Haitai Fangyuan's "Digital Government Password Application and Data Security Compliance Construction Guidelines" successfully passed the review

Recently, Haitai Fangyuan's "Digital Government Password Application and Data Security Compliance Construction Guidelines" (hereinafter referred to as "Guidelines") successfully passed the expert review. Experts from China Information Association, Beijing Institute of Electronic Technology, China Institute of Electronic Technology Standardization, Institute of Information Engineering, Chinese Academy of Sciences, and Information Center of the Ministry of Water Resources were invited to review the Guide. As the leading compiling company, Zoe Liu, senior vice president of Haitai Fangyuan, and Peter Sun, general manager of the data security business department, made a detailed report on the compiling results. After questioning and discussion by the participating experts, it was unanimously agreed that the "Guidelines" passed the expert review, and fully affirmed the necessity and practical significance of its compilation, believing that it will help the digital government information system to achieve safe and reliable operation, and will accelerate the construction of digital government Has high practical value.

insert image description here

background introduction

Haitai Fangyuan's "Digital Government Password Application and Data Security Compliance Construction Guidelines" is a supporting guide to the National Information Center's "Digital Government Network Security Compliance Guidelines" (hereinafter referred to as "Guidelines").
The "Guidelines" comprehensively sort out my country's existing laws, regulations, methods, and standards in the field of network security from the perspective of work and technology, and provide guidance, assistance and support for relevant units to standardize network security work in the field of non-secret-related digital government. refer to.
Haitai Fangyuan's "Guidelines" refer to the "Guidelines", follow the requirements of national laws and regulations, and in accordance with national and industry standards, for construction units in the field of digital government, meet the compliance requirements for password applications and data security, and consolidate the security infrastructure , comprehensively implement password applications, adopt a series of digital security technical means to strengthen security protection capabilities, solve security risks, and provide targeted solution references.

Company Introduction

With the full capabilities of cryptography and trusted data governance as the core, it will comprehensively serve the era of cybersecurity and informatization.

Haitai Fangyuan has been deeply involved in the fields of cryptography application and data security governance for 20 years. It has comprehensive services in cryptography security and data, including cutting-edge cryptography technology research capabilities, core cryptography technology integration capabilities, new cryptography product research and development capabilities, in-depth scene customization capabilities, and complex engineering delivery capabilities. Secure all kinds of scenarios, empower various industries such as party and government, finance, large enterprises, education, etc., and ensure the safe operation of infrastructure in important areas of the country; at the same time, it is committed to strengthening data resource sharing, promoting the intelligent use of data resource value, and strengthening data security The protection guarantee system can meet the strategic needs of government and enterprise users for data governance and data security guarantee of core data assets in a standardized, safe and efficient manner, and comprehensively support the modernization of the national governance system and governance capabilities.
In the future, Haitai Fangyuan will, as always, fully assume the role of industrial strength, further consolidate the fundamental and core role of cryptography in ensuring network and information security, give full play to data security and data governance capabilities, and effectively maintain the security of digital government information systems.

Guess you like

Origin blog.csdn.net/weixin_41926587/article/details/130514091