当前位置:网站首页>360 digital, ant group, etc. were selected as member units of the "business security promotion plan" of the Chinese Academy of Communications
360 digital, ant group, etc. were selected as member units of the "business security promotion plan" of the Chinese Academy of Communications
2022-06-30 15:52:00 【TechWeb】
【TechWeb】6 month 30 Daily news , In recent days, , China academy of information and communications ( hereinafter referred to as “ China Academy of communications ”) The first batch of “ Business security promotion plan ” Member units ,360 Number division 、 China Mobile 、 Ant group 、 Baidu, etc. from communication 、 Internet 、 Enterprises in digital technology and other fields were selected as the first member units .
It is reported that ,“ Business security promotion plan ” It is jointly established by China Academy of communications and communications with enterprises in the industry , It is a political orientation 、 production 、 learn 、 study 、 Use an open platform , Mainly carry out technical research 、 Standard setting 、 Test evaluation 、 Supply and demand docking 、 Industrial exchange 、 Talent training 、 Platform construction, etc , It aims to promote the research of core business security technologies and the implementation of industrial applications , Accelerate the update iteration of business security standards , Promote the sound development of the business security industry .
360 Introduction of the person in charge of information security of the digital Department , It is right to be selected into the business security promotion plan 360 Recognition of the data security strength of the digital department , future 360 The digital division will also focus on technical research in the field of data security and personal information protection 、 Platform construction, etc. actively carry out exchanges with the industry , Strengthen the construction of data security and information protection industries , Jointly promote business safety and ecological health
According to introducing , In terms of internal management ,360 The digital division promotes the construction of the company's organizational system and the implementation of data security management and personal information protection laws and regulations . Organizational level , Set up a data security committee , Make relevant major decisions and suggestions as a whole , Incorporate personal information protection and data security management into corporate governance 、 Corporate culture and overall development strategy . Institutional level , One after another 《360 Basic policies of digital personal information protection and data governance 》、《360 Data security management system of the digital department 》 And so on , Establish and improve the company's data security and personal information protection compliance system .
360 A number of subjects indicate that , future , We will continue to promote the construction of data security and personal information protection and governance systems , Use perfect system and technical ability to escort business safety , And will join hands with China Academy of ICT , Jointly promote the development of business security industry , Build an open business security management ecosystem .
边栏推荐
- Specific steps for installing mysql8.0 on Windows system
- 阿里云oss对象存储跨域设置
- 云化XR,如何助力产业升级
- Asp.NetCore利用缓存使用AOP方式防止重复提交
- Kubernetes: a comprehensive analysis of container choreography
- [leetcode] linked list sorting (gradually increasing the space-time complexity)
- Policy Center > Deceptive Behavior
- from Crypto. Cipher import AES could not find the solution record with module error
- Google play index table
- 有意思的鼠标指针交互探究
猜你喜欢

开源 STM32 USB-CAN项目

深入理解.Net中的线程同步之构造模式(二)内核模式1.内核模式构造物Event事件

婴儿认知学习所带来的启发,也许是下一代无监督机器学习的关键

Smart wind power: operation and maintenance of digital twin 3D wind turbine intelligent equipment
![Warning: [antd: Menu] `children` will be removed in next major version. Please use `items` instead.](/img/c1/99ad29789a669c4498fb93ce1fb009.png)
Warning: [antd: Menu] `children` will be removed in next major version. Please use `items` instead.

Is your light on? Before you start to solve a problem, you need to know what the "real problem" is

Open source STM32 USB-CAN project

Reptile (1) - Introduction to basic reptile theory

各省GDP可视化案列,附带csv Metabase处理

分布式机器学习:模型平均MA与弹性平均EASGD(PySpark)
随机推荐
Modifying MySQL password under Linux: error 1396 (HY000): Operation alter user failed for 'root' @ 'localhost‘
C language foundation - pointer array - initialization method & constant pointer array, pointer constant array
Oracle中的With As 子查询
Google Play 索引表
《你的灯亮着吗》开始解决问题前,得先知道“真问题”是什么
Chapter III installation and use of jupyter
分布式机器学习:模型平均MA与弹性平均EASGD(PySpark)
实时渲染和预渲染有什么区别
容器常用命令
Chapter 2 installation and use of vscode editor
数据治理市场:亿信华辰朝左,华傲数据向右
Practical cases of data visualization (timeline rotation diagram, streamlit control year metabase visualization tutorial) 2.0
Abstract meaning
深入理解.Net中的线程同步之构造模式(二)内核模式1.内核模式构造物Event事件
Preliminary study on AI noise reduction evaluation system of sound network
Management joint examination - mathematical formula
Message queue ten questions
iMeta | 叶茂/时玉等综述环境微生物组中胞内与胞外基因的动态穿梭与生态功能...
LeCun指明下一代AI方向:自主机器智能
互联网研发效能之去哪儿网(Qunar)核心领域DevOps落地实践