HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (12 Oct 2025)

JR/T 0197-2020 PDF English

US$955.00 · In stock · Download in 9 seconds
JR/T 0197-2020: Financial data security - Guidelines for data security classification
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] deliveryName of Chinese StandardStatus
JR/T 0197-2020English955 Add to Cart 0-9 seconds. Auto-delivery Financial data security - Guidelines for data security classification Valid

Excerpted PDFs (Download full copy in 9 seconds upon purchase)

PDF Preview: JR/T 0197-2020
      

Similar standards

GB/T 19584   GB/T 12406   JR/T 0207   

JR/T 0197-2020: Financial data security - Guidelines for data security classification

---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/JRT0197-2020
JR FINANCIAL INDUSTRY STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.240.40 A 11 Financial data security - Guidelines for data security classification Issued on. SEPTEMBER 23, 2020 Implemented on. SEPTEMBER 23, 2020 Issued by. People’s Bank of China

Table of Contents

Foreword... 3 Introduction... 4 1 Scope... 5 2 Normative references... 5 3 Terms and definitions... 5 4 Objectives, principles and scope... 8 5 Data security grading... 10 6 Identification of important data... 21 Appendix A (Informative) Reference rules for data grading... 22 Appendix B (Informative) Changes in data security level... 79 Appendix C (Informative) Important data... 80 References... 82

1 Scope

This standard gives the objectives, principles and scope of financial data security classification, as well as the elements, rules and classification process of data security classification. This standard applies to financial institutions to carry out electronic data security classification work; provides a reference for third-party evaluation agencies and other organizations to carry out data security inspection and evaluation.

2 Normative references

The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this standard. GB/T 4754-2017 Industrial classification for national economic activities GB/T 5271.1-2000 Information technology - Vocabulary - Part 1. Fundamental terms GB/T 25069-2010 Information security technology - Glossary GB/Z 28828-2012 Information security technology - Guideline for personal information protection within information system for public and commercial services GB/T 35273-2020 Information security technology - Personal information security specification JR/T 0158-2018 Data classification guidelines for securities and futures industry JR/T 0171-2020 Personal financial information protection technical specification

3 Terms and definitions

The terms and definitions as defined in GB/T 25069-2010 and GB/T 35273- 2017 as well as the following terms and definitions apply to this document. 3.1 Information Knowledge about objects (such as facts, events, things, processes or thoughts, including concepts), which has a specific meaning in certain situations. Note. Rewrite GB/T 5271.1-2000, definition 2.01.01.01. 3.2 Data The reinterpretable formal representation of information, to be suitable for communication, interpretation or processing. Note. It can be processed by manual or automatic means. [GB/T 5271.1-2000, definition 2.01.01.02] 3.3 Privacy The authority that an individual has to control or influence information related to, which involves who collects and stores it, who discloses it. [GB/T 25069-2010, definition 2.1.63] 3.4 Information processing System execution of information operations, including data processing, which can also include operations such as data communications and office automation. 3.5 Data processing System execution of data manipulation. Examples. Mathematical operations or logical operations of data, data merging or classification, program assembly or compilation, or text operations, such as editing, classification, merging, storage, retrieval, display or printing.

4 Objectives, principles and scope

4.1 Data security grading goals Data security grading aims to comprehensively sort out data assets and establish appropriate data security grade. It is a necessary prerequisite and basis for financial institutions to implement effective data grading management. 4.2 Principles of data security grading Data security grading follows the following principles. 4.3 Scope of data security classification In the process of financial data security grading, non-electronic financial data shall be implemented in accordance with relevant management regulations such as archives and documents; financial data involving state secrets shall be implemented in accordance with relevant national laws and regulations, which is not within the scope of this standard. The data security classification of the securities industry can be implemented with reference to JR/T 0158-2018.

5 Data security grading

5.1 Grading elements 5.1.1 Overview Security (confidentiality, integrity, availability) is an important reference attribute in information security risk assessment. The possible impact (such as possible harm, loss or potential risk, etc.) after data security is breached is an important basis for determining the data security level, which mainly considers the two elements of the affected object and the degree of impact. 5.1.3 Degree of influence The degree of influence refers to the magnitude of the impact after the data security of financial institutions is damaged. From high to low, it is divided into serious damage, general damage, minor damage, no damage. The relevant description is as shown in Table 1, which can be used as the reference to judge the degree of influence. The degree of influence should be determined by comprehensively considering factors such as data type, data characteristics, data scale, combined with financial business attributes to determine the degree of influence after data security is breached, for example. 5.2 Element identification 5.2.1 Security impact assessment Security impact assessment should comprehensively consider factors such as data type, data content, data scale, data source, institutional functions, 5.3.2 General rules for grading The general rules for the classification of financial data security levels include but are not limited to. 5.4 Grading process 5.4.1 Organizational guarantee Determine the highest decision-making organization for data security management; establish and clarify relevant departments (or organizations) and their responsibilities, including but not limited to. 5.4.2 System guarantee Establish relevant systems for data classification work; clarify and implement relevant work requirements, including but not limited to.

6 Identification of important data

The identification and verification of important data carried by financial institutions should comply with the relevant regulations of the state and industry authorities. Please refer to Appendix C for the description of the nature and content of important data, which is only for reference when financial institutions carry out data security classification work. JR/T 0197-2020 JR FINANCIAL INDUSTRY STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.240.40 A 11 Financial data security - Guidelines for data security classification Issued on. SEPTEMBER 23, 2020 Implemented on. SEPTEMBER 23, 2020 Issued by. People’s Bank of China

Table of Contents

Foreword... 3 Introduction... 4 1 Scope... 5 2 Normative references... 5 3 Terms and definitions... 5 4 Objectives, principles and scope... 8 5 Data security grading... 10 6 Identification of important data... 21 Appendix A (Informative) Reference rules for data grading... 22 Appendix B (Informative) Changes in data security level... 79 Appendix C (Informative) Important data... 80 References... 82

1 Scope

This standard gives the objectives, principles and scope of financial data security classification, as well as the elements, rules and classification process of data security classification. This standard applies to financial institutions to carry out electronic data security classification work; provides a reference for third-party evaluation agencies and other organizations to carry out data security inspection and evaluation.

2 Normative references

The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this standard. GB/T 4754-2017 Industrial classification for national economic activities GB/T 5271.1-2000 Information technology - Vocabulary - Part 1. Fundamental terms GB/T 25069-2010 Information security technology - Glossary GB/Z 28828-2012 Information security technology - Guideline for personal information protection within information system for public and commercial services GB/T 35273-2020 Information security technology - Personal information security specification JR/T 0158-2018 Data classification guidelines for securities and futures industry JR/T 0171-2020 Personal financial information protection technical specification

3 Terms and definitions

The terms and definitions as defined in GB/T 25069-2010 and GB/T 35273- 2017 as well as the following terms and definitions apply to this document. 3.1 Information Knowledge about objects (such as facts, events, things, processes or thoughts, including concepts), which has a specific meaning in certain situations. Note. Rewrite GB/T 5271.1-2000, definition 2.01.01.01. 3.2 Data The reinterpretable formal representation of information, to be suitable for communication, interpretation or processing. Note. It can be processed by manual or automatic means. [GB/T 5271.1-2000, definition 2.01.01.02] 3.3 Privacy The authority that an individual has to control or influence information related to, which involves who collects and stores it, who discloses it. [GB/T 25069-2010, definition 2.1.63] 3.4 Information processing System execution of information operations, including data processing, which can also include operations such as data communications and office automation. 3.5 Data processing System execution of data manipulation. Examples. Mathematical operations or logical operations of data, data merging or classification, program assembly or compilation, or text operations, such as editing, classification, merging, storage, retrieval, display or printing.

4 Objectives, principles and scope

4.1 Data security grading goals Data security grading aims to comprehensively sort out data assets and establish appropriate data security grade. It is a necessary prerequisite and basis for financial institutions to implement effective data grading management. 4.2 Principles of data security grading Data security grading follows the following principles. 4.3 Scope of data security classification In the process of financial data security grading, non-electronic financial data shall be implemented in accordance with relevant management regulations such as archives and documents; financial data involving state secrets shall be implemented in accordance with relevant national laws and regulations, which is not within the scope of this standard. The data security classification of the securities industry can be implemented with reference to JR/T 0158-2018.

5 Data security grading

5.1 Grading elements 5.1.1 Overview Security (confidentiality, integrity, availability) is an important reference attribute in information security risk assessment. The possible impact (such as possible harm, loss or potential risk, etc.) after data security is breached is an important basis for determining the data security level, which mainly considers the two elements of the affected object and the degree of impact. 5.1.3 Degree of influence The degree of influence refers to the magnitude of the impact after the data security of financial institutions is damaged. From high to low, it is divided into serious damage, general damage, minor damage, no damage. The relevant description is as shown in Table 1, which can be used as the reference to judge the degree of influence. The degree of influence should be determined by comprehensively considering factors such as data type, data characteristics, data scale, combined with financial business attributes to determine the degree of influence after data security is breached, for example. 5.2 Element identification 5.2.1 Security impact assessment Security impact assessment should comprehensively consider factors such as data type, data content, data scale, data source, institutional functions, 5.3.2 General rules for grading The general rules for the classification of financial data security levels include but are not limited to. 5.4 Grading process 5.4.1 Organizational guarantee Determine the highest decision-making organization for data security management; establish and clarify relevant departments (or organizations) and their responsibilities, including but not limited to. 5.4.2 System guarantee Establish relevant systems for data classification work; clarify and implement relevant work requirements, including but not limited to.

6 Identification of important data

The identification and verification of important data carried by financial institutions should comply with the relevant regulations of the state and industry authorities. Please refer to Appendix C for the description of the nature and content of important data, which is only for reference when financial institutions carry out data security classification work. ......
Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.


      

Tips & Frequently Asked Questions

Question 1: How long will the true-PDF of English version of JR/T 0197-2020 be delivered?

Answer: The full copy PDF of English version of JR/T 0197-2020 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.

Question 2: Can I share the purchased PDF of JR/T 0197-2020_English with my colleagues?

Answer: Yes. The purchased PDF of JR/T 0197-2020_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. www.ChineseStandard.us -- JR/T 0197-2020 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.

How to buy and download a true PDF of English version of JR/T 0197-2020?

A step-by-step guide to download PDF of JR/T 0197-2020_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).
Step 2: Search keyword "JR/T 0197-2020".
Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart.
Step 4: Select payment option (Via payment agents Stripe or PayPal).
Step 5: Customize Tax Invoice -- Fill up your email etc.
Step 6: Click "Checkout".
Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively.
Step 8: Optional -- Go to download PDF.
Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice.
See screenshots for above steps: Steps 1~3    Steps 4~6    Step 7    Step 8    Step 9