当前位置:网站首页>When the data security law comes, how can enterprises prepare for a rainy day? Tencent security has something to say
When the data security law comes, how can enterprises prepare for a rainy day? Tencent security has something to say
2022-06-24 10:49:00 【Tencent security】
2021 year 6 month 10 Japan ,《 Data security law of the people's Republic of China 》 By a formal vote , And will 2021 year 9 month 1 The effective date .
《 Data security law 》 From draft to formal promulgation , After three deliberations , It took nearly three years , It is the basic law in the field of data in China , It is of great significance to data security and the development of digital economy .
The safety directors of many enterprises are paying attention to ,《 Data security law 》 What impact will it bring to the enterprise , What measures need to be taken by enterprises to meet 《 Data security law 》 The arrival of ? We might as well take a look at several core clauses closely related to enterprise security measures .
- Article 21 states , Establish a data classification and classification protection system , Identify important data directories , Strengthen the protection of important data , And clearly defined the division of responsibilities .
- Article 27 requirements , Carry out data processing activities and take corresponding technical measures and other necessary measures , Data security .
- Article 29 requirements , Risk monitoring should be strengthened to carry out data processing activities .
- Article 30 requirements , Regularly carry out risk assessment on data processing activities .
- Article 45 specify the corresponding punishment measures for failing to perform the data security protection obligation , In serious cases, the business license may be revoked .
In a word, summarize , Do data classification and grading , According to the results of classification and grading, appropriate technical measures shall be taken . Carry out risk monitoring and risk assessment throughout the data processing process . If the data security protection obligation is not fulfilled , Will be held legally responsible .
Define the terms and conditions , Let's take a look at how to land .
To do data security , First, make classification , Made a classification , According to the importance of the data , Take corresponding protective measures , No one size fits all , Not only to ensure safety , And ensure the normal use and reasonable flow of data to the greatest extent .
The state and relevant departments have established a classified and classified protection system , Clear classification and grading standards , Enterprises only need to follow these standards , Count your own data , Sort out the classification results , This can be taken as the basis , Carry out subsequent data security construction .
However , It is not easy to count your own data . Not to mention how to deal with massive data , Accurately identify sensitive data , If you count manually , Even where data may exist , There is a high probability of missing . How to choose the right technical tools , Ensure that no important data is omitted , Is extremely important .
Ride on 《 Data security law 》 The east wind of , Tencent Security launched a new version of the data security center , Solve the problem of data classification and classification for you .
The data security center adopts SaaS The advanced technology architecture of , Relying on the powerful cloud computing capability of Tencent cloud , Provide enterprises with all-round data security services .
With the permission of the user , The data security center takes advantage of cloud nativity , Help users automatically pull the list of data assets on Tencent cloud , It eliminates the tedious process of adding assets one by one , And avoid omitting .
The data security center has built-in rich identification rules , The user performs the identification task , Identify sensitive data in assets , And carry out classification and grading . User access “ Data assets map ”, From an asset perspective , View data classification and rating results . You can also use “ Sensitive data retrieval ”, From the perspective of sensitive data , From all assets , Retrieve the specified sensitive data .
The data security center serves as the data security portal of Tencent cloud , Integrate the security products on Tencent cloud , Recommend a complete set of data centric data security capability system for you .
Corresponding to the requirements of Article 29 on risk monitoring , Integrated data security audit products , Conduct operational audit on user's data assets 、 Risk monitoring and warning .
Corresponding to the requirements of Article 27 on technical measures , Integrated data desensitization products and fortress machine products , Provide security for users' data sharing and data operation and maintenance scenarios .
Tencent security has always been concerned about 《 Data security law 》 And relevant regulations , Continuously improve and enrich the data security capability system , Protect your data .
The data security center has served 4000+ Users on Tencent cloud , The new version of free public beta , Welcome to the code scanning experience , Discuss the data security plan with the product manager .https://cloud.tencent.com/product/dsgc
边栏推荐
- 机械臂速成小指南(二):机械臂的应用
- 喜欢就去行动
- Flink cluster construction and enterprise level yarn cluster construction
- 126. 单词接龙 II BFS
- 今日睡眠质量记录76分
- JMeter interface test tool foundation - sampler (II)
- Fais ce que tu veux.
- Learn how to use PHP to filter special symbols in strings
- 【资源分享】2022年第五届土木,建筑与环境工程国际会议(ICCAEE 2022)
- 26.删除有序数组的重复项
猜你喜欢

【IEEE出版】2022年自然语言处理与信息检索国际会议(ECNLPIR 2022)

Quick completion guide for mechanical arm (I): development overview of mechanical arm

Thread pool execution process

机械臂速成小指南(一):机械臂发展概况

Leetcode-2221: triangular sum of arrays
![[resource sharing] 2022 International Conference on Environmental Engineering and Biotechnology (coeeb 2022)](/img/d8/a367c26b51d9dbaf53bf4fe2a13917.png)
[resource sharing] 2022 International Conference on Environmental Engineering and Biotechnology (coeeb 2022)

Canvas pipe animation JS special effect

Leetcode-1823: find the winner of the game

JMeter interface test tool foundation - use badboy to record JMeter script

Act as you like
随机推荐
[latest in the whole network] how to start the opentsdb source code in the local ide run
What characteristics should a good design website have?
Learn to use PHP to implement unlimited comments and unlimited to secondary comments solutions
Four methods of object merging and four methods of object merging in JS
Stack Title: exclusive time of function
Niuke-top101-bm29
【资源分享】2022年第五届土木,建筑与环境工程国际会议(ICCAEE 2022)
Learn how to use PHP to filter special symbols in strings
喜欢就去行动
283.移动零
js数组求和的5种方法
23. opencv - image mosaic project
Cookie 、Session、localstorage、Sessionstorage的区别
Flink集群搭建以及企业级yarn集群搭建
2022 International Symposium on intelligent robots and systems (isoirs 2022)
MYSQL_精讲数据库数据类型
Cool interactive animation JS special effects implemented by p5.js
Several stacks of technology sharing: product managers' Online Official answers to several stacks of knowledge
2022 the most complete and detailed JMeter interface test tutorial and detailed interface test process in the whole network - JMeter test plan component (thread < user >)
【资源分享】2022年环境工程与生物技术国际会议(CoEEB 2022)