Considerations for Data Security Solutions - Policy and Context 1

Policy and Background
Policy Promotion:

• The "Cyber ​​Security Law" came into effect on June 1, 2017, which clarifies that the use and sale of data without the owner's consent is illegal; • The introduction of various compliance documents in the Internet finance and insurance industries, It is clearly stipulated that when conducting business, it must meet the requirements of equal protection to ensure data security; • In the medical and health industry, according to Article 30 of the latest "Internet Diagnosis and Treatment Management Measures (Trial)", it is clearly stipulated that "the Internet information security system has not been established Those who fail to implement the information security and medical data confidentiality system, illegally trade, leak patient information and medical data are not allowed to carry out Internet diagnosis and treatment activities, and if the circumstances are serious, they will be handed over to judicial organs.

Demand pushes:

• Entering the era of DT and cloud, no one denies that data is an asset and wealth, whether it is an individual or an enterprise. When all your "wealth" is on someone else's cloud, how can I ensure the security of my data assets? • Frequent data leakage incidents. In 2016, more than 700 million pieces of medical data were leaked; • Promoted by giants. In the previous dispute between Cainiao and SF Express, everyone used the name of "data security" to defend their positions, but the essence was the dispute over data ownership. Whose data is it? Who is in charge of corporate and personal data? How can technology be used to protect our data security and data ownership?

 

to be continued. . . .

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=326217426&siteId=291194637