ENV Regulation Series // Report 004 China Supply Chains State Council Orders No. 834 & 835 Industrial Security Framework Anti-Extraterritoriality Supply-Chain Security Sovereign EHS Stack ENV Regulation Series // Report 004 China Supply Chains State Council Orders No. 834 & 835
ENV Regulation Series // Report 004

The Securitization
of China Supply Chains

A strategic deep dive into the 2026 regulatory paradigm: navigating State Council Orders No. 834 and 835 within the EHS securitization framework.

Effective: April 7, 2026 Immediate Enforcement Restricted // Sovereign Supply-Chain Security Anti-Extraterritoriality
Report
004
ENV Regulation Series
Order No.
834
Supply-Chain Security
Order No.
835
Anti-Extraterritoriality
Primary Risk
Data
Auditability + Evidence
Executive Summary

China risk is moving into auditability, evidence, cloud design, and local data architecture.

Not simply “more ESG regulation.”

This report finds that China’s 2026 shift is not best understood as “more ESG regulation.” It is a change in legal framing: operational, environmental, health, safety, provenance, resilience, and audit-related information is increasingly being assessed through national-security, industrial-policy, and anti-extraterritoriality lenses.

Order No. 834 created a dedicated administrative framework for industrial and supply-chain security, while Order No. 835 created a broader framework to identify, block, and counter foreign measures that China deems improper extraterritorial jurisdiction.

Key finding

“Multinational firms can now find themselves exposed not only because a foreign law demands a traceability or sanctions response, but because China can scrutinize the implementation of that foreign-law response itself.”

The portfolio implication is that “China risk” now sits not only in tariffs, export controls, and market access, but also in auditability, evidentiary sufficiency, cloud design, and the lawful separation of local operations from global reporting.

Regulatory Timeline

Translating broad legal powers into valuation consequences.

Date Instrument Significance
Sep 2020 Unreliable Entity List Tool for foreign entities deemed to harm China’s sovereignty.
Jan 2021 MOFCOM Blocking Rules Mechanism to counter unjustified extraterritorial legislation.
Jul 2022 CAC Data Export Rules Formalized outbound security review for “Important Data.”
Mar 2026 Order No. 834 Unified administrative framework for supply-chain security.
Apr 2026 Order No. 835 Elevated anti-extraterritoriality enforcement to State Council regulation.
Source: MOFCOM, CAC, and Chinese State Council Archives 2026
Order No. 834

Supply-chain security becomes an administrable concept.

Named ministries and cross-agency control.

Order No. 834 turns “supply-chain security” into an administrable concept with named responsible ministries. The Chinese text expressly assigns roles to 15+ departments including state security, customs, and cybersecurity.

Article 13 // Data Control

“No organization may, in violation of state provisions, collect information on important raw materials or directly or indirectly transfer or provide such information to foreign organizations or individuals.”

Article 15 extends this logic to foreign organizations that interrupt ordinary transactions or take discriminatory measures, causing harm to China’s industrial security.

Order No. 835

China’s anti-extraterritoriality toolkit moves up the enforcement stack.

Appropriate connection jurisdiction.

Order No. 835 elevates the anti-extraterritoriality toolkit. Article 4 states that China may exercise jurisdiction over conduct with an “appropriate connection” to China. Once identified, foreign “improper measures” are blocked.

Article 8 Penalties

  • Malicious entity listing for foreign promotes.
  • Visa and entry restrictions for high-level EHS personnel.
  • Property freezes and transaction limits.
  • Strict limitations on cross-border data provision.

Article 14 creates a civil cause of action for Chinese organizations harmed by the assistance in execution of foreign improper measures.

Western vs. Chinese Frameworks

Conflict vectors are forming around evidence, traceability, and source-level data.

Western Regime Core Obligation China Conflict Vector
UFLPA Provide supply-chain tracing evidence to rebut Xinjiang presumption. Worker and supplier data intersects with Order 834 information controls.
EU CSDDD Identify and address adverse impacts across entire value chains. Source-level evidence requests create foreign-law implementation pressure.
EU CBAM Declare embedded-emissions data for industrial imports. Process-level emissions data becomes strategically sensitive.
Battery Regulation Battery passport requires full-lifecycle material and ESG data. Battery recycling and lifecycle data governed as sovereign data.
For full 75,000-word analysis please subscribe
Sector Vulnerability Matrix

Where Western diligence pressure and Chinese sovereign sensitivity intersect.

High Exposure

EV Batteries

China produced nearly 80% of cells in 2024. New recycling rules effective April 1, 2026 sit at the direct intersection of UFLPA and EU Battery Passport architectures.

High Exposure

Renewables

China exceeds 80% share in all PV stages. 2026 Green-Design guidance makes production throughput and EHS data strategically sensitive.

Critical Risk

Critical Minerals

China is a refining leader for 19 of 20 strategic minerals. Orders 834 and 835 provide legal basis for treating sourcing and customer data as a security problem.

Audit Model Breakpoint

The single global audit stack is being replaced by a China-adapted dual-track architecture.

Dimension Pre-2024 Legacy Model 2026 Adapted Model
Lead Actor Global HQ or foreign audit team. PRC counsel or state-certified local auditor.
Evidence Capture Broad, default-maximal collection. Purpose-limited and legally triaged.
Worker Interviews Transcript-heavy, direct access. Local summaries, strictly controlled scripting.
Digital Architecture Single global data lake. Ring-fenced China data repository.
Assurance Product Full raw evidence package. KPI dashboards or substitute attestations.
Sovereign EHS Stack

A robust architecture requires five layers.

Recommended architecture

A robust architecture requires local source systems, a China-resident evidence lake, a legal classification engine, a substitute-attestation layer, and a minimized outbound interface.

  • Layer 1: China Data Lake
  • Layer 2: Gated Outbound Interface
  • Legal classification engine
  • Substitute-attestation layer
  • Minimized outbound reporting interface

Recommended Cloud Architecture

Provider Share
Alibaba 36%
Huawei 16%
Tencent 9%

Source: Omdia Q3 2025 Release.

Sovereign Compliance Playbook

Three immediate operating protocols for multinational EHS teams.

01

Dilemma Protocol

Freeze non-essential transfers whenever foreign regulators demand primary evidence. Escalate unresolved cases to a senior decision committee.

02

Data Gating

Global systems receive aggregate metrics only. Classify every China-origin data field for transfer status before any outbound use.

03

Personnel Review

Separate local versus global access permissions. Build in travel reviews for high-conflict EHS officers subject to Order 835 exit-entry restrictions.

ENV White Paper Series

Access the full sovereign EHS and China supply-chain risk framework.

Subscribe for the full 75,000-word white paper, source notes, sector vulnerability matrix, audit model templates, and implementation guidance for institutional investors and operators.

Access Full White Paper // Subscribe
GAYA CAPITAL
CONFIDENTIAL // INTELLIGENCE BRIEFING TB4

Intelligence Sources // ENV Series ER4

© 2026 Gaya Capital Management. All rights reserved. Data derived from State Council Orders 834 and 835 and the 2026 Industrial Security Framework. Information contained herein does not constitute legal advice.

  1. Order No. 834 PRC Chinese Text.
  2. MOJ Q&A on Supply Chain Security.
  3. Authorized Release: Anti-Extraterritoriality.
  4. IEA Global EV Outlook 2025.
  5. IEA Critical Minerals concentration report.
  6. Omdia Mainland China Cloud Infrastructure market.
  7. CAC rules on Cross-Border Data Flows 2024.
  8. EU CSDDD and CSRD simplified frameworks.
  9. CECC report on PRC social audit unreliability.