On February 15, the measures for network security review (hereinafter referred to as the measures) jointly revised and issued by the state Internet information office and other 13 departments officially came into force. This is another important regulation revised after the introduction of laws and regulations such as data security law, personal information protection law, key information infrastructure security protection regulations and regulations on the management of network product security vulnerabilities.
It can be said that in the field of Internet, the construction of laws and regulations is constantly doing “addition”, which also requires relevant platform enterprises to do well in “subtraction” and “addition”. “Addition” is to continue to make full use of the opportunity of the development of Internet economy and find new opportunities; “Subtraction” is to continuously clean up and correct the illegal and non-conforming aspects in the past.
People will pay attention to the security review of the measures on the overseas listing of network platform operating enterprises. The reason why some of these platform enterprises are not profitable but are sought after at a high premium is that they have a lot of information. Information can generate benefits, but the excessive concentration of information will also bring hidden dangers in national security and personal information security. It is imperative for the measures to strengthen the implementation of network security review and strengthen risk identification and control, which is also a common practice in the world.
In this regard, how do Internet related platform enterprises respond to the times? Article 10 of the measures lists seven possible national security risk factors. Including: the risk of illegal control, interference or destruction of key information infrastructure caused by the use of products and services; The harm of interruption of product and service supply to the business continuity of key information infrastructure; Security, openness, transparency and diversity of sources of products and services
The reliability of supply channels and the risk of supply interruption due to political, diplomatic, trade and other factors. This is a “high-voltage line”. If there is something to change, it will be avoided.
At the same time, the above Measures stipulate that network platform operators who master the personal information of more than 1 million users must apply to the Network Security Review Office for network security review when they go abroad for listing. This is not only the need to ensure network security, data security and national security, but also the further strengthening of personal information protection measures.
Now, people’s daily life is inseparable from the Internet, and all aspects of information will become a Beijing Vastdata Technology Co.Ltd(603138) library through the Internet platform. Internet products and services not only bring great convenience to daily life, but also bring network security threats such as security vulnerabilities and data leakage.
The “seven risks” mentioned in the measures include: the risk of core data, important data or a large amount of personal information being stolen, leaked, damaged, illegally used and illegally leaving the country; There are risks of key information infrastructure, core data, important data or a large amount of personal information being affected, controlled and maliciously used by foreign governments, as well as network information security risks. The important point emphasized here is “personal information security”.
The network security law clearly stipulates that no individual or organization shall steal or obtain personal information in other illegal ways, and shall not illegally sell or provide personal information to others. The reality is that although the collection of personal information beyond the scope is prohibited after repeated orders, the problem is still prominent. Users have no privacy and are equivalent to “transparent people”. These personal information will also become the “assets” of a platform enterprise, so as to obtain greater benefits, including those obtained through listing through various channels.
According to the prediction data of some research institutions, by 2025, the added value of China’s core industries of digital economy will account for 10% of GDP, the proportion of enterprises with comprehensive digitization of key business links will reach 60%, and the scale of information consumption will reach 7.5 trillion yuan. This is a huge “blue ocean”.
However, in the “blue ocean”, we need to see “addition” and focus on “subtraction”. No matter how well “addition” and “subtraction” are done, we must abide by the law. The revision and promulgation of the measures will play an important role in further strengthening the “fence” of national security and personal information security.