"Cloud" data governance data release data element value 2022 CCS Chengdu network security conference and data governance summit opening

Author:Cover news Time:2022.09.26

Cover reporter Xiong Yingying

As a new type of production factors, data is empowering economic and social development in a deeper way. What bottlenecks do the data factor flow currently facing the orderly flow? What legal issues are there in data transactions? How to improve the data governance system, release the value of data element, and promote the further development of the digital economy?

On September 26, the 2022 CCS Chengdu Cyber ​​Security Conference and Data Governance Summit were held online. The afternoon data governance summit opened the two theme forums of digital governance and data cross -border flow. share.

The summit was led by the Sichuan Internet Information Office, sponsored by the Chengdu Internet Information Office, and was hosted by the Sichuan Branch of the National Computer Network Emergency Technology Treatment and Coordination Center. The Provincial Party Committee's Network Information Office, the Provincial Department of Economics and Scriptures, and the relevant person in charge of the Provincial Big Data Center attended the summit and delivered a speech.

Build a network security active immunization security system

Data trading market prospects are expected

At the data governance forum in the first half of the summit, Shen Changxiang, an academician of the Chinese Academy of Engineering, delivered a keynote speech on the title of "Creation of the New Ecology of Safety and Trusted Digital Economy".

Shen Changxiang, academician of the Chinese Academy of Engineering

He pointed out that at present, network space has become the fifth largest sovereign field space after Lu, sea, empty, and heaven. Without network security, there is no national security. However, the traditional "blocking and killing" patch has been difficult to deal with unknown malicious attacks.

Shen Changxiang believes that the key to building a cyber security active immunization system is to establish a new model of active immunoaged and credible computing. Active immunization and credibility computing is a new computing model for safety protection at the same time. It can recognize the "self" and "non -self" components in time, so that the attackers cannot use defects and vulnerabilities to perform illegal operations on the system to achieve the expected computing goals Essence At present, trusted computing is widely used in important information systems such as VAT, defense and counterfeiting, and second -generation resident ID security systems.

Although the network security situation is becoming increasingly complicated and severe, opportunities and challenges coexist. Wang Lei, a researcher at the Intelligent Science and Technology Research Center of Beijing Institute of Technology, pointed out that the data trading market has a broad prospect. According to IDC, it is estimated that by 2025, the total amount of data generated by China will reach 48.6ZB, accounting for 27.8%of the world's, and the contribution rate for GDP growth will It will average 1.5 to 1.8 percentage points per year.

Wang Lei, a researcher at the Intelligent Science and Technology Research Center of Beijing Institute of Technology

However, as a new thing, data transactions still face some legal issues. In this regard, Wang Lei suggested that data transactions must be carried out on the basis of ensuring data security; at the same time, a dynamic data classification and grading system is formed based on different scenarios.

At the forum, Tao Liuqun, deputy dean of the Digital China Research Institute of Xinhua San Group, and Gu Haiyan, general manager of Sina Group's legal department, shared views from the perspective of urban data governance and corporate data governance.

Tao Liuqun pointed out that in the process of governance at the grassroots level, there are often "fast division" problems. Those who find problems have no power tube. The authorities with power tubes can not see the problem. See the matter of the management and solve the problem of governance.

Gu Haiyan suggested that enterprises should establish a national security -based data governance system, while controlling the quality of data and improve the level of data governance; and promote the establishment of an industry self -discipline mechanism for the establishment of data governance rules, improve data security guarantee measures, and establish a dynamic defense mechanism. Eventually guarantee data security.

Data cross -border flow will become a trend

The domestic regulatory system is constantly improving

In recent years, cross -border flow of data has become the core issues of politics, economy, and society related to countries. However, regional, policies and technology have caused countries to have a global consensus on the issue of data flow, which has also brought problems such as hindering data flow or abuse of privacy data.

Zhang Jinping, an associate professor at the School of Law of the Central University of Finance and Economics, introduced that there is no unified international rules for cross -border flow supervision in the world. A foreign research institution has summarized the global data cross -border regulatory rules and attributed China as a restricted mobile model. He did not recognize this classification and interpreted cross -border liquidity supervision in my country.

“在现有国际法框架下,各国对数据跨境流动监管的自由度较大,因而差异也比较大,但并不能因此对他国监管制度存有偏见,因为各国的实际情况千差万别。”张金平认为, In the formulation and implementation of data cross -border flow regulatory rules, China has fully considered these factors, and it should be said that it has achieved broad and strictness.

Why promote data cross -border flow? He Yueying, director of the National Internet Emergency Coordination Center, mentioned that according to the calculation of UN trade and development conferences, 50%of the global service trade growth will depend on data cross -border flow in the next ten years. Traditional industries such as manufacturing and retail industry will be achieved. After its empowerment, it can achieve an average annual growth rate of more than 15%.

It can be seen that the trend of integrating global data cross -border flow is inevitable, but the data security risks facing are self -evident.

On July 7 this year, the National Network Information Office issued the "Measures for Evaluation of Data Outbound Security". In He Yueying's view, this is a direct manifestation of the national strategy of data security, and it is also a concrete practice of governing the country according to law and improving the level of data governance. In addition, it is still effective in responding to the complex international environment, especially the long -arm jurisdiction of Western countries.

In the subsequent speech, Wang Yinan, the head of the Science and Technology Commission of Beijing Deheng Law Firm, also interpreted the main content and applicable conditions of the "Evaluation Measures for the Evaluation of Data Outbound".Lin Guanzhou, deputy general manager of Beijing CITIC Digest Technology Co., Ltd. shared the exploration and practice of self -assessment of corporate data cross -border risks, and gave relevant suggestions.[If you have news clues, please report to us.Report WeChat Follow: IHXDSB, Report QQ: 3386405712]

- END -

5 projects in Kunming are shortlisted for national new information consumption demonstration list

On July 29, the Ministry of Industry and Information Technology announced the results of the 2022 new information consumption demonstration project selection. A number of new information consumer prod

The three awards are announced!Come and listen to the "Innovation Story" of Shuangchuang Star in Chengdu

On June 20, the 2021 Entrepreneur Tianfu · Jingrong Year hosted by the Chengdu Mu...