - Request their information be deleted and/or revoke consent.
  • Explanation - Request handlers explain their handling of an individual's personal information.
  • Portability - Request moving their data to another handler.

Automated Decision Making

There are specific rules for automated decision making in the PIPL, including the right of individuals to opt-out, such as disabling product recommendations.

The law specifically requires "transparency of the decision-making and the fairness and justice of the handling result shall be guaranteed, and they may not engage in unreasonable differential treatment of individuals in trading conditions such as trade price, etc."[7]

For companies pushing delivery or commercial sales to individuals through automated decision-making methods shall simultaneously provide the option to not target an individual's characteristics, or provide the individual with a convenient method to refuse.

When the use of automated decision-making produces decisions with a major influence on the rights and interests of the individual, they have the right to require personal information handlers to explain the matter, and they have the right to refuse that personal information handlers make decisions solely through automated decision-making methods.

Automated Decision Making is defined as "refers to the activity of using computer programs to automatically analyze or assess personal behaviors, habits, interests, or hobbies, or financial, health, credit, or other status, and make decisions."[7]

Facial Recognition

The PIPL specifically covers the use of facial recognition in public spaces, including that it can only be used for public security reasons unless each individual separately consents:

"The installation of image collection or personal identity recognition equipment in public venues shall occur as required to safeguard public security and observe relevant State regulations, and clear indicating signs shall be installed. Collected personal images and personal distinguishing identity characteristic information can only be used for the purpose of safeguarding public security; it may not be used for other purposes, except where individuals’ separate consent is obtained."[7]

Handler Obligations

Personal information handlers have several specific obligations:[7]

  1. Formulating internal management structures and operating rules;
  2. Implementing categorized management of personal information;
  3. Adopting corresponding technical security measures such as encryption, de-identification, etc.;
  4. Reasonably determining operational limits for personal information handling, and regularly conducting security education and training for employees;
  5. Formulating and organizing the implementation of personal information security incident response plans;
  6. Other measures provided in laws or administrative regulations.

All handlers must "regularly engage in audits of their personal information handling and compliance with laws and administrative regulations."

Personal Information Protection Officers

In addition, at a certain (not yet defined) data handling scale, handlers must appoint "personal information protection officers, to be responsible for supervising personal information handling activities as well as adopted protection measures, etc."

Impact Assessment

Under the following circumstances, handlers must perform a personal information protection impact assessment and report the results:[7]

  1. Handling sensitive personal information;
  2. Using personal information to conduct automated decision-making;
  3. Entrusting personal information handling, providing personal information to other personal information handlers, or disclosing personal information;
  4. Providing personal information abroad;
  5. Other personal information handling activities with a major influence on individuals.

Such assessments must include:

  1. Whether or not the personal information handling purpose, handling method, etc., are lawful, legitimate, and necessary;
  2. The influence on individuals' rights and interests, and the security risks;
  3. Whether protective measures undertaken are legal, effective, and suitable to the degree of risk.

Data Localization

The PIPL has specific requirements on data localization, the storage and processing of personal information in China.[8]

Data Security

Information handlers have several responsibilities, including adopting the following measures to ensure personal information handling conforms to the provisions of laws and administrative regulations, and prevent unauthorized access as well as personal information leaks, distortion, or loss:

  1. Formulating internal management structures and operating rules;
  2. Implementing categorized management of personal information;
  3. Adopting corresponding technical security measures such as encryption, de-identification, etc.;
  4. Reasonably determining operational limits for personal information handling, and regularly conducting security education and training for employees;
  5. Formulating and organizing the implementation of personal information security incident response plans;
  6. Other measures provided in laws or administrative regulations.

Impact Assessments

Impact Assessments are required in a number of situations, including:

  1. Handling sensitive personal information;
  2. Using personal information to conduct automated decision-making;
  3. Entrusting personal information handling, providing personal information to other personal information handlers, or disclosing personal information;
  4. Providing personal information abroad;
  5. Other personal information handling activities with a major influence on individuals.

Contractual Elements

Agreements are required when a handler entrusts personal data handling to another handler. Some law firms have suggested this will result in specific standard contractual clauses ("SCC"), similar to in the GDPR.[9]

Breach Notification

All data leaks must be reported internally, and if "harm may have been created" they may be required to notify the individuals affected. Notification details must include:

  1. The information categories, causes, and possible harm caused by the leak, distortion, or loss that occurred or might have occurred;
  2. The remedial measures taken by the personal information handler and measures individuals can adopt to mitigate harm;
  3. Contact method of the personal information handler.

Large Handlers

Large-scale handlers, such as those "providing important Internet platform services, that have a large number of users, and whose business models are complex" also have the obligations:

  1. Establish and complete personal information protection compliance systems and structures according to State regulations, and establish an independent body composed mainly of outside members to supervise personal information protection circumstances;
  2. Abide by the principles of openness, fairness, and justice; formulate platform rules; and clarify the standards for intra-platform product or service providers' handling of personal information and their personal information protection duties;
  3. Stop providing services to product or service providers on the platform that seriously violate laws or administrative regulations in handling personal information;
  4. Regularly release personal information protection social responsibility reports, and accept society's supervision.

Overseas Transfers

Moving personal information outside of China is only allowed if one of these conditions is satisfied:[7]

  1. Passing a security assessment organized by the State cybersecurity and information department according to Article 40 of this Law;
  2. Undergoing personal information protection certification conducted by a specialized body according to provisions by the State cybersecurity and information department;
  3. Concluding a contract with the foreign receiving side in accordance with a standard contract formulated by the State cyberspace and information department, agreeing upon the rights and responsibilities of both sides;
  4. Other conditions provided in laws or administrative regulations or by the State cybersecurity and information department.

All such transfers require each individual's separate consent and notification about "the foreign receiving side’s name or personal name, contact method, handling purpose, handling methods, and personal information categories, as well as ways or procedures for individuals to exercise the rights provided in this Law with the foreign receiving side, and other such matters."[7]

Sharing data with foreign governments

Information handlers are prohibited from sharing any personal information with foreign judicial or law enforcement agencies with approval.[7]

This has raised concerns among law firms about how multi-national corporations would or could respond to judicial inquiries in other countries, such as a warrant for data held about a Chinese citizen in those countries.

Government Departments

The PIPL includes legal basis for how government ("State Organs") can collect and process data. Generally, the government must follow the same rules as non-government entities, including notifications. There are some exceptions, such as when it "shall impede State organs’ fulfillment of their statutory duties and responsibilities".[7]

See also

Citations

  1. ^ "中华人民共和国个人信息保护法_中国人大网". www.npc.gov.cn. Retrieved 2023-10-16.
  2. ^ a b Zhang, Angela Huyue (2024). High Wire: How China Regulates Big Tech and Governs Its Economy. Oxford University Press. doi:10.1093/oso/9780197682258.001.0001. ISBN 9780197682258.
  3. ^ "Recent evolution of the personal privacy legal protection in people's Republic of China". iris.uniroma1.it. Retrieved 2023-10-06.
  4. ^ "China Passes the Personal Information Protection Law, to Take Effect on November 1". Gibson Dunn. 2021-09-10. Retrieved 2021-09-29.
  5. ^ "Employee Personal Information Protection in China – Are You Up to Speed?". Crowell & Moring LLP. 2021-08-25. Retrieved 2021-09-29.
  6. ^ Briefing, China (2021-02-02). "Employers in China Should Prepare for Compliance Expectations Under Draft PIPL". China Briefing News. Retrieved 2021-09-30.
  7. ^ a b c d e f g h i j k l "Translation: Personal Information Protection Law of the People's Republic of China | DigiChina". digichina.stanford.edu. Retrieved 2021-09-29.
  8. ^ a b "China's Personal Information Protection Law (PIPL): Key Questions Answered | Morrison & Foerster". www.mofo.com. Retrieved 2021-09-29.
  9. ^ a b "The journey has just begun: China passes its Personal Information Protection Law". www.hoganlovells.com. Retrieved 2021-09-29.

Read other articles:

Artikel ini sebatang kara, artinya tidak ada artikel lain yang memiliki pranala balik ke halaman ini.Bantulah menambah pranala ke artikel ini dari artikel yang berhubungan atau coba peralatan pencari pranala.Tag ini diberikan pada Maret 2024. Sukadana beralih ke halaman ini. Untuk kegunaan lain, lihat Sukadana (disambiguasi). Batu Sukadana adalah batu cap atau batu bergambar (rock painting) yang berada di Desa Sedahan Jaya, Kecamatan Sukadana, Kabupaten Kayong Utara, merupakan salah satu peni...

 

Mardanas SafwanBiografiData pribadiKelompok etnikOrang Minangkabau Drs. Mardanas Safwan (1 Maret 1938 – 14 Februari 2006) adalah sejarawan Indonesia. Sepanjang hidupnya ia telah banyak meneliti dan menulis buku-buku sejarah Indonesia. Kehidupan awal Mardanas merupakan anak pertama dari lima bersaudara. Ayahnya bernama Safwan Datuk Mangkudun. Sejak kecil ia ulet membantu kebutuhan hidup keluarga dengan berdagang menyusupkan rokok dan kebutuhan rumah tangga pada masa penjajahan ...

 

Underground rapid transit line in Glasgow, Scotland Glasgow Underground redirects here. For the record label, see Glasgow Underground Recordings. Glasgow SubwayFo-thalamh GhlaschuOverviewLocaleGlasgow, ScotlandTransit typeLight metroNumber of lines2Number of stations15Annual ridership8.0 million (2021/22)[1]WebsiteOfficial websiteOperationBegan operation14 December 1896; 127 years ago (1896-12-14)Operator(s)Strathclyde Partnership for TransportTechnicalSystem le...

Konfederasi Sepak Bola Amerika Utara, Tengah, dan KaribiaConfederation of North, Central American and Caribbean Association FootballAnggota asosiasi CONCACAF dalam warna pinkTanggal pendirian18 September 1961; 62 tahun lalu (1961-09-18)TipeOrganisasi olahragaKantor pusat New York, Amerika SerikatJumlah anggota 41 asosiasi nasionalPresidenVictor MontaglianiSekretaris JenderalPhilippe MoggioOrganisasi indukFIFAAnak organisasi NAFU (Amerika utara) UNCAF (Amerika Tengah) CFU (karibia) Situs ...

 

Cattedrale di Santa Maria AssuntaLa facciata della cattedraleStato Italia RegioneLiguria LocalitàSavona IndirizzoPiazza del Duomo, Savona (SV) Coordinate44°18′27.19″N 8°28′55.91″E / 44.307553°N 8.482197°E44.307553; 8.482197Coordinate: 44°18′27.19″N 8°28′55.91″E / 44.307553°N 8.482197°E44.307553; 8.482197 Religionecattolica di rito romano TitolareMaria Assunta Diocesi Savona-Noli Consacrazione1605 Stile architettonicobarocco Inizio ...

 

Public college in Denver, Colorado, US This article relies excessively on references to primary sources. Please improve this article by adding secondary or tertiary sources. Find sources: Community College of Denver – news · newspapers · books · scholar · JSTOR (March 2011) (Learn how and when to remove this message) Community College of DenverCCD's Confluence Building on the Auraria Campus.Other nameCCDMottoExplore. Experience. Engage.TypePublic commu...

Putri Oskar dari Prusia, Countess Ruppin (27 Januari 1888 – 17 September 1973) adalah aristokrat Jerman dan istri dari Pangeran Oskar dari Prusia. Oleh karena itu, dia menjadi menantu dari Kaisar Jerman Wilhelm II.[1] Putri Ina MariePutri Oskar dari PrusiaCountess RupppinCountess Ina Marie, 1916Kelahiran(1888-01-27)27 Januari 1888Bristow, Keharyapatihan Mecklenburg-Schwerin, Kekaisaran JermanKematian17 September 1973(1973-09-17) (umur 85)Munich, Bavaria, Jerman BaratPemakaman19...

 

This article includes a list of general references, but it lacks sufficient corresponding inline citations. Please help to improve this article by introducing more precise citations. (June 2019) (Learn how and when to remove this message) For other uses, see Modi ministry. This article is part of a series aboutNarendra Modi Prime Minister of IndiaIncumbent Electoral history Public image Awards and honours Bibliography Chief Minister of Gujarat 2002 2007 2012 Gujarat Council of Ministers Firs...

 

Interstate Highway in Texas Interstate 110I-110 highlighted in redRoute informationAuxiliary route of I-10Maintained by TxDOTLength0.92 mi[1] (1,480 m)ExistedApril 1, 1967[2]–presentNHSEntire routeMajor junctionsSouth end Fed. 45 at Ciudad Juárez, ChihuahuaMajor intersections US 62 in El Paso US 54 in El PasoNorth end I-10 / US 180 in El Paso LocationCountryUnited StatesStateTexasCountiesEl Paso Highway system Interstate Hig...

Human chromosome Chromosome 10Human chromosome 10 pair after G-banding.One is from mother, one is from father.Chromosome 10 pair in human male karyogram.FeaturesLength (bp)134,758,134 bp(CHM13)No. of genes706 (CCDS)[1]TypeAutosomeCentromere positionSubmetacentric[2](39.8 Mbp[3])Complete gene listsCCDSGene listHGNCGene listUniProtGene listNCBIGene listExternal map viewersEnsemblChromosome 10EntrezChromosome 10NCBIChromosome 10UCSCChromosome 10Full DNA sequencesRefSeqNC_...

 

Климатическая карта Австралии по Кёппену Климат Австралии в основном определяется её размером и горячим воздухом, придавливаемым субтропическим поясом высокого давления (субтропический хребет). В зависимости от времени года этот пояс смещается на северо-запад и север�...

 

International athletics championship eventWomen's short race at the 2005 IAAF World Cross Country ChampionshipsOrganisersIAAFEdition33rdDateMarch 20Host citySaint-Galmier, Rhône-Alpes, France VenueHippodrome Joseph DesjoyauxEvents6Distances4.196 km – Women's shortParticipation104 athletes from 29 nations← 2004 Bruxelles 2006 Fukuoka → The Women's short race at the 2005 IAAF World Cross Country Championships was held at the Hippodrome Joseph Desjoyaux in Saint-Galmier near Saint...

Поэдуа Дата рождения около 1758[1] Дата смерти не позднее 1788[1] Страна Раиатеа Род деятельности аристократка Отец неизвестно  Медиафайлы на Викискладе Поэдуа (также Поэту, родилась около 1758 — умерла до 1788) — таитянская принцесса, дочь вождя (короля) О...

 

Charlotte BobcatsStagione 2005-2006Sport pallacanestro Squadra Charlotte Hornets AllenatoreBernie Bickerstaff Vice-allenatoriJ.B. Bickerstaff, Gary Brokaw, Jeff Capel, Gary Kloppenburg, John Outlaw NBA26-56 (31,7%)Division: 4º posto (Southeast)Conference: 13º posto (Eastern) Playoffnon qualificata StadioCharlotte Bobcats Arena 2004-2005 2006-2007 La stagione 2005-06 dei Charlotte Bobcats fu la 16ª nella NBA per la franchigia. I Charlotte Bobcats arrivarono quarti nella Southeast Divis...

 

N-th root of the arithmetic mean of the given numbers raised to the power n This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Generalized mean – news · newspapers · books · scholar · JSTOR (June 2020) (Learn how and when to remove this message) Plot of several generalized means M p ( 1 , x ) {\displaystyle M_{...

2014 single by Kate Miller-HeidkeOffer It UpSingle by Kate Miller-Heidkefrom the album O Vertigo! Released28 July 2014[1]GenrePopLength3:45LabelIndependent, Cooking VinylSongwriter(s)Kate Miller-Heidke, Keir NuttallKate Miller-Heidke singles chronology Sing To Me (2014) Offer It Up (2014) I'm Growing a Beard Downstairs for Christmas (2015) Offer It Up is a song by Australian singer songwriter Kate Miller-Heidke and released in Germany in July 2014 as the third and final single from M...

 

This template does not require a rating on Wikipedia's content assessment scale.It is of interest to the following WikiProjects:Peru Peru portalThis template is supported by WikiProject Peru. This project provides a central approach to Peru-related subjects on Wikipedia. Please participate by editing the article, and help us assess and improve articles to good and 1.0 standards, or visit the wikiproject page for more details.PeruWikipedia:WikiProject PeruTemplate:WikiProject PeruPeru articles...

 

MarceloMarcelo con il Real Madrid nel 2019Nazionalità Brasile Altezza174 cm Peso80 kg Calcio RuoloDifensore Squadra Fluminense CarrieraGiovanili 2002-2005 Fluminense Squadre di club1 2005-2007 Fluminense28 (4)2007-2022 Real Madrid386 (26)2022-2023 Olympiacos5 (0)2023- Fluminense32 (2)[1] Nazionale 2005 Brasile U-173 (1)2007 Brasile U-204 (0)2008-2012 Brasile olimpica12 (1)2006-2018 Brasile59 (6)[2] Palmarès  Confederations Cup OroB...

У этого термина существуют и другие значения, см. Солёное Озеро. Не следует путать с Таганаш. СтанцияСолёное Озероукр. Солоне ОзероСолёное Озеро — СевастопольКрымская железная дорога 45°53′02″ с. ш. 34°26′57″ в. д.HGЯO Оператор Крымская железная дорога Дата открыти�...

 

Theory of international relations International relations theory Constructivism Feminist constructivism Liberalism Idealism Democratic peace theory Capitalist peace Republican liberalism Liberal institutionalism Marxism Dependency theory Theories of imperialism Uneven and combined development World-systems theory Realism Classical realism Neoclassical realism Neorealism Offensive realism Defensive realism Territorial peace theory Democratic peace theory Realpolitik Other theories Neo-Gramscia...