(2020 Service Trade Fair) Observation of Service Trade Fair: At the time of the digital economy, how can new data achieve new security?

  China News Service, Beijing, September 8th Title: Observation by the Service Trade Commission: The digital economy is at the right time, how can new data achieve new security?

  China News Agency reporter Du Yan

  China's digital economy is booming, and the central and local governments have successively released new rounds of support policies.

Then, how to safely obtain, process, and use data, which is regarded as a key production factor of the digital economy, has become a new challenge.

  The digital economy has now become an important support for economic growth.

According to data from the Ministry of Industry and Information Technology of China, the value-added of China's digital economy reached 35.8 trillion yuan in 2019, accounting for 36.2% of GDP.

  At the "Network and Data Security" Forum of the China International Trade in Services Fair in 2020, He Dequan, an academician of the Chinese Academy of Engineering and an information technology expert, pointed out that the development of digital trade is inseparable from the network, an important part of the digital economy. Effective security protection, especially since the outbreak of the new crown pneumonia, has seen a significant increase in online office, online entertainment, and online transactions, which has further increased cybersecurity risks.

International service trade activities involve cross-regional and cross-border data flows, and face more complex network security compliance and technical challenges.

  "Network security is a long-term task." He said that the current wave of digital transformation is sweeping the world, and data security protection has become an important content.

The draft of China's data security law has entered the deliberation stage after public consultation, and hopes to promote China's cybersecurity cause to a new level.

  Cai Jiren, an academician of the Chinese Academy of Engineering, who has been engaged in information security research for a long time, said that the country should promote data security through data development and utilization and industrial development, and realize the joint advancement of data security and development through data security, data development and utilization and industrial development.

  Realizing data security requires not only law but also technology.

He said that cryptography is the core technology of network data security, and it plays an important role in network data identification, data encryption, and information transmission. The deep integration of cryptographic services and industry applications is an inevitable trend in the development of cryptographic applications.

  Chen Guoyu, senior co-partner of Beijing Deheheng (Shanghai) Law Firm and an expert member of the International Association for the Protection of Privacy, pointed out that information security and data protection are not purely legal issues, they are competing issues of technical law and legal compliance, so it is necessary The legal team and the compliance team work closely with the external technical team and technical strategy team.

  At present, the global and China's legislation on data security and privacy protection is becoming stricter, and Chinese companies are facing challenges in "going abroad".

Chen Guoyu believes that "going to sea" needs to pay attention to security and compliance issues and comply with the trend of international privacy protection.

  "In the field of privacy protection, developed countries have formed a relatively complete system in terms of legislation, industry self-discipline, and corporate self-regulation, which is very worthy of our study." Han Yonggang, vice president of Qi Anxin Group, believes that in the digital age, cyber security risks are equivalent to business Operational risk.

Through the endogenous security concept, the network security capability and the information environment should be integrated endogenously, and the network security system construction and the information construction should be planned, constructed and operated simultaneously, so as to obtain ubiquitous "in the digital environment" Immunity".

  Behind the development and application of data aggregation, the risks of privacy leakage and data leakage are prominent.

Shi Yong, director of the Virtual Economy and Data Science Research Center of the Chinese Academy of Sciences, said that without data, any technology is "nothing to cook". Therefore, companies need to grasp the four stages of data legislation, analysis, sharing, and protection.

He emphasized that any government or enterprise cannot use data at will and must obtain permission.

  Wang Yiwei, a professor at the School of International Relations at Renmin University of China, pointed out that in the past it was said that “build roads before getting rich”, but now the “roads” mentioned can be the construction of digital infrastructure, and the safety of “roads” must be ensured to empower China with safety. The digitalization process in the field of service trade has enabled "Chinese Services" to benefit the world and create a mutually beneficial and win-win cooperation situation with the world.

(Finish)