China News Service, Chongqing, October 11 (Reporter Zhang Yan) With the development of the digital economy, data, as a new production factor, is profoundly affecting the country's economic and social development.

How to do data security?

At the 2021 Chongqing Data Security Summit Forum held on the 11th, domestic political, industry, academic and research experts and scholars gathered in Bishan to conduct in-depth discussions through keynote reports and special lectures, aiming to promote the formation of a benign ecology of the integrated development of the cyber security education technology industry. Escort the development of the digital economy and provide a strong network security guarantee for the construction of "intelligent manufacturing towns" and "smart cities".

  Li Aidong, deputy director and first-level inspector of the Network Data Administration of the Central Cyberspace Administration of China, said that the international competition around digital sovereignty and digital rules has intensified, and the political, economic, cultural, and social risks caused by big data have become increasingly apparent and abused. The phenomenon of personal information is still more prominent. The use of digital resources to influence network dissemination, implementation of unfair competition, and infringement of user rights and other violations of laws and regulations have occurred from time to time, which has had a serious impact on national security, public interests, and the legitimate rights and interests of the people.

  How to do a good job in data security?

Li Aidong believes that, first, we must adhere to the rule of law, speed up the introduction of supporting laws and regulations, and create a good legal environment for data management.

The "Cyber ​​Security Law" promulgated and implemented in 2017, the "Data Security Law" implemented in September this year, and the "Personal Information Protection Law" that will be implemented on November 1 provide a basic institutional framework and basic legal principles for data management in my country .

At present, the focus is on accelerating the construction of supporting legal systems to ensure that the laws are effective.

  Second, we must adhere to the people-centered approach, strengthen the protection of personal information, and effectively protect the legitimate rights and interests of the broad masses of people.

Speed ​​up the top-level design and overall planning of personal information protection.

Promote the establishment of a comprehensive governance system for personal information protection that combines autonomy, rule of law, and rule of virtue, government-led, social collaboration, public participation, and rule of law guarantees.

At the same time, focus on outstanding issues and deepen the management of illegal and illegal use of APP and the collection of personal information.

Severely crack down on violations of laws and regulations, such as out-of-scope ownership and compulsory authorization of APP, to achieve both symptoms and root causes, and long-term progress.

It is necessary to accelerate the establishment of a national standard system for personal information protection.

Accelerate the formulation and release of national standards for personal information protection for mobile applications such as online shopping, instant messaging, express logistics, online audio and video, and provide standard guidelines for personal information protection.

  Third, we must insist on highlighting key points, strengthen the supervision of Internet platform companies, and effectively prevent data security risks.

Guide and supervise the establishment of data security management systems for large-scale network platforms, and improve data security protection measures; strengthen enforcement of new business forms such as platform economy and sharing economy, anti-monopoly and unfair competition, prevent unlimited capital expansion, and manipulate data resources; standardize large-scale network platform algorithms application.

Strengthen the algorithm recommendation, automatic sorting, security evaluation, technical inspection, and risk monitoring of large-scale network platforms, and severely crack down on the use of algorithms to produce and distribute illegal and harmful information, infringing on the rights and interests of the people and other illegal activities.

Guide enterprises to abide by social morals and fulfill their social responsibilities.

  Tan Jianrong, an academician of the Chinese Academy of Engineering, believes that the characteristics of data security mainly include data confidentiality, data integrity, and data availability.

Data mining based on privacy protection is to study how to complete data mining tasks under the premise of protecting data privacy.

First, we must prevent data from being distorted, secondly, we must encrypt the data, and thirdly, we must restrict the release, release the data according to specific conditions, and make a more abstract description.

Through the two aspects of data mining and data security, together make data safe and give full play to its role, give full play to the value of data, and further promote the development and application of new technologies in the field of data security.

  Qi Anxin Group President Wu Yunkun shared in his speech the ideas and methods for building a data security system: for digital business assurance, focusing on protecting data and applications, building an endogenous security system, and forming an actual combat security system through the implementation of operational security to achieve network security Safe dynamic control.

Endogenous security is through three aggregations, so that the security system, like the human immune system, realizes self-adaptation, autonomy and self-growth.

  Wu Yunkun believes that talking about data security today is actually a management concept. Taking data security as a means of production, data is the core production factor.

  Regarding the construction of a data security system, Wu Yunkun talked about seven points of concern: balance business development with compliance and regulatory requirements based on industry characteristics and its own business impact; data security depends not on a single point of technology, but on a capability system; establishing and improving a data management system Develop data use strategies; carry out data security governance, classify and hierarchically manage data, and label them, implement data security strategies, and combine technical means for landing use; combine zero trust and data entity protection to build a data security technical defense system ; Data is accompanied by business flow, data security needs to be internalized with business, combing the data context, deepening security capabilities and measures into applications and businesses, and comprehensively covering and in-depth integration with all levels of informatization; doing important data in key links To precise protection.

  It is reported that this forum is sponsored by the Office of the Cyber ​​Security and Informatization Committee of the Chongqing Municipal Committee of the Communist Party of China and the People’s Government of Bishan District. The Protection Law and other important laws and regulations in the field of network security, focusing on the "14th Five-Year Plan" and long-term goals for 2035, focusing on the network security situation, data security protection, personal information protection, and the development of the network security industry.

At the same time, in order to promote the new generation of information technology innovation and empower the development of the new generation of information technology industry, the "2021 China New Generation Information Technology Venture Capital Ecological Research Report" will be released to the society.

(over)