This piece marks the third installment in our ongoing series analyzing compelled decryption laws. As digital evidence continues to play a central role in modern investigations, legal systems worldwide are actively addressing the friction between encrypted devices and law enforcement access. For this chapter, our geographic focus shifts to East Asia. The region provides a highly practical comparative landscape for observing how neighboring jurisdictions weigh the technical demands of modern forensics against individual procedural rights. To map these diverse approaches, the following sections review the current legal mechanisms in mainland China, Hong Kong, Taiwan, Japan, and South Korea.
Key Points:
In the People’s Republic of China, digital investigations operate within a framework that prioritizes state security and investigative access over an individual right to refuse cooperation. Rather than building the justice system around an expansive right to silence, mainland law gives security authorities broad access powers and imposes specific duties of technical assistance on regulated entities, particularly in matters of national security, public safety, and counter-terrorism.
However, the legal mechanics of compelled decryption are more specific than often assumed. While criminal procedure laws impose a general civic duty to report crimes, they do not contain a blanket decryption mandate for ordinary citizens. Instead, the clearest and most forceful digital-access rules target corporate entities.
Under the country’s cybersecurity and counter-terrorism statutes, the burden of access falls heavily on network operators, telecommunications companies, and internet service providers. These laws legally bind operators to provide technical support to public and state security organs. In terrorism investigations, the mandate goes even further, expressly requiring service providers to supply technical interfaces and decryption assistance, backed by severe corporate penalties for non-compliance.
This creates a distinct legal reality: mainland Chinese law unequivocally compels decryption assistance from regulated technology providers. What it does not clearly do—at least on the face of current statutes—is create a neatly defined, standalone criminal offense that automatically penalizes an ordinary individual simply for refusing to hand over a personal passcode. The system undeniably favors state access, but it anchors its strictest decryption duties and enforceable penalties on the entities operating the networks rather than the individual suspect.
This framework, however, remains fluid. On January 31, 2026, the Ministry of Public Security published a Draft Law on Cybercrime Prevention and Control. While currently only a draft rather than enacted law, it signals an ongoing effort to consolidate and potentially expand the state’s oversight of digital spaces.
Key Points:
Once a territory under the British Crown, Hong Kong was transferred back to Chinese sovereignty under the premise of “one country, two systems.” This diplomatic arrangement was designed to maintain the region’s status quo, preserving its independent judiciary, capitalist economy, and common law legal traditions distinct from the mainland. However, observing the current legal environment reveals a gradual shift in that structural separation, particularly in how digital rights and investigative powers are managed.
The implementation of the National Security Law (NSL) served as the primary catalyst for altering the region’s legal landscape, bridging the gap between Hong Kong’s common law history and a more centralized, security-oriented approach. Under amendments to the NSL implementation rules enacted in March 2026, law enforcement agencies are now empowered to compel individuals to hand over device passwords and provide decryption assistance. The scope of these provisions is formally restricted to cases involving matters of national security. Furthermore, procedural scrutiny is required; officials have clarified that police cannot randomly demand passcodes from the public. Law enforcement must first secure the appropriate legal authorization or a warrant to search the device before a password demand can be made.
Once that legal authorization is obtained, however, the burden is placed directly on the device owner or user. In these specific national security contexts, refusing to cooperate is not shielded by the traditional right to remain silent. The updated rules classify non-compliance as a criminal offense carrying substantial penalties that include fines of up to HK$100,000 and up to a year in prison.
Key Points:
Taiwan operates as a self-governing democracy, maintaining its distinct political and legal systems while navigating the persistent geopolitical threat of annexation. This ongoing reality has fostered a legal environment that is highly sensitive to state overreach and firmly anchored in democratic due process.
Reflecting these principles, the jurisdiction maintains strict barriers against state coercion in digital investigations. Article 95 of the Taiwanese Code of Criminal Procedure explicitly protects a suspect’s right against self-incrimination, a safeguard that the legal community applies directly to digital devices. The prevailing legal consensus across the country is that compelling an individual to disclose a password or encryption key constitutes a clear violation of these core procedural protections. Consequently, authorities cannot legally criminalize a suspect’s refusal to unlock a device. To access encrypted evidence, Taiwanese law enforcement must rely entirely on independent forensic capabilities and technical analysis rather than legal compulsion, preserving a definitive boundary between state investigative powers and the right to remain silent.
Observing this specific geographic and political cluster provides a clear illustration of how different governance models directly shape the rules of digital evidence.
Mainland China anchors one end of the spectrum, operating under a framework where individual digital autonomy is structurally subordinated to the mandates of the security apparatus. The legal baseline strongly favors state access, placing the clearest and strictest decryption duties on network operators, telecommunications companies, and internet service providers.
Hong Kong currently occupies a practical middle ground. The territory applies these state-first compliance rules strictly to matters involving national security, while generally preserving its traditional protections against self-incrimination for standard criminal investigations.
Across the strait, Taiwan offers a direct contrast by actively defending the right against self-incrimination across the board. The jurisdiction maintains a recognized boundary between the state’s investigative reach and individual procedural rights, leaving the burden of decryption entirely on the authorities.
Key Points:
Japan’s justice system faces a unique friction point when it comes to digital evidence. At the constitutional level, Article 38 guarantees the right to remain silent and prohibits convictions based on coerced confessions. However, this foundational shield intersects with the country’s Code of Criminal Procedure. Under Article 111-2, when officers execute a search or seizure warrant involving electronic-record media, they may ask the person subject to the measure to operate the computer or provide “some other form of cooperation” – a clause understood to include decryption.
This is where the ambiguity arises. Article 111-2 gives investigators a statutory basis to request assistance, but its wording is strictly permissive. Officers “may ask” for cooperation, but the law does not expressly criminalize refusal or settle how far that request can be pressed against Article 38’s protection against self-incrimination. Because pushing a suspect to unlock a device raises immediate constitutional concerns, Japanese law enforcement tends to tread carefully. Rather than relying strictly on direct legal pressure, investigators lean on third-party forensic tools to unlock devices independently, or use standard interrogation to persuade suspects to grant access voluntarily. This approach reflects a system actively trying to navigate the digital barrier while reducing the risk of a constitutional clash.
Key Points:
South Korea presents the case of a highly digitized society still debating how to handle digital evidence. Rooted in constitutional protections against self-incrimination, the legal system frequently runs into a familiar barrier when suspects withhold their passcodes. This creates a distinct bottleneck for law enforcement, as prosecutors and police often find their inquiries stalled when key figures simply refuse to unlock their smartphones or computers.
To address this investigative standstill, there was a prominent legislative push in 2020 to introduce a compelled decryption law. The proposal sought to penalize non-compliance, effectively treating the refusal to provide a phone password as an independent criminal offense. However, the effort was later scrapped amid intense criticism and human rights concerns. Civil rights groups and legal professionals argued that forcing an individual to disclose a password crosses a fundamental boundary, directly violating the constitutional protection against compelled self-incrimination.
This leaves South Korea in an unsettled position. While authorities actively seek a statutory mechanism to ensure investigative access, the legal basis for compelling an ordinary suspect to unlock a personal device remains contested in light of existing constitutional safeguards.
Ultimately, the East Asian landscape provides a clear map of a growing bifurcation in global law regarding compelled decryption. Looking at the region’s varied approaches to digital forensics and individual rights, two distinct paths emerge. Jurisdictions structured around centralized state control generally give investigative authorities broader access powers and impose stronger duties of technical assistance, especially on regulated service providers. In contrast, jurisdictions that emphasize democratic due process continue to work through the everyday friction between modern investigative demands and the historical preservation of the right against self-incrimination.