HOME Cart(0) Quotation About-Us Policies PDFs Standard-List
www.ChineseStandard.net Database: 221938 (17 Apr 2026)
Path: Home > GB/T > Page728 > GB/T 37932-2025 || Home > Standard_List > GB/T > Page728 > GB/T 37932-2025

GB/T 37932-2025 PDF English

Price & Delivery

US$419.00 · In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 37932-2025: Data security technology - Security requirements for data transaction service
Status: Valid

GB/T 37932: Evolution and historical versions

Std IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)Status
GB/T 37932-2025English419 Add to Cart 4 days [Need to translate] Data security technology - Security requirements for data transaction service Valid
GB/T 37932-2019English199 Add to Cart 3 days [Need to translate] Information security technology - Security requirements for data transaction service Valid

Standard similar to GB/T 37932-2025

GB/T 37985 | GB/T 37988 | GB/T 37973 | GB/T 37933 | GB/T 37931 |

Basic data

Standard ID GB/T 37932-2025 (GB/T37932-2025)
Description (Translated English) Data security technology - Security requirements for data transaction service
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.030
Word Count Estimation 20,269
Date of Issue 2025-12-02
Date of Implementation 2026-07-01
Older Standard (superseded by this standard) GB/T 37932-2019
Issuing agency(ies) State Administration for Market Regulation, Standardization Administration of China

GB/T 37932-2025: Data security technology - Security requirements for data transaction service

---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.030 CCSL80 National Standards of the People's Republic of China Replaces GB/T 37932-2019 Data security technology and security requirements for data transaction services Published on 2025-12-02 Implemented on July 1, 2026 State Administration for Market Regulation The State Administration for Standardization issued a statement.

Table of contents

Preface III 1.Scope 1 2 Normative References 1 3.Terms and Definitions 1 4 General Rules 3 4.1 Data Transaction Service Reference Model 3 4.2 Data Transaction Process 3 4.3 Data Transaction Targets 4 5.Data Transaction Security Principles 4. 6.Security Requirements for Data Transaction Service Participants 5 6.1 Basic Requirements 5 6.2 Data Provider 5 6.3 Data Demand 5 6.4 Data vendors and third-party professional data service providers 6 6.5 Data trading institutions 7 7.Security requirements for data trading platforms 8. 7.1 Basic Requirements 8 7.2 Transaction Data Security Protection 8 7.3 Security Controls During the Transaction Process 8 7.4 Transaction Security Audit 9 8.Security requirements for data transaction targets 9. 8.1 Prohibited Data Transactions 9 8.2 Data quality compliance 9 8.3 Classification and Hierarchical Protection of Transaction Data 10 9.Security requirements for data transaction processes 10. 9.1 Main entities move in, register, and sign their names 10 9.2 Transaction negotiation and order signing 11 9.3 Product delivery and transaction settlement 11 9.4 Transaction Completion, Supervision and Maintenance 12 Appendix A (Informative) Example 13 of Prohibited Trading Data A.1 Data that endangers national security and social stability 13 A.2 Data involving individual rights 13 A.3 Data involving corporate equity 13 Reference 14

Foreword

This document complies with the provisions of GB/T 1.1-2020 "Standardization Work Guidelines Part 1.Structure and Drafting Rules of Standardization Documents". Drafting. This document supersedes GB/T 37932-2019 "Information Security Technology - Security Requirements for Data Transaction Services". It is consistent with GB/T 37932- Compared to.2019, aside from structural adjustments and editorial changes, the main technical changes are as follows. a) The terms “data transaction,” “data provider,” “data demander,” “data transaction service,” and “data transaction process” and their definitions have been changed (see [link]). 3.3, 3.4, 3.5, 3.9, 3.15 (and 3.1, 3.2, 3.3, 3.4, 3.10 in the.2019 edition). b) Change the term "data trading service institution" to "data trading institution" and "data trading service platform" to "data trading platform". The definition of "台" has been changed (see 3.6, 3.10, and 3.5 and 3.6 in the.2019 version). c) The terms “online data delivery,” “offline data delivery,” “managed data delivery,” and “critical data,” along with their definitions, have been removed (see.2019). Versions 3.7, 3.8, 3.9, and 3.11); d) Added the terms "data resources," "data vendors," "third-party professional data service providers," "on-exchange data trading," and "off-exchange data trading." "Data transaction service participants," "data transaction subject," and "delivery" and their definitions (see 3.1, 3.7, 3.8, 3.11, 3.12, 3.13) 3.14, 3.16); e) The reference model for data transaction activities in the "General Rules" has been modified (see 4.1,.2019 version 4.1); f) Added content such as "Data Transaction Process" and "Data Transaction Subject" (see 4.2, 4.3); g) The "Data Transaction Security Principles" have been amended, and related content has been changed (see Chapter 5, 4.2 of the.2019 edition); h) Added "Basic Requirements for Participants in Data Transaction Services" and "Requirements for Data Vendors and Third-Party Professional Data Service Providers". (See 6.1, 6.4); i) The requirements for "data providers" and "data demanders" have been revised (see 6.2, 6.3, and 5.1 and 5.2 in the.2019 version); j) The requirements for "data trading institutions" have been revised (see 6.5, 5.3.1 and 5.3.2 of the.2019 version); k) Change "Security Requirements for Data Transaction Service Platforms" to "Security Requirements for Data Transaction Platforms" (see Chapter 7, 5.3.3 of the.2019 edition); l) Change "Security of Transaction Objects" to "Security Requirements for Data Transaction Targets" (see Chapter 8, Chapter 6 of the.2019 edition); m) The "Prohibited Transaction Data" section has been modified, and "Appendix A. Examples of Prohibited Transaction Data" has been added (see 8.1, Appendix A, 6.1 of the.2019 edition); n) Change "Data Quality" to "Data Quality Compliance" (see 8.2, 6.2 in the.2019 version); o) "Personal Information Protection" and "Important Data Protection" have been removed (see sections 6.3 and 6.4 of the.2019 version); p) Added requirements related to "classification and hierarchical protection of transaction data" (see 8.3); q) Change "Security of Data Transaction Processes" to "Security Requirements for Data Transaction Processes" (see Chapter 9, Chapter 7 of the.2019 edition); r) The requirements related to "transaction application" and "transaction implementation" have been removed (see 7.1 and 7.3 in the.2019 version); s) Added requirements related to "entity entry", "registration and listing", "order signing", "product delivery", "transaction settlement" and "supervision and maintenance" (see 9.1, 9.2, 9.3, 9.4); t) The requirements for “transaction negotiation” and “transaction completion” have been changed (see 9.2, 9.4, and 7.2, 7.4 in the.2019 version). Please note that some content in this document may involve patents. The issuing organization of this document assumes no responsibility for identifying patents. This document was proposed and is under the jurisdiction of the National Cybersecurity Standardization Technical Committee (SAC/TC260). This document was drafted by. China Electronics Technology Standardization Institute, Shanghai Data Exchange Co., Ltd., and Beijing International Big Data Exchange. Limited Liability Company, Huakong Qingjiao Information Technology (Beijing) Co., Ltd., Zhejiang University Computer Innovation Technology Research Institute, Zhejiang Provincial Digital Economy Development Center, Shanghai Information Security Evaluation and Certification Center, Zhejiang Big Data Exchange Center Co., Ltd., Beijing Municipal Bureau of Economy and Information Technology Network Security Management Center, Alibaba Cloud Computing Co., Ltd., Ant Group Co., Ltd., Tsinghua University, East China Jiangsu Big Data Exchange Center Joint-stock company, China Cybersecurity Review and Certification and Market Supervision Big Data Center, Guangzhou Data Exchange Co., Ltd., National Computer... Network Emergency Response Technical Team/Coordination Center, China Academy of Cyberspace Studies, Shaanxi Provincial Institute of Information Technology, Zhejiang University, Global Data Source Center (Guangzhou Nansha) Co., Ltd., Guangzhou Software Application Technology Research Institute. The main drafters of this document are. Fan Kefeng, Hu Ying, Li Haidong, Yao Xiangzhen, Su Dan, Shangguan Xiaoli, Wu Xiaotian, Lang Peipei, Hao Chunliang, and Jin Chen. Liu Xing, Ren Kui, Xing Hua, Tian Yanxiang, Jin Mingyan, Chen Yuwei, Li Yuan, Zhang Yuguang, Li Shiqi, Bai Xiaoyuan, Wang Bingzheng, Wang Mingyan, Sheng Jing, Wu Bo, Tang Hanlin, Liu Bin, Gao Xiang, Wang Hui, Wang Pu, Yue Xiyan, Huang Qing, Zhang Yong, Liu Jinfei, Zhang Min, Li Jieming, Yu Fang, Zheng Binbin, Peng Qin, Kong Jun. The release history of this document and the document it replaces is as follows. ---First published in.2019 as GB/T 37932-2019; ---This is the first revision. Data security technology and security requirements for data transaction services

1 Scope

This document specifies the security requirements for data transaction services, including the security of data transaction participants, transaction platforms, transaction targets, and the transaction process. All requirements. This document applies to data providers, data users, data trading institutions, data vendors, and third-party professional data service providers to standardize their data exchange practices. Easy-to-use activities are also applicable to regulatory authorities and assessment agencies for supervising, managing, and assessing the security of data transaction services.

2 Normative references

The contents of the following documents, through normative references within the text, constitute essential provisions of this document. Dated citations are not included. For references to documents, only the version corresponding to that date applies to this document; for undated references, the latest version (including all amendments) applies. This document. GB/T 22239-2019 Information Security Technology - Basic Requirements for Network Security Level Protection GB/T 25069 Information Security Technical Terminology GB/T 36343 Description of transaction data in information technology data trading service platforms GB/T 37988 Information Security Technology - Data Security Capability Maturity Model GB/T 43697 Data Security Technology - Data Classification and Grading Rules

3 Terms and Definitions

The terms and definitions defined in GB/T 25069 and the following terms and definitions apply to this document. 3.1 data resources A general term for data with the potential to create value. Note. This usually refers to a collection of data that is recorded and stored electronically, is machine-readable, and can be reused by the public. 3.2 Data products and data services that are created based on data processing and meet specific needs. 3.3 data transaction A transaction between a data provider and a data consumer, where data in a specific form is the subject of the transaction, and currency or other equivalents are used as consideration. Behavior. 3.4 data supplier supplier Organizations that sell and provide data products and services in data transactions. 3.5 Data demander Demander Organizations that purchase and use data products and services in data transactions.
GB/T 37932-2025 English cover page

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 37932-2025_English be delivered?

Answer: Upon your order, we will start to translate GB/T 37932-2025_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 37932-2025_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 37932-2025_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.

Question 5: Should I purchase the latest version GB/T 37932-2025?

Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 37932-2025 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.
Terms of Service | Contact Information | Privacy Policy | Refund Policy | Shipping Policy