当前位置:网站首页>Data security -- 12 -- Analysis of privacy protection
Data security -- 12 -- Analysis of privacy protection
2022-07-07 04:23:00 【Follow also】
One 、 Data security and privacy
Privacy compliance is an important part of data security , In addition to meeting the data security requirements within the enterprise , It also needs to meet all applicable legal and regulatory requirements . The definition of privacy , It refers to the personal affairs enjoyed by natural persons 、 The right not to be known by others , And the right not to be disturbed or monitored .
Usually, the privacy we refer to here is mainly the privacy of the online world , These privacy are based on data , So it is also called personal information or personal data . Personal data is Have been identified
perhaps Recognizable
Any data related to natural persons .
Identified data
, It refers to the data that can uniquely identify a natural person , Such as name 、 Well known network ID、 ID number, etc .
Recognizable data
, It refers to data that does not contain data that can directly determine a natural person , But through the existing information , Through analysis or reasoning, the data of a natural person can be determined .
Two 、 Compliance and legal compliance
So far N Countries and regions have enacted laws related to privacy protection , But we don't all need to comply , For these laws and regulations :
First , Only when we do business in the corresponding country , Their laws and regulations come into force for us , For many domestic companies , We only need to pay attention to a few laws and regulations . It should be noted that , If you provide network services , For example, the website involves the registration and access of unspecified users , This may involve processing personal data of local residents .
second , The requirements of laws and regulations related to privacy protection in various countries are also learning from each other , So most of the clauses are similar or repeated , Therefore, we only need to comply with a relatively strict regulation to meet most compliance requirements , A small number of inconsistencies only need a single processing of the involved business .
3、 ... and 、 From external regulation to internal regulation
The first step from external regulation to internal regulation , The most important external laws and regulations applicable to the business 、 Best practice framework for decomposition and reorganization , In decomposition and reorganization , Split these terms by field , Then summarize and reorganize , Remove duplicates . for example , Group all role definition classes , All data lifecycle classes are grouped together, and so on . This is actually a process of integrating all regulations .
After decomposition and reorganization , Form a compliance benchmark within the enterprise , Then all internal work is carried out based on this compliance benchmark .
Next , These compliance benchmarks need to be used as input to the development of internal document systems , Will comply with the requirements of the benchmark , Return one by one in the internal document system , For example, put it in the general policy outline 、 Management regulations 、 Internal standards 、 Technical specifications, etc . This is actually a process of integrating into internal documents .
This mode , To a large extent, it avoids the risk of external mandatory requirements without internal documents . The business is in the process of compliance improvement , You only need to find a few policy documents corresponding to your field to carry out the work , Improve the efficiency of the business department .
meanwhile , The bridge in the middle needs to change according to the outside , Such as the new legislation 、 New practice 、 New risks, etc , Make regular updates , As the input of all other privacy protection work . In fact, it's not just a document system , The work of the whole privacy protection system , Can be based on such decomposition and reorganization results .
Four 、 Reference material
For the implementation of privacy protection , You can refer to the blogger's 【 Privacy compliance 】 special column .
边栏推荐
- Practice Guide for interface automation testing (middle): what are the interface testing scenarios
- ABAP 动态内表分组循环
- Pyqt5 out of focus monitoring no operation timer
- Simple implementation of AVL tree insertion and verification operations
- Digital chemical plant management system based on Virtual Simulation Technology
- [record of question brushing] 2 Add two numbers
- Hardware development notes (10): basic process of hardware development, making a USB to RS232 module (9): create ch340g/max232 package library sop-16 and associate principle primitive devices
- Digital chemical plants realize the coexistence of advantages of high quality, low cost and fast efficiency
- 2022中青杯C题城市交通思路分析
- Learn how to use js to merge two objects into one object assign()
猜你喜欢
Quick completion guide of manipulator (10): accessible workspace
[on automation experience] the growth path of automated testing
英特尔与信步科技共同打造机器视觉开发套件,协力推动工业智能化转型
案例大赏:英特尔携众多合作伙伴推动多领域AI产业创新发展
用CPU方案打破内存墙?学PayPal堆傲腾扩容量,漏查欺诈交易量可降至1/30
Analysis on urban transportation ideas of 2022 Zhongqing cup C
The most complete security certification of mongodb in history
MySQL data loss, analyze binlog log file
Video fusion cloud platform easycvr video Plaza left column list style optimization
Tflite model transformation and quantification
随机推荐
Redis源码学习(31),字典学习,dict.c(一)
Highly paid programmers & interview questions. Are you familiar with the redis cluster principle of series 120? How to ensure the high availability of redis (Part 1)?
如何编写一个程序猿另一个面试官眼前一亮的简历[通俗易懂]
Hardware development notes (10): basic process of hardware development, making a USB to RS232 module (9): create ch340g/max232 package library sop-16 and associate principle primitive devices
ABAP dynamic inner table grouping cycle
Tflite model transformation and quantification
英特尔David Tuhy:英特尔傲腾技术成功的原因
EasyCVR集群版本添加RTSP设备提示服务器ID错误,该如何解决?
1.19.11. SQL client, start SQL client, execute SQL query, environment configuration file, restart policy, user-defined functions, constructor parameters
Kotlin Compose Text支持两种颜色
Restore backup data on GCS with br
EasyUI export excel cannot download the method that the box pops up
PHP 实现根据概率抽奖
Analysis on the thinking of college mathematical modeling competition and curriculum education of the 2022a question of the China Youth Cup
英特尔与信步科技共同打造机器视觉开发套件,协力推动工业智能化转型
Continuous learning of Robotics (Automation) - 2022-
[team learning] [phase 34] Baidu PaddlePaddle AI talent Creation Camp
Do you choose pandas or SQL for the top 1 of data analysis in your mind?
Video fusion cloud platform easycvr video Plaza left column list style optimization
Some thoughts on cross end development of kbone and applet