| 
           
             
       
   
   US$359.00 ยท In stock Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 32926-2016: Information security technology -- Information security management specification for government information technology service outsourcing Status: Valid    
      
    
  
	
		
			| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF | 
		 
			| GB/T 32926-2016 | English | 359 | 
   Add to Cart
   | 
                    3 days [Need to translate]
                 | 
                    Information security technology -- Information security management specification for government information technology service outsourcing
                 | Valid | 
                    GB/T 32926-2016
                 | 
		 
	 
     
     
  
	 
       PDF similar to GB/T 32926-2016 
    
   
    
     
          
  
  
    
  Basic data             |  Standard ID  |          GB/T 32926-2016 (GB/T32926-2016) |               |  Description (Translated English)  |          Information security technology -- Information security management specification for government information technology service outsourcing |               |  Sector / Industry  |          National Standard (Recommended) |               |  Classification of Chinese Standard  |          L80 |               |  Classification of International Standard  |          35.040 |               |  Word Count Estimation  |          18,119 |               |  Date of Issue  |          2016-08-29 |               |  Date of Implementation  |          2017-03-01 |               |  Regulation (derived from)  |          National Standard Notice No. 14 of 2016 |               |  Issuing agency(ies)  |          General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China |         
  GB/T 32926-2016: Information security technology -- Information security management specification for government information technology service outsourcing ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.  
Information security technology - information security management specification for government information technology service outsourcing
ICS 35.040
L80
National Standards of People's Republic of China
Information Security Technology Government Information Technology Services
Outsourcing Information Security Management Specification
2016-08-29 released
2017-03-01 implementation
General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China
China National Standardization Management Committee released
Directory
Preface III
Introduction IV
1 Scope 1
2 normative reference document 1
3 Terms and definitions 1
4 Summary 2
4.1 Service outsourcing information security management basic principles 2
4.2 Service Outsourcing Information Security Management Roles and Responsibilities 2
4.3 Service Outsourcing Information Security Management Model 3
5 planning preparation 3
5.1 Service Outsourcing Information Security Risk Assessment 3
5.2 Service Outsourcing Information Security Management Strategy and System 4
6 Institutional and Personnel Selection 4
6.1 Outsourcing services and personnel risk assessment 4
6.2 Service outsourcing contract 5
6.3 Service Outsourcing Information Security Management Plan 6
6.4 Information Security Confidentiality Agreement 6
6.5 Outsourcing service agencies filing 6
7 Operational oversight 7
7.1 Service Process Assessment Audit 7
7.2 Phase Result Delivery Verification 7
Improved and finished
8.1 Service Improvement 7
8.2 Service Exit 7
Appendix A (Normative Appendix) Service Outsourcing Basic Information Security Control 9
Reference 12
Foreword
This standard is drafted in accordance with the rules given in GB/T 1.1-2009.
This standard is proposed by the National Information Security Standardization Technical Committee (SAC/TC260).
The drafting of this standard. Beijing Information Security Evaluation Center, Ministry of Industry and Information Technology Institute of Electronic Science and Technology Information, Information Industry letter
Safety Research Center, China Information Security Research Institute Co., Ltd.
The main drafters of this standard. Liu Haifeng, Qian Xiubang, Liang Bo, Zhao Zhangjie, Liu Ying, Huoshanshan, Zhang Xiaomei, Wang Chunjia, Li Chenyang, Zhang Heng,
Zhang Yi, Geng Guining.
Introduction
With the rapid development of economy and society, government departments in the construction and construction of service-oriented government, and continuously improve the ability and level of service for the people
Process, more and more use and rely on information technology, and to carry out this information technology-related information technology consulting, information system set
Into, operation and maintenance, security evaluation and other service outsourcing work. A large number of government information outsourcing work, both to solve the government administrative resources are limited and
The contradiction between the increasing demand for public service efficiency and the improvement of the quality of government information engineering. But the government departments to enjoy the letter
Information technology outsourcing to bring convenience at the same time, also faced with outsourcing service complex background, service personnel mobility, internal management is not standardized
And other issues of information security risks, if the lack of information on service outsourcing information security management, will be the government departments
Public, the people of production and life, and even the great loss of national security.
This standard is used to regulate and guide government departments to purchase and use information technology services. This standard is through the process of outsourcing services to government departments
To sort out, the establishment of the government information technology services outsourcing information security management model, in the clear service outsourcing information security management role
And responsibility at the same time, the management activities will be divided into planning preparation, institutional and personnel selection, operation supervision, improvement completed four stages, respectively
Information security management norms for the government departments of information technology services outsourcing security management to provide a reference.
Government departments in the information technology service outsourcing information security management process, but also based on the standards of the standard requirements and basic control
Measures, combined with their own service outsourcing project, put forward with the organization, personnel management, data management, information technology services, etc.
Should be the control measures, phased, focused on the implementation of service outsourcing activities, so that the requirements of information security management can effectively
Guide the different levels of government departments to the actual service outsourcing information security management, to enhance its service outsourcing information security level.
Information Security Technology Government Information Technology Services
Outsourcing Information Security Management Specification
1 Scope
This standard establishes the government information technology service outsourcing information security management model, put forward the government department information technology service outsourcing
Management requirements for activities at all stages of the information security management lifecycle.
This standard applies to government departments to purchase and use information technology services.
Government departments to carry out secret information technology service outsourcing work, with reference to the State Secrecy Bureau relevant confidentiality regulations and standards, not in this standard
Within range.
2 normative reference documents
The following documents are indispensable for the application of this document. For dated references, only the dated edition applies to this article
Pieces. For undated references, the latest edition (including all modifications) applies to this document.
Information security technical terminology GB/T 25069-2010
Information security technology - Basic requirements for information security management of government departments GB/T 29245-2012
3 terms and definitions
GB/T 25069-2010 Definitions and the following terms and definitions apply to this document.
3.1
Information technology services informationtechnologyservice
The supply side provides services for the development and application of information technology, as well as the supply of information technology as a means to provide support for business activities
service.
[GB/T 29264-2012]
Note. Common service forms are information technology consulting services, design and development services, information systems integration implementation services, operation and maintenance services, data processing and storage
Services, operations services, digital content services, call center services and other information technology services.
3.2
Service outsourcing service
Government departments to sign the contract, commissioned by other agencies to undertake information technology services business.
3.3
Outsourcing service organization organizationprovidingoutsourcedservice
Service outsourcing to assume the information technology services institutions.
3.4
Service subcontracting servicesubcontraction
Outsourcing services will be part of their own government departments to undertake information technology services once again entrusted to other institutions to complete the business conduct and management
Model.
   
   
  
  
    
  Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 32926-2016_English be delivered?Answer: Upon your order, we will start to translate GB/T 32926-2016_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 32926-2016_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 32926-2016_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs):  List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to  [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.  
        
   
        
       
          
               
 
          |