


The Cyberspace Administration of China released the "Regulations on Promoting and Regulating Cross-Border Data Flows"
According to the official account of Netcom China, the Cyberspace Administration of China recently issued the "Regulations on Promoting and Regulating Cross-Border Data Flows." According to this regulation, it will take effect immediately from the date of publication.
The relevant person in charge of the Cyberspace Administration of China said that cross-border data flow has become the basis for the exchange and sharing of global capital, information, technology, talents, goods and other resource elements. In order to promote the orderly and free flow of data in accordance with the law, stimulate the value of data elements, and expand high-level opening up to the outside world, the "Regulations" optimize and adjust the data export systems such as data export security assessment, personal information export standard contract, and personal information protection certification.
The "Regulations" clarify the reporting standards for the security assessment of important data exports, and stipulate that data processors do not need to carry out important data processing if the relevant departments or regions have not clearly informed or publicly released the data as important data. Declaration of exit security assessment.
The "Regulations" stipulate the conditions for data export activities that are exempt from reporting data export security assessment, entering into a standard contract for personal information export, and passing personal information protection certification: First, international trade, cross-border transportation, academic cooperation, transnational The data collected and generated in activities such as manufacturing and marketing are provided overseas and do not contain personal information or important data; second, the personal information collected and generated overseas is transferred to the country for processing and then provided overseas, and no introduction is made during the processing. Domestic personal information or important data; third, it is necessary to provide personal information overseas in order to conclude and perform a contract to which the individual is a party; fourth, implement cross-border human resources in accordance with labor regulations and collective contracts signed in accordance with the law. management, it is really necessary to provide employees’ personal information overseas; fifth, in order to protect the life, health and property safety of natural persons, it is really necessary to provide personal information overseas; sixth, data processors other than critical information infrastructure operators Since January 1 of that year, the personal information of less than 100,000 people (excluding sensitive personal information) has been provided overseas.
The "Regulations" establish a negative list system for free trade pilot zones. It is proposed that within the framework of the national data classification and hierarchical protection system, the free trade pilot zone can formulate a negative list within the zone on its own, and after approval by the provincial network security and information technology committee, report it to the national cybersecurity and informatization department and the national data management department for filing. Data processors in the free trade pilot zone who provide data outside the negative list overseas are exempted from declaring a data export security assessment, entering into a standard contract for personal information export, and passing personal information protection certification.
The "Regulations" clarify the conditions for two types of data export activities that require data export security assessment. First, critical information infrastructure operators provide personal information or important data overseas; second, data processors other than critical information infrastructure operators provide important data overseas, or provide a total of 1 million to overseas since January 1 of that year. Personal information of more than 10,000 people (excluding sensitive personal information) or sensitive personal information of more than 10,000 people. In addition, it stipulates the conditions for data export activities to enter into a standard contract for personal information export or to pass personal information protection certification, that is, data processors other than critical information infrastructure operators have provided more than 100,000 people overseas since January 1 of that year. Personal information of less than 1 million people (excluding sensitive personal information) or sensitive personal information of less than 10,000 people.
The "Regulations" also clearly stipulates the validity period and extension application of data export security assessment, data security protection obligations, supervision and management responsibilities, etc., and also stipulates the application of other regulations on data export security management.
The above is the detailed content of The Cyberspace Administration of China released the "Regulations on Promoting and Regulating Cross-Border Data Flows". For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Big data structure processing skills: Chunking: Break down the data set and process it in chunks to reduce memory consumption. Generator: Generate data items one by one without loading the entire data set, suitable for unlimited data sets. Streaming: Read files or query results line by line, suitable for large files or remote data. External storage: For very large data sets, store the data in a database or NoSQL.

AEC/O (Architecture, Engineering & Construction/Operation) refers to the comprehensive services that provide architectural design, engineering design, construction and operation in the construction industry. In 2024, the AEC/O industry faces changing challenges amid technological advancements. This year is expected to see the integration of advanced technologies, heralding a paradigm shift in design, construction and operations. In response to these changes, industries are redefining work processes, adjusting priorities, and enhancing collaboration to adapt to the needs of a rapidly changing world. The following five major trends in the AEC/O industry will become key themes in 2024, recommending it move towards a more integrated, responsive and sustainable future: integrated supply chain, smart manufacturing

In the Internet era, big data has become a new resource. With the continuous improvement of big data analysis technology, the demand for big data programming has become more and more urgent. As a widely used programming language, C++’s unique advantages in big data programming have become increasingly prominent. Below I will share my practical experience in C++ big data programming. 1. Choosing the appropriate data structure Choosing the appropriate data structure is an important part of writing efficient big data programs. There are a variety of data structures in C++ that we can use, such as arrays, linked lists, trees, hash tables, etc.

1. Background of the Construction of 58 Portraits Platform First of all, I would like to share with you the background of the construction of the 58 Portrait Platform. 1. The traditional thinking of the traditional profiling platform is no longer enough. Building a user profiling platform relies on data warehouse modeling capabilities to integrate data from multiple business lines to build accurate user portraits; it also requires data mining to understand user behavior, interests and needs, and provide algorithms. side capabilities; finally, it also needs to have data platform capabilities to efficiently store, query and share user profile data and provide profile services. The main difference between a self-built business profiling platform and a middle-office profiling platform is that the self-built profiling platform serves a single business line and can be customized on demand; the mid-office platform serves multiple business lines, has complex modeling, and provides more general capabilities. 2.58 User portraits of the background of Zhongtai portrait construction

In today's big data era, data processing and analysis have become an important support for the development of various industries. As a programming language with high development efficiency and superior performance, Go language has gradually attracted attention in the field of big data. However, compared with other languages such as Java and Python, Go language has relatively insufficient support for big data frameworks, which has caused trouble for some developers. This article will explore the main reasons for the lack of big data framework in Go language, propose corresponding solutions, and illustrate it with specific code examples. 1. Go language

Yizhiwei’s 2023 autumn product launch has concluded successfully! Let us review the highlights of the conference together! 1. Intelligent inclusive openness, allowing digital twins to become productive Ning Haiyuan, co-founder of Kangaroo Cloud and CEO of Yizhiwei, said in his opening speech: At this year’s company’s strategic meeting, we positioned the main direction of product research and development as “intelligent inclusive openness” "Three core capabilities, focusing on the three core keywords of "intelligent inclusive openness", we further proposed the development goal of "making digital twins a productive force". 2. EasyTwin: Explore a new digital twin engine that is easier to use 1. From 0.1 to 1.0, continue to explore the digital twin fusion rendering engine to have better solutions with mature 3D editing mode, convenient interactive blueprints, and massive model assets

As an open source programming language, Go language has gradually received widespread attention and use in recent years. It is favored by programmers for its simplicity, efficiency, and powerful concurrent processing capabilities. In the field of big data processing, the Go language also has strong potential. It can be used to process massive data, optimize performance, and can be well integrated with various big data processing tools and frameworks. In this article, we will introduce some basic concepts and techniques of big data processing in Go language, and show how to use Go language through specific code examples.

The Cyberspace Administration of China released the second batch of typical cases of rectification of corporate infringement information chaos 1. Publishing false and untrue information to slander corporate image and reputation Douyin account "Wang Wukong Shuoche" Xigua Video account "Wang Wukong" Xiaohongshu account " It’s me, Wang Wukong” 2. In the name of publishing negative information, threatening companies to carry out commercial cooperation NetEase account “Lil Moss” Douyin account “Lil Moss·Business Detective” WeChat public account “Electric Vehicle Hotspot” 3 . Publish "clickbait" articles and maliciously discredit the company's WeChat official account "Jin Merchants Club" WeChat video account "Jin Merchants Zongheng" 4. Publish false information to interfere with the normal operation of the company Douyin account "International Energy Network" Kuaishou account "International "Energy Network" Zhihu account "International Energy Network" Xiaohongshu account "International Energy Network" 5. Publish rumors and information to smear and slander
