HOME   Cart(0)   Quotation   About-Us Tax PDFs Standard-List Powered by Google www.ChineseStandard.net Database: 189760 (15 Feb 2025)

GB/T 35273-2020 English PDF (GB/T 35273-2017)

GB/T 35273-2020_English: PDF (GB/T35273-2020)
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 35273-2020English405 Add to Cart 0--9 seconds. Auto-delivery Information security technology -- Personal information security specification Valid GB/T 35273-2020
GB/T 35273-2017English170 Add to Cart 0--9 seconds. Auto-delivery Information security technology -- Personal information security specification Obsolete GB/T 35273-2017


BASIC DATA
Standard ID GB/T 35273-2020 (GB/T35273-2020)
Description (Translated English) Information security technology -- Personal information security specification
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.040
Word Count Estimation 34,321
Date of Issue 2020-03-06
Date of Implementation 2020-10-01
Older Standard (superseded by this standard) GB/T 35273-2017
Quoted Standard GB/T 25069-2010
Drafting Organization China Electronics Standardization Institute, Beijing Information Security Evaluation Center, Yixin Technology Co., Ltd., Sichuan University, Tsinghua University, China Academy of Information and Communications Technology, the First Research Institute of the Ministry of Public Security, China Network Security Review Technology and Certification Center, Shenzhen Tencent Computer System Co., Ltd., Shanghai Institute of International Studies, Alibaba (Beijing) Software Service Co., Ltd., CLP Great Wall Internet System Application Co., Ltd., Alibaba Cloud Computing Co., Ltd., Huawei Technologies Co., Ltd., Qiangyun Data Technology Co., Ltd.
Administrative Organization National Information Security Standardization Technical Committee (SAC/TC 260)
Proposing organization National Information Security Standardization Technical Committee (SAC/TC 260)
Issuing agency(ies) State Administration for Market Regulation, National Standardization Administration
Summary This standard specifies the principles and security requirements for personal information processing activities such as collection, storage, use, sharing, transfer, public disclosure, and deletion. This standard applies to regulating the personal information processing activities of various organizations, and also applies to the supervision, management and evaluation of personal information processing activities by competent regulatory authorities, third-party evaluation agencies and other organizations.

BASIC DATA
Standard ID GB/T 35273-2017 (GB/T35273-2017)
Description (Translated English) Information security technology -- Personal information security specification
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.040
Word Count Estimation 34,395
Date of Issue 2017-12-29
Date of Implementation 2018-05-01
Drafting Organization Beijing Information Security Assessment Center, China Electronics Standardization Institute, Yixin Technology Co., Ltd., Sichuan University, Peking University, Tsinghua University, China Institute of Information Security Research Institute, the First Institute of Public Security, Shanghai Institute of International Studies, Ali Baba (Beijing) Software Services Co., Ltd., Shenzhen Tencent Computer System Co., Ltd., CLP Great Wall Internet System Application Co., Ltd., Ali Cloud Computing Co., Ltd., Huawei Technologies Co., Ltd., Strong Yun Data Technology Co., Ltd.
Administrative Organization National Information Security Standardization Technical Committee (SAC/TC 260)
Proposing organization National Information Security Standardization Technical Committee (SAC / TC 260)
Issuing agency(ies) People's Republic of China General Administration of Quality Supervision, Inspection and Quarantine, China National Standardization Administration


GB/T 35273-2020 NATIONAL STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.040 L 80 Replacing GB/T 35273-2017 Information security technology - Personal information security specification ISSUED ON: MARCH 06, 2020 IMPLEMENTED ON: OCTOBER 01, 2020 Issued by: State Administration for Market Regulation; Standardization Administration of PRC. Table of Contents Foreword ... 5  Introduction ... 7  1 Scope ... 8  2 Normative references ... 8  3 Terms and definitions ... 8  4 Basic principles of personal information security ... 12  5 Collection of personal information ... 13  5.1 Legality of collecting personal information ... 13  5.2 Minimum necessary to collect personal information ... 13  5.3 Independent choice of multiple business functions ... 14  5.4 Consent on collecting personal information ... 15  5.5 Personal information protection policy ... 16  5.6 Exceptions with authorized consent ... 18  6 Storage of personal information ... 19  6.1 Minimal storage time of personal information ... 19  6.2 De-identification... 19  6.3 Transmission and storage of personal sensitive information ... 19  6.4 Personal information controller ceases operations ... 20  7 Use of personal information ... 20  7.1 Access control measures for personal information ... 20  7.2 Restrictions on the display of personal information ... 21  7.3 Restrictions on the purpose of using personal information ... 21  7.4 Restrictions on the use of user profiling ... 22  7.5 Use of personalized displays ... 23  7.6 Convergence and fusion of personal information collected for different business purposes ... 24  7.7 Use of information system’s automatic decision-making mechanism ... 24  8 Rights of personal information subjects ... 24  8.1 Inquiry of personal information ... 24  8.2 Correction of personal information ... 25  8.3 Deletion of personal information ... 25  8.4 Personal information subject withdraws consent ... 26  8.5 Personal information subject cancels account ... 26  8.6 Personal information subject obtains a copy of personal information ... 27  8.7 Responding to requests from personal information subjects ... 27  8.8 Complaint management ... 29  9 Entrusted processing, sharing, transfer, public disclosure of personal information ... 29  9.1 Entrusted processing ... 29  9.2 Sharing and transfer of personal information ... 30  9.3 Transfer of personal information during acquisition, merger, reorganization, bankruptcy ... 32  9.4 Public disclosure of personal information ... 32  9.5 Exceptions to prior consent obtained when sharing, transferring or publicly disclosing personal information ... 33  9.6 Joint personal information controller ... 33  9.7 Third-party access management ... 34  9.8 Cross-border transmission of personal information ... 35  10 Handling of personal information security incidents ... 35  10.1 Emergency handling and reporting of personal information security incidents ... 35  10.2 Notification of security incidents ... 36  11 Personal information security management requirements of the organization ... 37  11.1 Identify responsible departments and personnel ... 37  11.2 Personal information security engineering ... 38  11.3 Records for personal information processing activity ... 38  11.4 Conduct personal information’s security impact assessment ... 39  11.5 Data security capabilities ... 40  11.6 Personnel management and training ... 40  11.7 Security audit ... 41  Appendix A (Informative) Examples of personal information ... 42  Appendix B (Informative) Determination of personal sensitive information ... 44  Appendix C (Informative) Method for realizing self-intention of personal information subject ... 46  Appendix D (Informative) Template of personal information protection policy 52  References ... 63  Information security technology - Personal information security specification 1 Scope This standard specifies the principles and security requirements for carrying out personal information processing activities such as collection, storage, use, sharing, transfer, public disclosure, deletion, etc. This standard is applicable to regulate personal information processing activities of various organizations, as well as the supervision, management and evaluation of personal information processing activities by organizations such as competent regulatory authorities and third-party evaluation agencies. 2 Normative references The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this standard. GB/T 25069-2010 Information security technology - Glossary 3 Terms and definitions The terms and definitions as defined in GB/T 25069-2010 as well as the following terms and definitions apply to this document. 3.1 Personal information Various information recorded electronically or in other ways that can identify the identity of a particular natural person or reflect the activities of a particular natural person, alone or in combination with other information. Note 1: Personal information includes name, date of birth, ID number, personal biometric information, address, communication contact information, communication records and content, account password, property information, credit information, whereabouts, accommodation information, health physiology Information, transaction information, etc. The act of gaining control of personal information. Note 1: This includes activities such as being actively provided by personal information subjects, automatic collection activities such as interacting with personal information subjects or recording the activities of personal information subjects, as well as indirectly acquiring personal information through sharing, transfer, and collection of public information. Note 2: If the provider of the product or service provides tools for the use of personal information subjects, whilst the provider does not access personal information, it does not belong to the collection referred to in this standard. For example, after the offline navigation software obtains the personal information subject’s position information from the terminal, if it does not transfer it back to the software provider, it does not belong to the collection of personal information subject’s position information. 3.6 Explicit consent The personal information subject actively makes statements in paper or electronic form in written, oral, etc., or autonomously makes affirmative actions, to make explicit authorization for the specific processing of their personal information. Note: Affirmative actions include active selection of personal information subjects, active clicks on "agree", "register", "send" and "dial", active filling or providing, etc. 3.7 Consent Subjects of personal information make specific authorizations for specific processing of their personal information. Note: Including authorization through active actions (i.e., explicit consent), or authorization through negative omissions (e.g., personal information subjects in the information collection area did not leave the area after being informed of the information collection behavior). 3.8 User profiling The process of collecting, aggregating and analyzing personal information, analyzing or predicting individual characteristics of a specific natural person, such as occupation, economy, health, education, personal preferences, credit, behavior, etc., to form its personal characteristic model. The process of processing personal information so that the personal information subject cannot be identified or associated, meanwhile the processed information cannot be recovered. Note: The information obtained after anonymizing personal information is not personal information. 3.15 De-identification The process of technical processing of personal information, to make it is impossible to identify or associate the personal information subject without resorting to additional information. Note: De-identification is based on the individual, retains the individual granularity, uses pseudonyms, encryption, hash functions and other technical means to replace the identification of personal information. 3.16 Personalized display Based on personal information such as the web browsing history, interests and hobbies, consumption records and habits of a specific personal information subject, the activities of displaying information content and providing search results for goods or services, etc. to the personal information subject. 3.17 Business function The type of service that meets the specific use needs of personal information subjects. Note: Such as map navigation, online car booking, instant messaging, online community, online payment, news information, online shopping, express delivery, transportation ticketing, etc. 4 Basic principles of personal information security Personal information controllers shall follow the legal, legitimate and necessary principles for carrying out personal information processing activities, including: a) Consistent rights and responsibilities - Take technical and other necessary measures to ensure the security of personal information; take a) The type of personal information collected shall be directly related to the realization of the business function of the product or service; direct association means that without the participation of the above personal information, the function of the product or service cannot be realized. b) The frequency of automatically collecting personal information shall be the minimum frequency necessary to realize the business function of the product or service. c) The amount of indirect access to personal information shall be the minimum amount necessary to realize the business function of the product or service. 5.3 Independent choice of multiple business functions When a product or service provides multiple business functions that require the collection of personal information, the personal information controller shall not violate the autonomous will of the personal information subject and force the personal information subject to accept the business function provided by the product or service and the corresponding personal information collection request. Requirements for personal information controllers include: a) The personal information subject shall not be required to accept and authorize the request for the collection of personal information for business functions that have not been applied for or used at one time by bundling various business functions of products or services. b) Affirmative actions independently made by the personal information subject, such as active click, check and fill-in shall be used as the enabling conditions for specific business functions of products or services. The personal information controller shall start collecting personal information only after the personal information subject starts the business function. c) The way or method of closing or withdrawing the business function shall be as convenient as the way or method the personal information subject chooses to use the business function. After the personal information subject chooses to close or withdraw from a specific business function, the personal information controller shall stop the collection of personal information for that business function. d) If the personal information subject does not authorize the consent to use, shut down or withdraw from a specific business function, the authorized consent of the personal information subject shall not be frequently sought. e) If the personal information subject does not authorize the consent to use, shut down or withdraw from a specific business function, it shall not Note 3: When the personal information subject first turns on a product or service, registers an account, etc., it should actively display the main or core content of the personal information protection policy to him in the form of a pop-up window, etc. to help the personal information subject understand the scope and rules for processing personal information of this product or service, thereby deciding whether to continue to use the product or service. 5.6 Exceptions with authorized consent In the following situations, the personal information controller does not need to obtain the consent of the personal information subject to collect and use personal information: a) Relevant to the personal information controller's performance of its obligations under laws and regulations; b) Directly related to national security and national defense security; c) Directly related to public security, public health, major public interests; d) Directly related to criminal investigation, prosecution, trial and judgment execution; e) Out of the protection of the important legal rights and interests of the personal information subject or other individuals' lives, property, etc., but it is difficult to obtain consent; f) The personal information involved is disclosed to the public by the personal information subject; g) Necessary to sign and perform the contract according to the requirements of the personal information subject; Note: The main function of the personal information protection policy is to disclose the scope and rules for the collection and use of personal information by the personal information controller; it should not be regarded as a contract. h) Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels; i) Necessary to maintain the secure and stable operation of the products or services provided, such as discovering and handling failures of products or services; j) The personal information controller is a news organization, meanwhile it is necessary to carry out legal news reports; 1) Only store summary information of personal biometric information; 2) Use personal biometric information directly in the collection terminal to achieve functions such as identity recognition and authentication; 3) When using facial recognition features, fingerprints, palm prints, irises, etc. to realize identity recognition, authentication and other functions, delete the original image wherein the personal biometric information can be extracted. Note 2: The summary information is usually irreversible and cannot be traced back to the original information. Note 3: Except for the situation where the personal information controllers fulfill their obligations under laws and regulations. 6.4 Personal information controller ceases operations When the personal information controller stops operating its products or services, it shall: a) Stop collecting personal information in time; b) Notify the personal information subject in the form of one-by-one delivery or announcement; c) Delete or anonymize the personal information it holds. 7 Use of personal information 7.1 Access control measures for personal information Requirements for personal information controllers include: a) For those authorized to access personal information, a minimum authorized access control strategy shall be established, so that they can only access the minimum necessary personal information required for their duties, meanwhile only have the minimum data operation authority required to complete their duties; b) Set up internal approval processes for important operations of personal information, such as batch modification, copying, downloading and other important operations; c) Separately set the roles of security management personnel, data information can identify the identity of a specific natural person or reflect the activities of a specific natural person, alone or in combination with other information, it shall be considered as personal information. It shall be handled within the scope of the consent obtained when collecting personal information. Note 2: If the personal information generated by processing is personal sensitive information, its processing must meet the requirements for personal sensitive information. 7.4 Restrictions on the use of user profiling Requirements for personal information controllers include: a) The description of the characteristics of the personal information subject in the user profiling shall not: 1) Contains obscenity, pornography, gambling, superstition, terror, violence; 2) Express content that discriminates against ethnicity, race, religion, disability, disease. b) Those who use user profiling in business operations or foreign business cooperation shall not: 1) Infringe upon the lawful rights and interests of citizens, legal persons and other organizations; 2) Endanger national security, honor and interests; incite overturning state power, overthrowing the socialist system; incite to split the country; undermine national unity; promote terrorism, extremism, national hatred, ethnic discrimination; spread violent and obscene pornographic information; make up and disseminate false information to disturb economic and social order. c) In addition to being necessary for the purpose of authorized use of the personal information subject, the use of personal information shall eliminate clear identity orientation and avoid precise positioning to specific individuals. For example, in order to accurately evaluate personal credit status, direct user profiling can be used; for the purpose of pushing commercial advertisements, it should use indirect user profiling. 7.6 Convergence and fusion of personal information collected for different business purposes Requirements for personal information controllers include: a) It shall comply with the requirements of 7.3; b) It shall, according to the purpose for which personal information is aggregated and infused, carry out an impact assessment of personal information security; take effective personal information protection measures. 7.7 Use of information system’s automatic decision-making mechanism The information system used by the personal information controller's business operations shall, when it has an automatic decision-making mechanism and can significantly affect the rights of personal information subjects (for example, automatic determination of personal credit and loan quotas, or automated screening for interviewers, etc.): a) Carry out personal information’s security impact assessment at the planning and design stage or before the first use; take effective measures to protect the personal information subject according to the assessment results; b) Regularly (at least once a year) conduct a personal information’s security impact assessment during the use process; improve the measures for protecting the personal information subject based on the assessment results; c) Provide personal information subjects with complaint channels for automatic decision-making results and support manual review of automatic decision-making results. 8 Rights of personal information subjects 8.1 Inquiry of personal information The personal information controller shall provide the personal information subject with a method to query the following information: 8.6 in a timely manner. It shall, within 30 days or within the time limit prescribed by laws and regulations, make a response and reasonable explanation; meanwhile notify the personal information subject of the resolution of external disputes. b) If interactive pages (such as websites, mobile Internet applications, client software, etc.) are used to provide products or services, it should directly set up convenient interactive pages to provide functions or options, so that personal information subjects can exercise their rights of access, correction, deletion, withdrawal of consent, cancellation of accounts, etc. c) In principle, no fee is charged for reasonable requests; however, for repeated requests within a certain period of time, a certain cost may be charged as appropriate. d) If directly fulfilling the request of the personal information subject requires high costs or causes other significant difficulties, the personal information controller shall provide an alternative method to the personal information subject, to protect the legitimate rights and interests of the personal information subject. e) In the following cases, it may not respond to requests from personal information subjects based on 8.1 ~ 8.6, including: 1) Related to the personal information controller's fulfillment of obligations under laws and regulations; 2) Directly related to national security and national defense security; 3) Directly related to public security, public health, major public interests; 4) Directly related to criminal investigation, prosecution, trial and execution of judgments; 5) The personal information controller has sufficient evidence that the personal information subject is subjectively malicious or abuses his rights; 6) Out of the protection of the significant legal rights and interests of the personal information subject or other individuals' lives, property, etc., but it is difficult to obtain his consent; 7) Responding to the request of the personal information subject will result in serious damage to the legal rights of the personal information subject or other individuals and organizations; 8) Involving trade secrets. personal information, it shall promptly feed back to the personal information controller. 5) No more personal information will be stored when the entrusting relationship is released. d) The personal information controller shall supervise the entrusted party, in a way including but not limited to: 1) Specifying the responsibilities and obligations of the entrusted party through contracts and other means; 2) Auditing the entrusted party. e) The personal information controller shall accurately record and store the entrusted processing of personal information. f) If the personal information controller learns or finds that the entrusted party does not process the personal information in accordance with the entrusted requirements, or fails to effectively fulfill the security protection responsibility for personal information, it shall immediately request the entrusted party to stop the relevant actions; take or request the entrusted party to take effective remedy measures (such as changing passwords, recovering permissions, disconnecting network connections, etc.) to control or eliminate the security risks faced by personal information. When necessary, the personal information controller shall terminate the business relationship with the entrusted party, meanwhile request the entrusted party to delete the personal information obtained from the personal information controller in a timely manner. 9.2 Sharing and transfer of personal information When personal information controllers share and transfer personal information, they shall pay full attention to risks. The sharing and transfer of personal information, not due to acquisition, merger, reorganization, or bankruptcy, shall meet the following requirements: a) Conduct a personal information’s security impact assessment in advance; take effective measures to protect the personal information subject based on the assessment results. b) Inform the personal information subject about the purpose of sharing and transferring personal information, the type of data receiver and possible consequences; obtain the prior authorization of the personal information subject. Except for sharing and transferring personal information that has been de-identified, meanwhile ensuring that the data receiver cannot re- 9.3 Transfer of personal information during acquisition, merger, reorganization, bankruptcy When the personal information controller is subject to changes such as acquisition, merger, reorganization, bankruptcy, etc., the requirements for the personal information controller include: a) Inform relevant information to the personal information subject; b) The changed personal information controller shall continue to fulfill the responsibilities and obligations of the original personal information controller. If the purpose of using personal information is changed, it shall obtain the explicit consent of the personal information subject again; c) If bankruptcy and no undertaking, delete the data. 9.4 Public disclosure of personal information In principle, personal information shall not be publicly disclosed. When the personal information controller is authorized by law or has reasonable grounds for public disclosure, it shall meet the following requirements: a) Conduct a personal information’s security impact assessment in advance; take effective measures to protect the personal information subject based on the assessment results; b) Inform the personal information subject of the purpose and type of public disclosure of personal information; obtain the explicit consent of the personal information subject in advance; c) Before publicly disclosing personal sensitive information, in addition to the content notified in b), the personal information subject shall be informed of the content of personal sensitive information involved; d) Accurately record and store the public disclosure of personal information, including the date, scale, purpose, scope of public disclosure; e) Bear the corresponding responsibility for the damage to the legitimate rights and interests of the personal information subject as caused by the public disclosure of personal information; f) Personal biometric information shall not be publicly disclosed; g) The analysis results of personal sensitive data such as race, ethnicity, political views, religious beliefs of our citizens shall not be publicly information controller shall bear the responsibility for personal information security caused by the third party. Note: If the personal information controller deploys a third-party plug-in that collects personal information in the process of providing products or services (for example, website operators and deployed statistical analysis tools in applications, software development kit SDKs, call map API interface), meanwhile the third party does not separately obtain the consent of the personal information subject to collect personal information, then the personal information controller and the third party are joint personal information controllers at the stage of personal information collection. 9.7 Third-party access management When a personal information controller accesses a thir...... ......


GB/T 35273-2017 GB NATIONAL STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.040 L 80 Information security technology - Personal information security specification ISSUED ON: DECEMBER 29, 2017 IMPLEMENTED ON: MAY 01, 2018 Issued by: General Administration of Quality Supervision, Inspection and Quarantine of PRC; Standardization Administration of PRC. Table of Contents Foreword ... 4  Introduction ... 5  1 Scope ... 6  2 Normative references ... 6  3 Terms and definitions ... 6  4 Basic principles of personal information security ... 9  5 Collection of personal information ... 10  5.1 Legal requirements for collection of personal information ... 10  5.2 Requirements for minimizing the collection of personal information ... 11  5.3 Authorized consent when collecting personal information ... 11  5.4 Exceptions for authorization of consent ... 12  5.5 Explicit consent for the collection of personal sensitive information ... 13  5.6 Content and release of privacy policy ... 13  6 Preservation of personal information ... 15  6.1 Minimizing the retention time of personal information ... 15  6.2 De-identification processing ... 15  6.3 Transmission and storage of personal sensitive information ... 15  6.4 Business suspension of personal data controller ... 16  7 Use of personal information ... 16  7.1 Control measures for access of personal information ... 16  7.2 Display restrictions on personal information ... 17  7.3 Restrictions on the use of personal information ... 17  7.4 Access to personal information ... 18  7.5 Correction of personal information ... 18  7.6 Deletion of personal information ... 18  7.7 Personal data subject withdraws consent ... 19  7.8 Personal data subject cancels account ... 19  7.9 Personal data subject obtains a copy of personal information ... 19  7.10 Constraint of information system’s automatic decision-making ... 20  7.11 Responding to requests of personal data subject ... 20  7.12 Management of appeal ... 21  8 Entrusted processing, sharing, transfer of control, public disclosure of personal information ... 21  8.1 Entrusted processing ... 21  8.2 Sharing and transfer of control of personal information ... 22  8.3 Transfer of control of personal information during acquisition, merger and restructuring23  8.4 Public disclosure of personal information ... 23  8.5 Exceptions to prior authorization of consent, sharing, transfer of control, public disclosure of personal information ... 24  8.6 Common personal data controller ... 24  8.7 Cross-border transmission requirements for personal information ... 25  9 Handling of personal information security incident ... 25  9.1 Emergency response and reporting of security incidents ... 25  9.2 Notification of safety incidents ... 26  10 Management requirements of organization ... 26  10.1 Identify responsible departments and personnel ... 26  10.2 Conducting impact assessment of personal information security ... 27  10.3 Data security capabilities ... 29  10.4 Personnel management and training ... 29  10.5 Security audit ... 29  Appendix A (Informative) Example of personal information ... 31  Appendix B (Informative) Judgement of personal sensitive information ... 33  Appendix C (Informative) Method for guaranteeing the right of personal data subject to choose consent ... 35  Appendix D (Informative) Template of privacy policy ... 41  References ... 52  Information security technology - Personal information security specification 1 Scope This standard specifies the principles and security requirements for the processing activities of collection, preservation, use, sharing, transfer, public disclosure of personal information. This standard is applicable to regulate the personal information processing activities of various organizations, it is also applicable to the supervision, management and evaluation of personal information processing activities by the competent regulatory authorities and third-party evaluation agencies. 2 Normative references The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) are applicable to this standard. GB/T 25069-2010 Information security technology - Glossary 3 Terms and definitions The terms and definitions as defined in GB/T 25069-2010 as well as the following terms and definitions apply to this document. 3.1 Personal information Various information recorded electronically or otherwise that can identify a particular natural person or reflect the activity of a particular natural person, either alone or in combination with other information. Note 1: Personal information includes name, date of birth, ID number, personal biometric information, address, communication contact, communication record and content, account password, property information, credit information, whereabouts, accommodation information, health information, transaction information, etc. software provider, it does not belong to the personal information collection behavior. 3.6 Explicit consent The act of the personal data subject to make a definitive authorization for the specific processing of its personal information through a written statement or taking actively the affirmative action. Note: Affirmative actions include the initiative of the personal data subject to make a statement (electronic or paper form), active check, active click on “agree”, “register”, “send”, “dial” and so on. 3.7 User profiling The process of collecting, gathering, analyzing personal information to make analysis and prediction of the personal characteristics of a particular natural person, such as occupation, economy, health, education, personal preferences, credit, behavior, etc., to form a personal feature model. Note: The process of the direct use of personal information of a specific natural person to form a feature model of the natural person is called a direct user profiling. The use of personal information derived from other sources than a specific natural person, such as the data of the group in which it is located, to form a feature model of the natural person, is called an indirect user profiling. 3.8 Personal information security impact assessment For the personal information processing activities, the process of examining the legal compliance level, determining the various risks that cause damage to the legitimate rights and interests of the personal data subject, evaluating the effectiveness of various measures used to protect the personal data subject. 3.9 Delete The act of removing personal information in a system involved in implementing daily business functions, so that it remains in a state in which it cannot be retrieved or accessed. a) The principle of integration of powers and responsibilities - Undertake the responsibility for the damage caused by the personal information processing activities to the legitimate rights and interests of the personal data subject. b) The principle of clear purpose - Have the legal, legitimate, necessary, clear personal information processing purposes. c) The principle of selective consent - Express the purpose, method, scope, rules, etc. of personal information processing to the personal data subject, to solicit authorization and consent. d) The principle of least sufficiency - Unless otherwise agreed with the personal data subject, the type and amount of the minimum personal information as required to satisfy the purpose of the consent of the personal data subject. After the purpose is achieved, it shall delete the personal information in time according to the agreement. e) The principle of openness and transparency - The scope, purpose, rules, etc. of processing the personal information in a clear, understandable, reasonable manner and accepting external supervision. f) The principle of ensuring security - Have the security capabilities that match the security risks faced and take adequate management measures and techniques, to protect the confidentiality, integrity, availability of personal information. g) The principle of subject participation - Provide personal data subjects with access to, corrections, deletion of their personal information, as well as withdrawal of consent and cancellation of accounts. 5 Collection of personal information 5.1 Legal requirements for collection of personal information Requirements for personal data controllers include: a) It shall not defraud, deceive, or force the personal data subjects to provide their personal information; b) It shall not conceal the functionality of the product or service to collect personal information; c) It shall not obtain personal information from illegal sources; d) It shall not collect the personal information that is clearly prohibited by laws etc. If the personal information processing activities required by the organization to conduct business exceed the scope of the authorization, it shall, within a reasonable period after obtaining the personal information or before processing the personal information, it shall obtain the explicit consent from the personal data subject. 5.4 Exceptions for authorization of consent In the following cases, the personal data controller may collect and use personal information without the authorization of the personal data subject: a) Directly related to national security and national defense security; b) Directly related to public safety, public health, major public interest; c) Directly related to criminal investigation, prosecution, trial, execution of judgments; d) For the purpose of maintaining the material and legal rights, such as the life and property, of the personal data subject or other individuals, but it is difficult to obtain consent; e) The personal information collected is proactively disclosed by the personal data subject to the public; f) Collect personal information from legally publicly disclosed information, such as legitimate news reports, government information disclosure, etc.; g) Where it is necessary to sign and fulfill the contract in accordance with the requirements of the personal data subject; h) Where it is necessary to maintain the safe and stable operation of the products or services provided, such as the discovery, disposal of the faults of products or services; i) The personal data controller is a news unit and where it is necessary for legal news reporting; j) The personal data controller is an academic research institution that de- identifies the personal information contained in the results when conducting statistical or academic research for public interest and providing academic research or description results; k) Other circumstances as specified by laws and regulations. include but is not limited to: 1) The basic situation of the personal data controller, including the registration name, registered address, common business location, contact information of the relevant person in charge; 2) The purpose of collecting and using personal information, as well as the various business functions as covered by the purpose, such as the use of personal information for pushing commercial advertisements, the use of personal information for the formation of direct user profiling and their uses; 3) Personal information collected by each business function, as well as personal information processing rules such as collection method and frequency, storage area, storage period, range of actually collected personal information; 4) The purpose of external sharing, transfer of control, and public disclosure of personal information, the type of personal information involved, the type of third party receiving personal information, the corresponding legal liabilities assumed; 5) Basic principles of personal information security followed, data security capabilities, personal information security measures taken; 6) The rights and implementation mechanisms of the personal data subject, such as access methods, correction methods, deletion methods, methods for canceling accounts, methods for withdrawing consent, methods for obtaining copies of personal information, methods of restraining automatic decision-making of information systems, etc. 7) Security risks that may exist after the provision of personal information, as well as the possible impact of not providing personal information; 8) Channels and mechanisms for handling the inquiry and complaint from the personal data subject, as well as external dispute resolution agencies and contact methods. b) The information notified by the privacy policy shall be true, accurate, complete; c) The content of the privacy policy shall be clear and understandable, in line with common language habits, use standardized figures, diagrams, etc., avoid using ambiguous language, provide abstracts at the beginning, briefly describe the focus of the content; d) The privacy policy shall be publicly available and easy to access, for 6.4 Business suspension of personal data controller When a personal data controller ceases to operate its products or services, it shall: a) Stop the continued collection of personal information in time; b) Notify the personal data subject in the form of one-by-one delivery or announcement; c) Delete or anonymize the personal information held by it. 7 Use of personal information 7.1 Control measures for access of personal information Requirements for personal data controllers include: a) Internal data operators who are authorized to access personal information shall be able to access only the minimum amount of personal information required for their duties, only have the minimum amount of data manipulation required to perform their duties, in accordance with the principle of minimum sufficiency; b) It should set up an internal approval process for important operations of personal information, such as batch modification, copying, downloading, etc.; c) It shall make separate settings for the roles of security administrators, data operators, and auditors; d) If it is necessary to authorize a specific person to handle personal information beyond of authority because of the need of work, it shall be examined and approved by the person responsible for personal information protection or the personal information protection agency, and recorded; Note: For the determination of the person responsible for personal information protection or the organization of personal information protection, see 10.1. e) For the access, modification and other behaviors of personal sensitive information, it should trigger the operation authorization according to the requirements of the business process on the basis of the authority control of the role. For example, a complaint handler can access information copy of the following types of personal information, or directly transmit a copy of the following personal information to a third party if technically feasible: a) Personal basic information, personal ID information; b) Personal health and physiological information, personal education work information. 7.10 Constraint of information system’s automatic decision- making When making decisions that significantly affect the subject matter of a personal data subject based solely on the automatic decision-making of the information system (e.g., determining personal credit and loan quota based on the user profiling, or using the user profiling for interview screening), the personal data controller shall provide a method of appeal to the personal data subject. 7.11 Responding to requests of personal data subject Requirements for personal data controllers include: a) After verifying the identity of the personal data subject, it shall respond promptly to the request of the personal data subject as made based on 7.4 ~ 7.10, reply and make reasonable explanation within 30 days or within the time limit prescribed by laws and regulations, inform the personal data subject of the route to propose externally the dispute resolution; b) In principle, it does not charge for the reasonable request. But for a number of repeated requests within a certain period of time, it may charge a certain cost as appropriate; c) If the direct fulfillment of request from the personal data subject requires high costs or has other significant difficulties, the personal data controller shall provide other alternative methods to the personal data subject, to protect the legitimate rights and interests of the personal data subject; d) The following conditions may not respond to requests from the personal data subject as made based on 7.4 ~ 7.10, including but not limited to: 1) Directly related to national security and national defense security; 2) Directly related to public safety, public health, and major public interests; 3) Directly related to criminal investigation, prosecution, trial and execution of judgments; personal data subject is based on 7.4 ~ 7.10; 4) If the entrusted person is unable to provide sufficient level of security protection or has a security incident in the process of processing personal information, it shall promptly feed back to the personal data controller; 5) Personal information is no longer saved when the entrustment relationship is lifted. d) The personal data controller shall supervise the entrusted person by means of, but not limited to: 1) Specify the responsibilities and obligations of the entrusted person by means of contracts; 2) Audit the entrusted person. e) The personal data controller shall accurately record and maintain the circumstances of the entrusted processing of personal information. 8.2 Sharing and transfer of control of personal information Personal information may not be shared or transferred of control in principle. When personal data controllers need to share and transfer of control, they shall pay full attention to risks. Sharing or transferring of control of personal information, other than due to acquisition, merger, or restructuring, shall comply with the following requirements: a) Conduct impact assessment of personal information security in advance and take effective measures to protect the personal data subject based on the assessment results; b) Inform the personal data subject of the purpose of sharing, transferring of control of the personal information, the type of the data recipient, and obtain the prior authorization from the personal data subject. The exception is the sharing and transferring of control of the de-identified personal information, meanwhile ensuring that the data recipient cannot re-identify the personal data subject; c) Before sharing and transferring of control of personal sensitive information, in addition to the content notified in 8.2b), it shall also inform the personal data subject of the type of personal sensitive information involved, the identity of the data recipient, the data security capabilities, meanwhile obtain the explicit consent from the personal data subject in advance; the content of the personal sensitive information involved; d) Accurately record and maintain the public disclosure of personal information, including the date, size, purpose, scope of public disclosure; e) Bear the corresponding responsibility for causing damage to the legitimate rights and interests of the personal data subject due to the public disclosure of personal information; f) Do not publicly disclose personal biometric information. 8.5 Exceptions to prior authorization of consent, sharing, transfer of control, public disclosure of personal information In the following cases, personal data controllers may share, transfer of control, publicly disclose personal information without prior authorization from the personal data subject: a) Directly related to national security and national defense security; b) Directly related to public safety, public health, and major public interest; c) Directly related to criminal investigation, prosecution, trial and execution of judgments; d) For the purpose of maintaining the material and legal rights of the personal data subject or other individuals, but it is difficult to obtain the consent; e) Personal information that the personal data subject discloses to the public on its own; f) Collect personal information from legally publicly disclosed information, such as legitimate news reports, government information disclosure, other channels and so on. 8.6 Common personal data controller When the personal data controller and the third party are joint personal data controllers (such as the service platform and the contracted merchant on the platform), the personal data controller shall jointly determine the personal information security requirements to be met with the third party through contract or the like, as well as the responsibility and obligation of the individual and the third party in terms of the personal information security, and shall be clearly notified to the personal data subject. a) Establish an impact assessment system for personal information security and conduct impact assessments of personal information security on a regular basis (at least once a year). b) The impact assessment of personal information security shall mainly assess the situation in which the processing activities follow the basic principles of personal information security, as well as the impact of personal information processing activities on the legitimate rights and interests of personal data subjects, including but not limited to: 1) Whether the collection link of personal information follows the principles of clear purpose, selective consent, minimum sufficiency; 2) Whether the processing of personal information may adversely affect the legitimate rights and interests of the personal data subject, including whether it will endanger personal and property safety, damage personal reputation and physical and mental health, lead to discriminatory treatment; 3) The effectiveness of personal information security measures; 4) The risk of re-identifying the personal data subject from the anonymized or de-identified data set; 5) The possible adverse effects of sharing, transferring of control, publicly disclosing personal information on the legitimate rights and interests of the personal data subject; 6) In the event of a security incident, the adverse effect on the legitimate rights and interests of the personal data subject. c) In case of new requirements by laws and regulations, significant change of business models, information systems, operating environments, or the occurrence of significant personal information security incident, it shall carry out the impact assessment of personal information security again. d) Form an impact assessment report of personal information security and take measures based on this to protect the personal data subject, to reduce the risk to an acceptable level. e) Properly retain an impact assessment report of personal information security, to ensure that it may be accessed by relevant parties and made public in an appropriate form. 10.3 Data security capabilities Personal data controllers shall, according to the requirements of relevant national standards, establish appropriate data security capabilities and implement necessary management and technical measures, to prevent leakage, damage, loss of personal information. 10.4 Personnel management and training Requirements for personal data controllers include: a) It shall sign a confidentiality agreement with relevant personnel engaged in the post of personal information processing, conduct background checks on a large number of persons who have access to personal sensitive information; b) It shall define the security duties of the internal posts involving personal information processing, as well as penalty mechanism for security incidents; c) It shall request the relevant personnel on the personal information processing position to continue to perform the confidentiality obligation when transferring the post or terminating the labor contract; d) It shall identify the personal information security requirements that external service personnel who may access personal information shall comply with, sign a confidentiality agreement with them, carry out supervision; e) It shall, at regular interval (at least once a year) or in the event of major changes in the privacy policy, carry out information security training and assessment for the relevant personal in the personal information processing positions, to ensure that the relevant personal are proficient in privacy policies and related procedures. 10.5 Security audit Requirements for personal data controllers include: a) It shall audit the privacy policy and related procedures, as well as the effectiveness of security measures; b) It shall establish an automated audit system, to monitor and record personal information processing activities; c) The records resulting from the audit process shall support the handling of Appendix B (Informative) Judgement of personal sensitive information Personal sensitive information refers to personal information that, if leaked, illegally provided or misused, may endanger personal and property safety, may easily cause damage or discriminatory treatment to personal reputation, physical and mental health. Usually, the personal information of children under the age of 14 and the privacy information of natural persons are personal sensitive information. It may be judged from the following points whether it is personal sensitive information. Disclosure: Once the personal information is disclosed, it will cause the personal data subject and the organizations and institutions that collect and use the personal information to lose control of the personal information, resulting in the uncontrollable scope and use of the personal information. Certain personal information may be directly used in violation of the willingness of the personal data subject or be subjected to associated analysis with other information, which may pose a significant risk to the mainstay interest of the personal data subject and shall be determined as personal sensitive information. For example, a copy of the ID card of the personal data subject is used by others for the real- name registration of the mobile phone number card, the bank account opening card, and the like. Illegal provision: If certain personal information may cause significant risks to the subject matter of personal data subject due to the spread outside the scope of ...... ......

Similar standards: GB/T 35274-2023  GB/T 35282-2023  
Similar PDFs (Auto-delivered in 9 seconds): GB/T 35273-2020  GB/T 35273-2017  GB/T 34953.4-2020  GB/T 34953.2-2018