Path: Home > GB/T > Page728 > GB/T 37932-2025 || Home > Standard_List > GB/T > Page728 > GB/T 37932-2025
Price & DeliveryUS$419.00 · In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 37932-2025: Data security technology - Security requirements for data transaction service Status: Valid
GB/T 37932: Evolution and historical versions
| Std ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status |
| GB/T 37932-2025 | English | 419 |
Add to Cart
|
4 days [Need to translate]
|
Data security technology - Security requirements for data transaction service
| Valid |
| GB/T 37932-2019 | English | 199 |
Add to Cart
|
3 days [Need to translate]
|
Information security technology - Security requirements for data transaction service
| Valid |
Standard similar to GB/T 37932-2025 GB/T 37985 | GB/T 37988 | GB/T 37973 | GB/T 37933 | GB/T 37931 |
Basic data | Standard ID | GB/T 37932-2025 (GB/T37932-2025) | | Description (Translated English) | Data security technology - Security requirements for data transaction service | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.030 | | Word Count Estimation | 20,269 | | Date of Issue | 2025-12-02 | | Date of Implementation | 2026-07-01 | | Older Standard (superseded by this standard) | GB/T 37932-2019 | | Issuing agency(ies) | State Administration for Market Regulation, Standardization Administration of China |
GB/T 37932-2025: Data security technology - Security requirements for data transaction service---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.030
CCSL80
National Standards of the People's Republic of China
Replaces GB/T 37932-2019
Data security technology and security requirements for data transaction services
Published on 2025-12-02
Implemented on July 1, 2026
State Administration for Market Regulation
The State Administration for Standardization issued a statement.
Table of contents
Preface III
1.Scope 1
2 Normative References 1
3.Terms and Definitions 1
4 General Rules 3
4.1 Data Transaction Service Reference Model 3
4.2 Data Transaction Process 3
4.3 Data Transaction Targets 4
5.Data Transaction Security Principles 4.
6.Security Requirements for Data Transaction Service Participants 5
6.1 Basic Requirements 5
6.2 Data Provider 5
6.3 Data Demand 5
6.4 Data vendors and third-party professional data service providers 6
6.5 Data trading institutions 7
7.Security requirements for data trading platforms 8.
7.1 Basic Requirements 8
7.2 Transaction Data Security Protection 8
7.3 Security Controls During the Transaction Process 8
7.4 Transaction Security Audit 9
8.Security requirements for data transaction targets 9.
8.1 Prohibited Data Transactions 9
8.2 Data quality compliance 9
8.3 Classification and Hierarchical Protection of Transaction Data 10
9.Security requirements for data transaction processes 10.
9.1 Main entities move in, register, and sign their names 10
9.2 Transaction negotiation and order signing 11
9.3 Product delivery and transaction settlement 11
9.4 Transaction Completion, Supervision and Maintenance 12
Appendix A (Informative) Example 13 of Prohibited Trading Data
A.1 Data that endangers national security and social stability 13
A.2 Data involving individual rights 13
A.3 Data involving corporate equity 13
Reference 14
Foreword
This document complies with the provisions of GB/T 1.1-2020 "Standardization Work Guidelines Part 1.Structure and Drafting Rules of Standardization Documents".
Drafting.
This document supersedes GB/T 37932-2019 "Information Security Technology - Security Requirements for Data Transaction Services". It is consistent with GB/T 37932-
Compared to.2019, aside from structural adjustments and editorial changes, the main technical changes are as follows.
a) The terms “data transaction,” “data provider,” “data demander,” “data transaction service,” and “data transaction process” and their definitions have been changed (see [link]).
3.3, 3.4, 3.5, 3.9, 3.15 (and 3.1, 3.2, 3.3, 3.4, 3.10 in the.2019 edition).
b) Change the term "data trading service institution" to "data trading institution" and "data trading service platform" to "data trading platform".
The definition of "台" has been changed (see 3.6, 3.10, and 3.5 and 3.6 in the.2019 version).
c) The terms “online data delivery,” “offline data delivery,” “managed data delivery,” and “critical data,” along with their definitions, have been removed (see.2019).
Versions 3.7, 3.8, 3.9, and 3.11);
d) Added the terms "data resources," "data vendors," "third-party professional data service providers," "on-exchange data trading," and "off-exchange data trading."
"Data transaction service participants," "data transaction subject," and "delivery" and their definitions (see 3.1, 3.7, 3.8, 3.11, 3.12, 3.13)
3.14, 3.16);
e) The reference model for data transaction activities in the "General Rules" has been modified (see 4.1,.2019 version 4.1);
f) Added content such as "Data Transaction Process" and "Data Transaction Subject" (see 4.2, 4.3);
g) The "Data Transaction Security Principles" have been amended, and related content has been changed (see Chapter 5, 4.2 of the.2019 edition);
h) Added "Basic Requirements for Participants in Data Transaction Services" and "Requirements for Data Vendors and Third-Party Professional Data Service Providers".
(See 6.1, 6.4);
i) The requirements for "data providers" and "data demanders" have been revised (see 6.2, 6.3, and 5.1 and 5.2 in the.2019 version);
j) The requirements for "data trading institutions" have been revised (see 6.5, 5.3.1 and 5.3.2 of the.2019 version);
k) Change "Security Requirements for Data Transaction Service Platforms" to "Security Requirements for Data Transaction Platforms" (see Chapter 7, 5.3.3 of the.2019 edition);
l) Change "Security of Transaction Objects" to "Security Requirements for Data Transaction Targets" (see Chapter 8, Chapter 6 of the.2019 edition);
m) The "Prohibited Transaction Data" section has been modified, and "Appendix A. Examples of Prohibited Transaction Data" has been added (see 8.1, Appendix A, 6.1 of the.2019 edition);
n) Change "Data Quality" to "Data Quality Compliance" (see 8.2, 6.2 in the.2019 version);
o) "Personal Information Protection" and "Important Data Protection" have been removed (see sections 6.3 and 6.4 of the.2019 version);
p) Added requirements related to "classification and hierarchical protection of transaction data" (see 8.3);
q) Change "Security of Data Transaction Processes" to "Security Requirements for Data Transaction Processes" (see Chapter 9, Chapter 7 of the.2019 edition);
r) The requirements related to "transaction application" and "transaction implementation" have been removed (see 7.1 and 7.3 in the.2019 version);
s) Added requirements related to "entity entry", "registration and listing", "order signing", "product delivery", "transaction settlement" and "supervision and maintenance" (see
9.1, 9.2, 9.3, 9.4);
t) The requirements for “transaction negotiation” and “transaction completion” have been changed (see 9.2, 9.4, and 7.2, 7.4 in the.2019 version).
Please note that some content in this document may involve patents. The issuing organization of this document assumes no responsibility for identifying patents.
This document was proposed and is under the jurisdiction of the National Cybersecurity Standardization Technical Committee (SAC/TC260).
This document was drafted by. China Electronics Technology Standardization Institute, Shanghai Data Exchange Co., Ltd., and Beijing International Big Data Exchange.
Limited Liability Company, Huakong Qingjiao Information Technology (Beijing) Co., Ltd., Zhejiang University Computer Innovation Technology Research Institute, Zhejiang Provincial Digital Economy
Development Center, Shanghai Information Security Evaluation and Certification Center, Zhejiang Big Data Exchange Center Co., Ltd., Beijing Municipal Bureau of Economy and Information Technology Network
Security Management Center, Alibaba Cloud Computing Co., Ltd., Ant Group Co., Ltd., Tsinghua University, East China Jiangsu Big Data Exchange Center
Joint-stock company, China Cybersecurity Review and Certification and Market Supervision Big Data Center, Guangzhou Data Exchange Co., Ltd., National Computer...
Network Emergency Response Technical Team/Coordination Center, China Academy of Cyberspace Studies, Shaanxi Provincial Institute of Information Technology, Zhejiang University, Global Data Source Center
(Guangzhou Nansha) Co., Ltd., Guangzhou Software Application Technology Research Institute.
The main drafters of this document are. Fan Kefeng, Hu Ying, Li Haidong, Yao Xiangzhen, Su Dan, Shangguan Xiaoli, Wu Xiaotian, Lang Peipei, Hao Chunliang, and Jin Chen.
Liu Xing, Ren Kui, Xing Hua, Tian Yanxiang, Jin Mingyan, Chen Yuwei, Li Yuan, Zhang Yuguang, Li Shiqi, Bai Xiaoyuan, Wang Bingzheng, Wang Mingyan, Sheng Jing, Wu Bo,
Tang Hanlin, Liu Bin, Gao Xiang, Wang Hui, Wang Pu, Yue Xiyan, Huang Qing, Zhang Yong, Liu Jinfei, Zhang Min, Li Jieming, Yu Fang, Zheng Binbin, Peng Qin, Kong Jun.
The release history of this document and the document it replaces is as follows.
---First published in.2019 as GB/T 37932-2019;
---This is the first revision.
Data security technology and security requirements for data transaction services
1 Scope
This document specifies the security requirements for data transaction services, including the security of data transaction participants, transaction platforms, transaction targets, and the transaction process.
All requirements.
This document applies to data providers, data users, data trading institutions, data vendors, and third-party professional data service providers to standardize their data exchange practices.
Easy-to-use activities are also applicable to regulatory authorities and assessment agencies for supervising, managing, and assessing the security of data transaction services.
2 Normative references
The contents of the following documents, through normative references within the text, constitute essential provisions of this document. Dated citations are not included.
For references to documents, only the version corresponding to that date applies to this document; for undated references, the latest version (including all amendments) applies.
This document.
GB/T 22239-2019 Information Security Technology - Basic Requirements for Network Security Level Protection
GB/T 25069 Information Security Technical Terminology
GB/T 36343 Description of transaction data in information technology data trading service platforms
GB/T 37988 Information Security Technology - Data Security Capability Maturity Model
GB/T 43697 Data Security Technology - Data Classification and Grading Rules
3 Terms and Definitions
The terms and definitions defined in GB/T 25069 and the following terms and definitions apply to this document.
3.1
data resources
A general term for data with the potential to create value.
Note. This usually refers to a collection of data that is recorded and stored electronically, is machine-readable, and can be reused by the public.
3.2
Data products and data services that are created based on data processing and meet specific needs.
3.3
data transaction
A transaction between a data provider and a data consumer, where data in a specific form is the subject of the transaction, and currency or other equivalents are used as consideration.
Behavior.
3.4
data supplier
supplier
Organizations that sell and provide data products and services in data transactions.
3.5
Data demander
Demander
Organizations that purchase and use data products and services in data transactions.

Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 37932-2025_English be delivered?Answer: Upon your order, we will start to translate GB/T 37932-2025_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 37932-2025_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 37932-2025_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. Question 5: Should I purchase the latest version GB/T 37932-2025?Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 37932-2025 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.
|