A number of members of the “two sessions†proposed legislation to protect personal information security, and to “3.15†China Telecom was smashed by spam messages, and then went to “2012 China Personal Information Protection Conference†in the “Information Security Technology Public and Business Services Information System Personal Information Protection Guide The formulation of the book was completed. In a short period of time of more than ten days, personal information security protection has undergone substantive changes, and it has truly entered an era of all-round protection (including laws and regulations, industry regulations, and technology defenses) to protect the security of personal information.
Laws and Regulations: Personal Information Legislation Has Become a Consensus On March 15, Yang Xueshan, Deputy Minister of Industry and Information Technology, pointed out at the “2012 China Personal Information Protection Conference†that everyone involved in the protection of personal information is also related to industrial development and social stability. Network order. With the development of the Internet, the concentration of personal information is getting higher and higher, and the protection of personal information has become an important part of legal construction. To accelerate the protection of personal information, we must start from three aspects. First, accelerate the promotion of personal information protection related legislation. Second, organizations, units, and companies that collect personal information must effectively protect personal information during the course of business development. The public should pay attention to personal information not being stolen or misused, and all sectors of society and the media must strengthen supervision.
Coincidentally, in the just-concluded 2012 National Two Conferences, Yan Bingzhu, member of the National Committee of the Chinese People's Political Consultative Conference and Chairman of the Bank of Beijing, believes that the public sector and enterprises usually need and are happy to collect personal information, but they have not taken effective measures to ensure the security of information and put personal information at risk. Among them, the lack of relevant laws further amplifies this danger. He also suggested that the "Personal Information Protection Act" be introduced as soon as possible. In addition, Liu Feng, Tsinghua Tongfang’s chief computer engineer, believes that only by strengthening personal information legislation can we fundamentally solve the problem of personal information protection.
Under the appeal of many experts, representatives of the two associations, members, and the media and other sectors of society, the adoption of legislation to protect the security of citizens' personal information sovereignty has formed a wide consensus within the entire society and has become an inevitable trend in the development of China's economic information.
Industry Standards: Multi-faceted Regulation of Personal Information Protection After the “Leaky Door†incident broke out at the end of last year, the “Clear Text Protection Code†was referred to by the convicts. However, it is not the fault of "protecting passwords in plaintext." Liu Feng, Tsinghua Tongfang’s computer chief engineer, believes that the most important issue of “password gate†incidents is how to resolve the unauthorized data through the legal system, instead of using ciphertext for data storage. The main responsibility lies with the website operator.
Indeed, the protection of personal information requires clear specifications, which cannot be achieved in a single aspect. However, on the theme of “Protecting Personal Information and Enhancing Industry Self-discipline†on March 15th, there was a welcome change in the China Personal Information Protection Conference. At the conference, the organizer China Software Testing Center introduced China's first "Personal Information Protection" special national standard "Information Security Technology Public and Business Services Information System Personal Information Protection Guide" (hereinafter referred to as the "Guide") to formulate and main The content also released the "2012 website personal information protection policy evaluation report" and "2012 Android mobile phone software personal information security report."
According to reports, the "Guide" has been formulated and is being submitted for approval. Ouyang Wu, deputy director of the Department of Information Security Coordination at the Ministry of Industry and Information Technology, said at the meeting that the standard defines the concept of personal information protection and specifies the information subject in the collection, processing, transfer, and deletion of personal information processing. The roles and responsibilities of managers, managers, and independent assessment agencies provide the industry with guidelines for the conduct of personal information protection.
Technical escort: multi-dimensional technological defense In addition to personal information legislation and multi-faceted regulation of personal information protection, technical defense is equally important. From the point of view of technological defense, the majority of Internet users are obviously vulnerable groups in protecting personal information. Who should take more responsibility for the protection of personal information? Tsinghua Tongfang Computer Chief Engineer Liu Feng believes that in the process of protecting the security of Internet personal information, websites, governments, and information security companies must work together to build a personal information protection defense.
The first is the website. Protecting the privacy of netizens is not only the responsibility of the website, but also the protection of the privacy of netizens as a top priority. Otherwise, everything is insignificant. The second is the government. The government must legislate and determine relevant regulations and standards to clarify related responsibilities and restrict corporate behaviors. This can help companies pay more attention to protecting the privacy of Internet users. Finally, information security companies need to make continuous progress through effective offensive and defensive drills, and continue to improve product and technology research and development so as to reduce the risk of personal information leakage for enterprises and individual users. Tsinghua Tongfang Computer Chief Engineer Liu Feng said that Tsinghua Tongfang already has many mature products and solutions based on national secret algorithm, Tongfang autonomous security chip and TST security technology, covering network security equipment, security computers, security peripherals, and industry solutions. . These product solutions are widely used in government, confidential organizations, public services, and financial industries, as well as general and individual consumers who have a variety of data security needs. Tsinghua Tongfang is currently the only supplier in China capable of providing comprehensive information security solutions for software, hardware, networks, and applications.
Concluding remarks: Things always accompany each other. When various information security incidents occur frequently, the corresponding legislation and industry norms are also gradually improved. This is the so-called force-reversing mechanism. Of course, after the establishment of personal information security laws and regulations and corresponding industry regulations, information security incidents will undoubtedly be fundamentally contained. In the future, with the continuous development of information security products and technologies, it is believed that personal information security will be greatly protected.
Laws and Regulations: Personal Information Legislation Has Become a Consensus On March 15, Yang Xueshan, Deputy Minister of Industry and Information Technology, pointed out at the “2012 China Personal Information Protection Conference†that everyone involved in the protection of personal information is also related to industrial development and social stability. Network order. With the development of the Internet, the concentration of personal information is getting higher and higher, and the protection of personal information has become an important part of legal construction. To accelerate the protection of personal information, we must start from three aspects. First, accelerate the promotion of personal information protection related legislation. Second, organizations, units, and companies that collect personal information must effectively protect personal information during the course of business development. The public should pay attention to personal information not being stolen or misused, and all sectors of society and the media must strengthen supervision.
Coincidentally, in the just-concluded 2012 National Two Conferences, Yan Bingzhu, member of the National Committee of the Chinese People's Political Consultative Conference and Chairman of the Bank of Beijing, believes that the public sector and enterprises usually need and are happy to collect personal information, but they have not taken effective measures to ensure the security of information and put personal information at risk. Among them, the lack of relevant laws further amplifies this danger. He also suggested that the "Personal Information Protection Act" be introduced as soon as possible. In addition, Liu Feng, Tsinghua Tongfang’s chief computer engineer, believes that only by strengthening personal information legislation can we fundamentally solve the problem of personal information protection.
Under the appeal of many experts, representatives of the two associations, members, and the media and other sectors of society, the adoption of legislation to protect the security of citizens' personal information sovereignty has formed a wide consensus within the entire society and has become an inevitable trend in the development of China's economic information.
Industry Standards: Multi-faceted Regulation of Personal Information Protection After the “Leaky Door†incident broke out at the end of last year, the “Clear Text Protection Code†was referred to by the convicts. However, it is not the fault of "protecting passwords in plaintext." Liu Feng, Tsinghua Tongfang’s computer chief engineer, believes that the most important issue of “password gate†incidents is how to resolve the unauthorized data through the legal system, instead of using ciphertext for data storage. The main responsibility lies with the website operator.
Indeed, the protection of personal information requires clear specifications, which cannot be achieved in a single aspect. However, on the theme of “Protecting Personal Information and Enhancing Industry Self-discipline†on March 15th, there was a welcome change in the China Personal Information Protection Conference. At the conference, the organizer China Software Testing Center introduced China's first "Personal Information Protection" special national standard "Information Security Technology Public and Business Services Information System Personal Information Protection Guide" (hereinafter referred to as the "Guide") to formulate and main The content also released the "2012 website personal information protection policy evaluation report" and "2012 Android mobile phone software personal information security report."
According to reports, the "Guide" has been formulated and is being submitted for approval. Ouyang Wu, deputy director of the Department of Information Security Coordination at the Ministry of Industry and Information Technology, said at the meeting that the standard defines the concept of personal information protection and specifies the information subject in the collection, processing, transfer, and deletion of personal information processing. The roles and responsibilities of managers, managers, and independent assessment agencies provide the industry with guidelines for the conduct of personal information protection.
Technical escort: multi-dimensional technological defense In addition to personal information legislation and multi-faceted regulation of personal information protection, technical defense is equally important. From the point of view of technological defense, the majority of Internet users are obviously vulnerable groups in protecting personal information. Who should take more responsibility for the protection of personal information? Tsinghua Tongfang Computer Chief Engineer Liu Feng believes that in the process of protecting the security of Internet personal information, websites, governments, and information security companies must work together to build a personal information protection defense.
The first is the website. Protecting the privacy of netizens is not only the responsibility of the website, but also the protection of the privacy of netizens as a top priority. Otherwise, everything is insignificant. The second is the government. The government must legislate and determine relevant regulations and standards to clarify related responsibilities and restrict corporate behaviors. This can help companies pay more attention to protecting the privacy of Internet users. Finally, information security companies need to make continuous progress through effective offensive and defensive drills, and continue to improve product and technology research and development so as to reduce the risk of personal information leakage for enterprises and individual users. Tsinghua Tongfang Computer Chief Engineer Liu Feng said that Tsinghua Tongfang already has many mature products and solutions based on national secret algorithm, Tongfang autonomous security chip and TST security technology, covering network security equipment, security computers, security peripherals, and industry solutions. . These product solutions are widely used in government, confidential organizations, public services, and financial industries, as well as general and individual consumers who have a variety of data security needs. Tsinghua Tongfang is currently the only supplier in China capable of providing comprehensive information security solutions for software, hardware, networks, and applications.
Concluding remarks: Things always accompany each other. When various information security incidents occur frequently, the corresponding legislation and industry norms are also gradually improved. This is the so-called force-reversing mechanism. Of course, after the establishment of personal information security laws and regulations and corresponding industry regulations, information security incidents will undoubtedly be fundamentally contained. In the future, with the continuous development of information security products and technologies, it is believed that personal information security will be greatly protected.
Loader Parts,Track Loader Parts,Case Loader Parts,Skid Loader Parts
JINING SHANTE SONGZHENG CONSTRUCTION MACHINERY CO.LTD , https://www.sdkomatsugenuineparts.com