GB/T 39335-2020 PDF English
US$380.00 · In stock · Download in 9 secondsGB/T 39335-2020: Information security technology - Guidance for personal information security impact assessment Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
| GB/T 39335-2020 | English | 380 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Information security technology - Guidance for personal information security impact assessment
| Valid |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GB/T 39335-2020
GB/T 39335-2020: Information security technology - Guidance for personal information security impact assessment ---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT39335-2020
GB
NATIONAL STANDARD OF THE
PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L 80
Information security technology - Guidance for
personal information security impact assessment
Issued on. NOVEMBER 19, 2020
Implemented on. JUNE 01, 2021
Issued by. State Administration for Market Regulation;
Standardization Administration of PRC.
Table of Contents
Foreword... 3
1 Scope... 4
2 Normative references... 4
3 Terms and definitions... 4
4 Assessment principle... 5
4.1 Overview... 5
4.2 The value of conducting an assessment... 5
4.3 Purpose of assessment report... 6
4.4 Subjects responsible for assessment... 8
4.5 Basic principles of assessment... 8
4.6 Elements to be considered in the assessment implementation... 9
5 Implementation process of assessment... 11
5.1 Analysis of assessment necessity... 11
5.2 Assessment preparation... 13
5.3 Data mapping analysis... 17
5.4 Identification of risk sources... 18
5.5 Analysis of the impact of personal rights... 23
5.6 Comprehensive analysis of security risks... 24
5.7 Assessment report... 25
5.8 Risk treatment and continuous improvement... 25
5.9 Development of report release strategy... 26
Appendix A (Informative) Examples of evaluative compliance and assessment
points... 27
Appendix B (Informative) Examples of high-risk personal information
processing activities... 31
Appendix C (Informative) Commonly used tools for personal information
security impact assessment... 34
Appendix D (Informative) Reference method for personal information security
impact assessment... 37
References... 43
1 Scope
This standard provides the basic principles and implementation process, of
personal information security impact assessment.
This standard applies to various organizations, to carry out personal information
security impact assessment on their own. At the same time, it can provide
reference for the supervision, inspection, assessment of personal information
security, by the competent regulatory authorities, third-party assessment
agencies and other organizations.
2 Normative references
The following documents are essential to the application of this document. For
the dated documents, only the versions with the dates indicated are applicable
to this document; for the undated documents, only the latest version (including
all the amendments) is applicable to this standard.
GB/T 20984 Information security technology - Risk assessment specification
for information security
GB/T 25069-2010 Information security technology - Glossary
GB/T 35273-2020 Information security technology - Personal information
security specification
3 Terms and definitions
The terms and definitions as defined in GB/T 25069-2010 and GB/T 35273-
2020, as well as the following terms and definitions, apply to this document.
3.1 Personal information
Various information, which is recorded electronically or in other ways, which
can identify a specific natural person alone OR in combination with other
information OR reflect the activities of a specific natural person.
3.2 Personal sensitive information
Personal information which, once leaked, illegally provided, or misused, may
endanger personal and property safety; easily lead to damage to personal
reputation, physical and mental health, or discriminatory treatment.
3.3 Personal information subject
The natural person, which is identified or associated with the personal
information.
3.4 Personal information security impact assessment
Regarding personal information processing activities, the process of testing
its legal compliance degree, judging the various risks of damage to the legal
rights and interests of personal information subjects, evaluating the
effectiveness of various measures used to protect personal information
subjects.
4 Assessment principle
4.1 Overview
Personal information security impact assessment aims to discover, dispose,
continuously monitor the risks of adverse effects, on the legal rights and
interests of personal information subjects, in the process of personal
information processing.
4.2 The value of conducting an assessment
The implementation of personal information security impact assessment can
effectively strengthen the protection of the rights and interests of personal
information subjects; help organizations to demonstrate their efforts to protect
personal information security; enhance transparency; prompt the trust of
personal information subjects. It includes.
4.3 Purpose of assessment report
The content of the personal information security impact assessment report
mainly includes. the business scenarios covered by the assessment, the
specific personal information processing activities involved in the business
scenarios, the responsible and participating departments and personnel, the
identified risks, the list of adopted and proposed security control measures,
residual risks, etc.
Therefore, the purpose of the personal information security impact assessment
report includes but is not limited to.
4.4 Subjects responsible for assessment
The organization designates the responsible department or person responsible
for personal information security impact assessment, who is responsible for the
formulation, implementation, improvement of the personal information security
impact assessment work process, AND is responsible for the quality of the
personal information security impact assessment work results.
4.5 Basic principles of assessment
The basic principle of personal information security impact assessment is as
shown in Figure 1.
4.6 Elements to be considered in the assessment
implementation
4.6.1 Assessment scale
The scale of personal information security impact assessment often depends
on the scope, number and extent of the affected personal information subjects.
Generally, when organizations implement this type of personal information
security impact assessment, the type, sensitivity, quantity of personal
information, the scope and number of personal information subjects involved,
the range of people who can access personal information, will all become
important factors that affect the scale of the assessment.
4.6.2 Assessment method
The basic assessment methods, which are used in the assessment
implementation process, include but are not limited to the following three.
4.6.3 Work form of assessment
From the perspective of implementation subjects, personal information security
impact assessment is divided into two forms. self-assessment and inspection
assessment.
5 Implementation process of assessment
5.1 Analysis of assessment necessity
5.1.1 Overview
Personal information security impact assessment can be used for compliance
gap analysis; it can also be used for compliance AND to further enhance its own
security risk management capabilities and security level. Therefore, the
necessity of starting the personal information security impact assessment,
depends on the organization's personal information security goals. The
organization can select the business scenarios, which need to start the
assessment, according to actual needs.
5.1.2 Assessment of compliance gap
5.1.2.1 Overview
When the personal information security goal, which is defined by the
organization, is to comply with the baseline requirements of relevant laws,
regulations or standards, THEN, the main purpose of personal information
security impact assessment is to identify the security control measures, that
have been taken for the specific personal information processing activities to
be assessed, as well as the gap between the specific requirements of the
relevant laws, regulations, standards, such as sharing personal information with
a third party in a certain business scenario, whether it obtains the express
consent of the subject of personal information.
5.1.2.2 Overall compliance analysis
The organization can analyze the gap, BETWEEN all the personal information
processing activities involved in a specific product or service AND the
applicable rules, in accordance with applicable laws, regulations, policies and
standards, which are related to the protection of personal information.
5.1.2.3 Partial compliance analysis
The organization can analyze the gap, BETWEEN some personal information
processing activities involved in a specific product or service AND the
applicable rules, in accordance with applicable personal information protection
related laws, regulations, policies, standards.
5.1.2.4 Analysis of evaluative compliance requirements
Some laws, regulations, standards, which are related to the protection of
personal information, put forward evaluative compliance requirements. Such
requirements do not propose clear and specific security control measures, for
specific personal information processing activities. Instead, they require
organizations to conduct risk assessments for specific personal information
processing activities; take security control measures appropriate to the degree
of risk; reduce the risk of adverse effects on the legal rights and interests of
personal information subjects to an acceptable level, to comply with its
requirements.
5.1.3 Assessment of due diligence risk
For the purpose of prudent operation, reputation maintenance, brand building,
etc., organizations often select personal information processing activities, which
may pose a high risk to individuals' legitimate rights and interests, to carry out
assessments of due diligence risk.
5.2 Assessment preparation
5.2.1 Establish an assessment team
The organization confirms and appoints a person (assessor), who is
responsible for assessing the impact of personal information security. In
addition, the organization has to appoint a person to be responsible for signing
the assessment report.
5.2.2 Develop an assessment plan
The plan needs to clearly stipulate the work to be done to complete the personal
information security impact assessment report, the division of assessment
tasks, the assessment schedule. In addition, the plan needs to consider the
suspension or cancellation of the scenario to be evaluated. Consider the
following aspects, during specific operations.
5.2.3 Determine the assessment object and scope
Describe the object and scope of the assessment, from the following three aspects.
5.2.4 Develop a consultation plan for related parties
Related parties include but are not limited to.
5.3 Data mapping analysis
After the organization conducts a comprehensive survey on the personal
information processing process, it forms a clear data list and data mapping chart.
The data mapping analysis stage needs to be combined with the specific
scenarios of personal information processing. The content of the survey
includes the types of personal information, which are involved in the collection,
storage, use, transfer, sharing, deletion of personal information; the purpose of
processing;
5.4 Identification of risk sources
Risk source identification is to analyze which threat sources are faced by
personal information processing activities, whether the lack of adequate
security measures leads to the existence of vulnerabilities AND triggers security
incidents. There are many factors, which determine the occurrence of personal
information security incidents. In terms of threat sources, there are internal
threat sources and external threat sources, incidents such as data theft as
caused by malicious personnel, data leakage as accidentally caused by non-
malicious personnel. In terms of vulnerability, there are data damage as caused
by physical environment, data leakage, tampering, loss as caused by technical
factors, as well as abuse as caused by improper management.
5.5 Analysis of the impact of personal rights
5.5.1 Dimensions of personal rights
Personal rights and interests impact analysis refers to the analysis, on whether
specific personal information processing activities will affect the legal rights and
interests of personal information subjects, as well as what kind of impact it may
have. The general impact of personal rights and interests can be divided into
four dimensions. "limiting individual's right to make decisions," "inducing
differential treatment," "impairing personal reputation or suffering mental
pressure", "impairing personal property".
5.5.2 Process of analysis of personal rights and interests impact
The organization can analyze the results of data mapping analysis; determine
the personal information processing activities, that need to be evaluated;
analyze the entire life cycle of personal information processing activities or the
impacts of specific processing behaviors on personal rights and interests, AND
the possible impact of personal information leakage, damage, loss, abuse, etc.,
5.6 Comprehensive analysis of security risks
When conducting a comprehensive analysis of security risks, it may refer to the
basic principles in 4.5 AND take the following steps.
5.7 Assessment report
The content of the assessment report usually includes. the approval page of
the personal information protection officer; the scope of application of the
assessment report; the information of the personnel who implemented the
assessment and wrote the report; the laws, regulations, standards referred to;
the personal information impact assessment object (clearly involved personal
sensitive information); assessment content; involved parties; the results of the
analysis of personal rights and interests; the analysis of security protection
measures; the analysis of the possibility of security incidents; the criteria for risk
determination; the results of compliance analysis; the process and results of
risk analysis; the risk disposal recommendations, etc.
5.8 Risk treatment and continuous improvement
According to the assessment results, the organization can select and
implement corresponding safety control measures, for risk treatment. Under
normal circumstances, according to the level of risk, it may adopt the disposal
methods, such as immediate disposal, deadline disposal, post-disposal after
weighing the impact and cost, accepting the risk.
5.9 Development of report release strategy
In order to promote itself to continuously improve the level of personal
information protection, cooperate with regulatory activities, increase customer
trust, organizations can formulate personal information security impact
assessment report release strategies. The personal information security impact
assessment report, which is selected for public release, can be simplified, on
the basis of the existing assessment report. However, its content is usually not
less than the following aspects.
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GB/T 39335-2020 be delivered?Answer: The full copy PDF of English version of GB/T 39335-2020 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GB/T 39335-2020_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 39335-2020_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GB/T 39335-2020 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.
How to buy and download a true PDF of English version of GB/T 39335-2020?A step-by-step guide to download PDF of GB/T 39335-2020_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GB/T 39335-2020". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|