The national "data security three certification" diagram is here

The 20th Congress guides the new era and new journey. The blueprint has been drawn, the horn has been sounded, and the new journey is one full of glory and dreams. The report of the 20th National Congress profoundly clarified a series of major issues in realizing the great rejuvenation of the Chinese nation, systematically drew a grand blueprint for promoting national rejuvenation through Chinese-style modernization, and is a political declaration and program of action leading the great rejuvenation of the Chinese nation. At present, the changes of the world, the times, and history are unfolding in an unprecedented way. Human society is facing unprecedented challenges. The world is once again standing at the crossroads of history. It depends on the choices of the people of all countries. my country insists on putting the focus of economic development on the real economy, adheres to the core position of innovation in the overall modernization of our country, accelerates the construction of a new development pattern, focuses on promoting high-quality development, promotes high-level opening up, and steadily expands rules, regulations, Management, standards and other systems are open, and a modern socialist country is built in an all-round way. The international situation is undergoing profound changes, and Chinese-style modernization provides a new choice for mankind to realize modernization.

New security escorts Chinese-style modernization. Chinese-style modernization covers a huge population. To achieve common prosperity for all people, to coordinate material civilization and spiritual civilization, to promote the harmonious coexistence of man and nature, to adhere to the path of peaceful development, and security is the premise of all these developments. Looking back on the development of informatization, today's new generation of information technology has been more and more closely integrated with the business of various industries, and the matching security technology is also upgrading from "plug-in" to "embedded" new security. "New security" is the basic support for achieving high-quality development and building a cyber power and a digital China. It not only plays an increasingly prominent role in maintaining national security, promoting economic and social development, and protecting the interests of the people, but will also be a new era opened by the 20th National Congress of the Communist Party of China. Accelerate development on the journey, protect important data and personal information, and escort Chinese-style modernization.

Implement data security certification and strengthen personal information protection. Actual combat is the only criterion for testing security capabilities, and compliance comes from best practices in actual combat, which is an effective means to popularize and improve protection capabilities. my country's "Network Security Law", "Cryptography Law", "Data Security Law", "Personal Information Protection Law" and other security laws have been promulgated and implemented successively, providing institutional support and legal guarantee for data security construction, and government departments are also actively promoting security certification compliance The construction work has consolidated the foundation and capabilities of my country's data security. At present, the State Administration for Market Regulation and the Central Cyberspace Administration of China (National Cyberspace Administration of China) have promulgated and established three data security certification systems: "Personal Information Protection Certification", "Data Security Management Certification", "Mobile Internet Application (App ) "Security Certification", combined with "secret evaluation" and other process compliance, has formed a complete compliance baseline combination for effective protection of personal information and important data .

On November 18, 2022, the State Administration for Market Regulation and the State Internet Information Office decided to implement personal information protection certification. This is a key link in the country's establishment of a personal information protection certification system. protection ability. Certification bodies engaged in personal information protection certification work shall carry out relevant certification activities after approval, and implement certification in accordance with the "Personal Information Protection Certification Implementation Rules".

On June 5, 2022, the State Administration for Market Regulation and the Internet Information Office of the People's Republic of China issued an announcement on "Certification of Data Security Management", encouraging network operators to standardize network data processing activities through certification, strengthen network data security protection, and It is required to implement certification in accordance with the Implementation Rules for Data Security Management Certification.

On March 13, 2019, the State Administration for Market Regulation and the Central Cyberspace Administration issued an announcement on "App Security Certification Work", in order to regulate the collection and use of mobile Internet applications, strengthen personal information security protection, and require compliance with the "Mobile Internet Application (App) Security Certification Implementation Rules" to implement certification.

On the occasion of the 20th National Congress and the release of the "Implementation Rules for Personal Information Protection Certification", Lianshi studied the report of the 20th National Congress in depth, felt the great achievements, drew on the strength to forge ahead, and guided the technology and product innovation of "reform-free data security" with the spirit of the 20th National Congress of the Communist Party of China . In order to let everyone better understand the country's "three data security certifications", Lianshi explained in detail the "Implementation Rules for Personal Information Protection Certification", "Implementation Rules for Data Security Management Certification" and "Mobile Internet Application (App) Security Certification" in graphic and text form. "Implementation Rules", and according to the standards GB/T 35273 "Information Security Technology Personal Information Security Specification", TC260-PG-20222A "Personal Information Cross-border Processing Activities Security Certification Specification", GB/T 41479 "Information Security Technology Network Data Processing Security Requirements" and other related documents. Due to the limited level of the author, colleagues in the industry are welcome to discuss and improve it together.

Follow this account, private message the editor, and you can package and download the "Implementation Rules for Personal Information Protection Certification", "Implementation Rules for Data Security Management Certification", "Implementation Rules for Mobile Internet Application (App) Security Certification", and according to the standard GB/T 35273 " The graphic PDF versions and policies of the six documents of "Information Security Technology Personal Information Security Specification", TC260-PG-20222A "Security Certification Specification for Cross-Border Processing of Personal Information", and GB/T 41479 "Information Security Technology Network Data Processing Security Requirements" original.

Statement of originality: The illustrations and pictures in this article are all original, and the copyright is owned by Lianshi Network. If you need to reprint, please follow the official account and reply "reprint", or leave a message at the bottom of the article. Note: Colleagues in the industry are welcome to give feedback for improvement, joint improvement, exchange and cooperation. For information feedback, please send an email to: [email protected].

Follow this account, private message the editor, and you can package and download the "Implementation Rules for Personal Information Protection Certification", "Implementation Rules for Data Security Management Certification", "Implementation Rules for Mobile Internet Application (App) Security Certification", and according to the standard GB/T 35273 " The graphic PDF versions and policies of the six documents of "Information Security Technology Personal Information Security Specification", TC260-PG-20222A "Security Certification Specification for Cross-Border Processing of Personal Information", and GB/T 41479 "Information Security Technology Network Data Processing Security Requirements" original.

Disclaimer: Beijing Lianshi Network Technology Co., Ltd. owns the legally protected copyright to the content of this interpretation. Without authorization, no one may transfer or sell all or part of this content for commercial purposes. Those who reprint, extract and use the text or opinions of this content should indicate the source. The materials and information contained in this content, including but not limited to texts, pictures, data, opinions, suggestions, etc., cannot replace legal opinions issued by lawyers. Violation of the above statement, the company will pursue its relevant legal responsibilities.

Guess you like

Origin blog.csdn.net/Chaincomp/article/details/128421429