Netcom Office: "Restricting the entry of foreign technology and products" is a misreading

Building a personal information security firewall

Since 2016, there have been more than 1,800 cases involving infringements of citizens' personal information involving the Internet, involving more than 4,200 suspects. Zhong Zhong, deputy director of the 11th Bureau of the Ministry of Public Security, introduced at the press conference of the National Network Office: "In recent years, the national security situation has been positive overall, the number of criminal cases is declining, but the number of cybercrime cases is rising. Among them, cyber fraud, theft and hacking, gambling and gambling and other criminal offences and crimes involving the personal rights of the general public have grown rapidly."

Netcom Office: "Restricting the entry of foreign technology and products" is a misreading

With the development of the Internet, illegal crimes such as infringement of personal privacy and infringement of intellectual property rights occur frequently around the world. Network monitoring, cyber attacks, network penetration, and cyber terrorism pose serious harm to national security and have become a major strategic issue affecting the country's economic and social development and the interests of the people.

In July 2016, the Central Office and the State Council issued the Outline of the National Informatization Development Strategy; on November 7, the 24th National People's Congress Standing Committee voted to pass the Cyber ​​Security Law; December 27 The National Internet Information Office released the National Cyberspace Security Strategy.

"Strategy" is a programmatic document guiding the national cybersecurity work in the next 10 years. It is of great significance to promote the construction of a network powerhouse and maintain national cybersecurity." Wang Xiujun, deputy director of the National Internet Information Office, introduced the "strategy" to rule the Internet, Run the Internet according to law, go online according to law, let the Internet operate healthfully on the legal track, protect the cyberspace information in an orderly flow, and protect personal privacy and intellectual property rights.

Enterprises must implement the responsibility of personal information protection

Recently, the leakage of personal information has been frequent, and some government databases and databases of large enterprises have been leaked. How can the information age guarantee personal information security?

"The network security strategy and the network security law all put forward clear requirements for the protection of personal information. The network security strategy emphasizes the need to protect the legitimate rights and interests of citizens in cyberspace, emphasizes the protection of personal privacy, and emphasizes the fight against illegal and criminal acts against personal information; In the cybersecurity law, there are more specific regulations on personal information protection.” Zhao Zeliang, director of the Network Security Coordination Bureau of the National Internet Information Office, introduced that the legal requirements for personal information protection need to be implemented in many aspects. Implement legal and legal requirements for the protection of personal information to enterprises and institutions.

"Everyone often downloads some free apps online. There will be options, terms of service, privacy agreement when you install. Do you agree? Actually, you can't install them without agreeing, but are these terms of service and privacy agreements in compliance with legal requirements? Are the responsibilities and obligations related to the protection of personal information carried out? Many terms of service and privacy agreements exist for authorizing companies to collect personal information in excess, or to authorize companies to share personal information with third parties when it is not necessary. Zhao Zeliang gave an example and said that these situations should be corrected as soon as possible in accordance with legal requirements. The company cannot relax the protection of personal information because the individual chooses to agree.

Some companies believe that the software provided is free and there is no need to assume responsibility for this. This is not true. Regardless of whether the software is free or paid, the legal responsibility for personal information protection must be implemented.

The free flow of information and the cross-border transmission of data should be based on rules.

The Cyber ​​Security Law proposes that personal information and important data collected and generated by operators of key information infrastructures within the territory of the People's Republic of China should be stored in China. Does this requirement affect the free flow of data and international trade?

Information directly affects personal privacy, personal security of the property on the Internet, and also affects national economic security and even national security. Therefore, strengthening personal information protection and strengthening the protection of important data has become the consensus of all countries and a common practice among countries. Therefore, personal information and important data should not flow out of the country unless it is necessary.

In view of whether this will affect the free flow of information, Zhao Zeliang responded that the free flow of information and the cross-border transmission of data should be based on the agreement. The Internet was born out of the TCP/IP protocol. The development of the Internet was also developed because of the development of the rule protocol. Without the agreement and rules, there is no Internet. If you leave the rules and leave the legal requirements, there is no practical significance in discussing the flow of data and information.

The reporter learned that the National Internet Information Office is currently formulating relevant data exit methods in accordance with the requirements of the law, and will make specific requirements for data exit assessment work.

Strengthening the protection of critical information infrastructure is the highlight

Key information infrastructure has become a key issue in energy, finance, transportation, and communications, and has become the lifeblood of the country. Strengthening the protection of critical information infrastructure is a major part of cybersecurity efforts.

Zhao Zeliang said that the concept should be adjusted from division and rule to overall protection. In the past, network security work was more about distinguishing boundaries and distinguishing the responsibility of system protection. Who is in charge, who is running, and who is responsible. Nowadays, the network is widely interconnected, deeply integrated, and highly shared, which puts new demands on network security work. We emphasize the protection of key information infrastructure, which is to strengthen top-level design, strategic planning, and comprehensive policy, and emphasize the protection of overall security.

The protection of key information infrastructure is not a negation of existing network security systems and regulations, such as the hierarchical protection system. It is an important system for network security work. However, whether it is a hierarchical protection system or other systems, it should be constantly adjusted and improved according to the development of the situation and the development of tasks, so as to play a role under the new conditions.

"Restricting the entry of foreign technology and products" is a misunderstanding

The National Cyberspace Security Strategy puts forward the requirement to promote the use of security and controllable products. The Cyber ​​Security Law also has the same regulations. Its purpose is to safeguard the security and interests of the broad masses of people in cyberspace and to maintain national cybersecurity, rather than Trade protection is not limited to the entry of foreign technology and products.

Is it necessary to restrict the entry of foreign technology and products by promoting safe and credible products? Zhao Zeliang said that this is not the case. Safe and controllable and autonomously controllable, it is advocating that product service providers cannot take advantage of the provision of product services to illegally obtain user information, or damage users' right to control information; advocate product service providers cannot use users to service products. Highly dependent on the interests of users and unfair competition. For example, stop the necessary security services, force users to update and upgrade, and so on.

Enterprises should put the protection of user interests and the confidence of users in product service to an important position, not only to provide products with low prices, but also to provide safe and secure products, so that the market space will be even larger.

Wall Bolier Manometer

Wall Bolier Manometer,Boiler Manometer Pressure,Pressure Gauge Pressure,Capillary Pressure Gauge Pressure

ZHOUSHAN JIAERLING METER CO.,LTD , https://www.zsjrlmeter.com

This entry was posted in on