Notice: Undefined index: OS in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/const.inc.php on line 64 Notice: Undefined variable: siters in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 2414 Notice: Undefined index: User in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/const.inc.php on line 108 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3607 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3612 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 70 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 74 Notice: Undefined index: User in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 158 Notice: Undefined index: SID in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 177 Notice: Undefined index: UID in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 179 Notice: Undefined variable: UserName in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 180 Notice: Undefined variable: Mobile in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 181 Notice: Undefined variable: Email in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 182 Notice: Undefined variable: Num in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 183 Notice: Undefined variable: keyword in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 184 Notice: Undefined index: ac in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 189 Notice: Undefined index: CHtml in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 191 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 201 Notice: Undefined index: t in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/info_view.php on line 40 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3607 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3612 Notice: Undefined variable: strimg in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3612 Notice: Undefined offset: 1 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 617 Notice: Undefined index: enseo in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3076 Notice: Undefined variable: TPath in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/info_view.php on line 125 Promote the lawful, rational, and effective utilization of data-瞭望新时代网

Think Tank

Promote the lawful, rational, and effective utilization of data

2024-10-22   

With the rapid development of technologies such as artificial intelligence and big data, China's data volume is experiencing explosive growth, and security risks are also increasing day by day. Data security is crucial, and building a strong defense line is urgent. The State Council recently issued the "Regulations on the Administration of Network Data Security" to further regulate network data processing activities, ensure data security, and promote the lawful, rational, and effective use of data. Data has become a production factor alongside land, labor, capital, technology, etc., gradually integrating into various aspects of production and life. The more deeply data resources are utilized, the greater the pressure to prevent risks. Currently, data flow presents new characteristics such as internal and external interaction, cross regional linkage, and cross group aggregation. However, various types of data lack effective classification, and the data transaction process lacks unified, standardized, and regulated rule guidance. There are significant differences in data access standards. All of these pose challenges to security risk prevention, market order stability, and social governance. The issue of data monopoly has also attracted widespread attention. In the digital age, a significant portion of data generation and acquisition is concentrated in high-tech enterprises and platform companies with strong technological research and development capabilities. How to protect data security and whether there are potential risks in the collection, transmission, storage, use, deletion, and destruction processes are worth paying attention to. In practical applications, there are still problems such as data abuse and enforcement difficulties. For example, apps that excessively collect personal information, set unreasonable conditions and obstacles that make it difficult to log out. For example, with the growth of data scale and frequent flow, incidents such as online fraud, unfair competition of data, and leakage of important data have repeatedly occurred. Data security issues are related to privacy protection for individuals, trade secrets for enterprises, and security and stability for the country. Therefore, strengthening the governance of data elements and building a strong defense line for data security are not only related to the development, utilization, and security of data itself as an important production factor, but also closely related to national sovereignty, national security, social order, and public interests. Given the importance of data security, the governance of critical data should be incorporated into the national governance system. On the one hand, establish a standardized and systematic data governance and operation platform to ensure data standardization, quality, and security throughout the entire process; On the other hand, further promote the construction of the standard and normative system, such as improving data standards, technical standards, application norms, etc. Various regions should also take the acceleration of digital government transformation as an opportunity, rely on regional collaborative governance, improve the data governance service system, focus on standardized optimization, organizational optimization, platform optimization, and process optimization, and ensure data security throughout the entire process. In addition, data related enterprises should be further compacted, especially the responsibility of the head Internet platform, earnestly urge enterprises to improve their data management capabilities, standardize data collection, storage, use and other links, and ensure data security. We need to gradually improve the data classification and protection system. At the institutional level, it is necessary to further clarify the scope and identification standards of important and core data, identification methods, specific protection requirements, and the division of responsibilities and cooperation mechanisms of relevant departments in data protection at all levels. Each region and department should develop more detailed and executable identification rules, further clarify the scope delineation, regulatory objectives, protection ideas, and measures required for data at all levels. Building a strong data security defense line does not mean controlling the data completely. The Opinions of the Central Committee of the Communist Party of China and the State Council on Building a Data Infrastructure System to Better Play the Role of Data Elements propose the establishment of a secure, controllable, flexible and inclusive data element governance system. This means that data element governance should adapt to the development of the digital economy, grasp the laws of data generation and flow under new technologies and applications, develop and utilize data resources more reasonably and legally, fully unleash the potential of data elements, and better serve high-quality economic development. (New Society)

Edit:Luo yu Responsible editor:Wang er dong

Source:ECONOMIC DAILY

Special statement: if the pictures and texts reproduced or quoted on this site infringe your legitimate rights and interests, please contact this site, and this site will correct and delete them in time. For copyright issues and website cooperation, please contact through outlook new era email:lwxsd@liaowanghn.com

Recommended Reading Change it

Links