Qiyuan Law Talks | Data Compliance Series Articles - Pain and Difficulty Identification and Construction Guidelines for State owned Enterprise Data Security Compliance Management System (Part 1)
Time:2024-07-04
Return

Preface

On December 20, 2021, the Guangzhou State owned Assets Supervision and Administration Commission released the "Guangzhou State owned Assets Supervision and Administration Commission Supervision Enterprise Data Security Compliance Management Guidelines" (Trial 2021 Edition), which is a major step for local state-owned asset supervision agencies in terms of data security and personal information protection. Afterwards, the State owned Assets Supervision and Administration Commission of the State Council released the "Action Plan for Digital Transformation of State owned Enterprises" in the same month, which clarified the specific goals that state-owned enterprises should achieve in digital transformation by 2025, namely the continuous optimization of management systems, significant improvement in data empowerment effects, and major breakthroughs in digital transformation in key areas.

A key issue commonly faced by state-owned enterprises in the process of digital transformation is insufficient data security protection capabilities, mainly reflected in the chaos of data storage and management, non standardization of data sharing and use, and lack of effective auditing of data transmission. These issues reflect the dual deficiencies of state-owned enterprises in terms of systems and means. Therefore, state-owned enterprises urgently need to rely on establishing a comprehensive data security management framework, formulating practical data security policies, and creating effective management standards to ensure the secure and stable operation of information systems, networks, personal terminals, and other data.

图片1

A complete data security compliance management system involves organizational structure, institutional construction, compliance requirements (covering data security, personal information protection, and partner management), technical applications, and responsibility supervision. This guide first integrates data security compliance management into the existing state-owned enterprise compliance management system and focuses on its construction as a key area, which not only utilizes the advantages of the existing system but also avoids overlapping institutional settings.

And the management strategies of "list management" and "triple one major" issues can be adopted to control major data compliance issues. Classify key data security compliance matters into the "three fold and one major" management category, and implement inventory management to precisely control data transactions, outputs, and sharing of national secrets, industrial planning, strategic layout, major projects, and core technologies.

In the compliance system of state-owned enterprises, the role of the "three lines of defense" is played. Specifically, departments responsible for data management, information systems, or IT technology, as well as business departments, form the first line of defense. The compliance management department serves as the second line of defense, while the discipline inspection and audit departments form the third line of defense, and their respective responsibilities and duties are clearly defined.

图片2

In the process of promoting the digital transformation of state-owned enterprises, in addition to implementing digital measures, it is also necessary to strictly comply with data compliance regulations, especially in the prevention and response to legal risks. Therefore, in the process of digital transformation, state-owned enterprises must strictly comply with relevant laws and regulations to ensure the legitimacy and compliance of the transformation.

1、 The pain and difficulty points of data security compliance management in state-owned enterprises

图片3

(1) Difficulties in managing core data

The data in state-owned enterprises is widely distributed in computers, mobile phones, laptops, business systems, and databases, including structured, semi-structured, and unstructured data. These data are difficult to identify and classify, making the determination and protection of core data complex; The lack of standardized definitions results in ineffective data classification and grading; Lack of comprehensive understanding of the distribution of core data in state-owned enterprises and risk assessment throughout their lifecycle collectively lead to unclear data security status.

(2) The contradiction between data security and business efficiency

Finding a balance between data security and work efficiency is difficult, with the goal of maximizing the value of security protection; Lack of effective classification and grading strategies for the mixed storage of office data and critical information; The mismatch between protection measures and data importance leads to low protection efficiency; The document permission management method that relies on user initiative can easily lead to the failure of security measures.

(3) Difficulties in controlling internal data leaks

Due to the lack of a complete data compliance management system, it is still difficult to achieve tight integration of overall data security protection. For example, frequent file exchange between units poses a risk of unlimited copying and abuse of files after they are distributed; The uncontrolled transmission of data (such as burning CDs, internal emails, etc.) increases the risk of data loss of control; In daily work, sensitive data is transmitted in various ways, making it difficult to effectively manage and prevent the spread of confidential files.

(4) The complexity of tracking leak incidents

The lack of effective monitoring and auditing of classified data during the circulation process makes responsibility tracing complex; Data can be easily carried out through mobile storage devices, and the use of dedicated storage media is difficult to restrict and trace; The lack of a comprehensive behavioral safety audit system has resulted in significant management difficulties and security risks due to the inability to provide timely alarm responses and locate the source of security incidents.

Prev:Qiyuan Law Talks | In Depth Interpretation: Standard Process for State owned Enterprises to Achieve Data Security Compliance (Part 2)
Prev:Qiyuan Law Talks | In Depth Interpretation: Standard Process for State owned Enterprises to Achieve Data Security Compliance (Part 1)
Prev:Qiyuan Party Building | Leading Party Building and Respecting the Elderly - Our Second Party Branch and Youth League Branch Carry out Public Welfare and Legal Education Activities
Prev:Qiyuan Performance | From 0 to 1, the data security management system is here—— Our data compliance team has established a data compliance and security management system for a state-owned enterprise
Prev:Qiyuan News | Our lawyers hold a special lecture on the revision of the new Company Law for large state-owned enterprises
Prev:Qiyuan Law Talks | Data Compliance Series Articles - Pain and Difficulty Identification and Construction Guidelines for State owned Enterprise Data Security Compliance Management System (Part 2)
Prev:Qiyuan Party Building | Party Building Leads the Law and Heart to the Party - The First and Third Party Branches of Our Institute Carry out Theme Party Day Activities
Prev:
Good news from Qiyuan | Lawyers Li Guohong, Lin Zhuoxin, and Fu Yangchun from our firm have been selected as the leading talents of foreign-related lawyers in Guangzhou City
Prev:Good news from Qiyuan | Lawyers Li Guohong, Lin Zhuoxin, and Fu Yangchun from our firm have been selected as the leading talents of foreign-related lawyers in Guangzhou City
Prev:Qiyuan Party Building | Consolidate Heart and Cast Soul, Rule Heart towards the Party - Qiyuan Party Branch Holds the 2023 Work Summary Conference
Prev:Forty Years of Forge and Progress, Continuing the Past and Opening Up the Future to Write a New Chapter - The Management Team of Guangdong Qiyuan Law Firm Successfully Changes
Prev:Qiyuan Party Building | Qiyuan Institute Party Branch and Guangzhou Urban Renewal Group Carry out the "Red Alliance Co construction Empowering Development" Theme Party Day Activity
Prev:Qiyuan Dynamics | Qiyuan Institute and Zhongtong Service Construction Company Carry out "Youth League Building Wing Alliance" Exchange Activity
Prev:Qiyuan News | President Li Haojiang and his delegation from Suzhou Lawyers Association visited our firm for discussion and exchange
Prev:Qiyuan Party Building | The Second Party Branch of Qiyuan Station and the Public Transport Station Management Company Carry out Party Building Co construction and "Constitution Propaganda Week" Activities
Prev:Qiyuan News | Investigation conducted by the Judicial Bureau of Huanggang City, Hubei Province at our institute
Prev:Reading Ten Thousand Books and Traveling Ten Thousand Miles - Qiyuan Institute's 2023 Team Building: Malaysia Chapter
Prev:Good news from Qiyuan | Qiyuan Party Branch has been awarded the "Top 10 Party Building Brand Projects" in the Guangzhou Lawyer Industry
Prev:Good news from Qiyuan | Our senior partner Fan Linjun has been awarded the honor of "Gold Medal Mediator" in labor disputes
Next:Qiyuan Law Talks | In Depth Interpretation: Standard Process for State owned Enterprises to Achieve Data Security Compliance (Part 2)
Next:Qiyuan Law Talks | In Depth Interpretation: Standard Process for State owned Enterprises to Achieve Data Security Compliance (Part 1)
Next:Qiyuan Party Building | Leading Party Building and Respecting the Elderly - Our Second Party Branch and Youth League Branch Carry out Public Welfare and Legal Education Activities
Next:Qiyuan Performance | From 0 to 1, the data security management system is here—— Our data compliance team has established a data compliance and security management system for a state-owned enterprise
Next:Qiyuan News | Our lawyers hold a special lecture on the revision of the new Company Law for large state-owned enterprises
Next:Qiyuan Law Talks | Data Compliance Series Articles - Pain and Difficulty Identification and Construction Guidelines for State owned Enterprise Data Security Compliance Management System (Part 2)
Next:Qiyuan Party Building | Party Building Leads the Law and Heart to the Party - The First and Third Party Branches of Our Institute Carry out Theme Party Day Activities
Next:Qiyuan Law Talks | Data Compliance Series Articles - Pain and Difficulty Identification and Construction Guidelines for State owned Enterprise Data Security Compliance Management System (Part 1)
Next:Good news from Qiyuan | Lawyers Li Guohong, Lin Zhuoxin, and Fu Yangchun from our firm have been selected as the leading talents of foreign-related lawyers in Guangzhou City
Next:Qiyuan Party Building | Consolidate Heart and Cast Soul, Rule Heart towards the Party - Qiyuan Party Branch Holds the 2023 Work Summary Conference
Next:Forty Years of Forge and Progress, Continuing the Past and Opening Up the Future to Write a New Chapter - The Management Team of Guangdong Qiyuan Law Firm Successfully Changes
Next:Qiyuan Party Building | Qiyuan Institute Party Branch and Guangzhou Urban Renewal Group Carry out the "Red Alliance Co construction Empowering Development" Theme Party Day Activity
Next:Qiyuan Dynamics | Qiyuan Institute and Zhongtong Service Construction Company Carry out "Youth League Building Wing Alliance" Exchange Activity
Next:Qiyuan News | President Li Haojiang and his delegation from Suzhou Lawyers Association visited our firm for discussion and exchange
Next:Qiyuan Party Building | The Second Party Branch of Qiyuan Station and the Public Transport Station Management Company Carry out Party Building Co construction and "Constitution Propaganda Week" Activities
Next:Qiyuan News | Investigation conducted by the Judicial Bureau of Huanggang City, Hubei Province at our institute
Next:Reading Ten Thousand Books and Traveling Ten Thousand Miles - Qiyuan Institute's 2023 Team Building: Malaysia Chapter
Next:Good news from Qiyuan | Qiyuan Party Branch has been awarded the "Top 10 Party Building Brand Projects" in the Guangzhou Lawyer Industry
Next:Good news from Qiyuan | Our senior partner Fan Linjun has been awarded the honor of "Gold Medal Mediator" in labor disputes