|
US$339.00 ยท In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 41807-2022: Information security technology - Security requirements of voiceprint recognition data Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 41807-2022 | English | 339 |
Add to Cart
|
4 days [Need to translate]
|
Information security technology - Security requirements of voiceprint recognition data
| Valid |
GB/T 41807-2022
|
PDF similar to GB/T 41807-2022
Basic data | Standard ID | GB/T 41807-2022 (GB/T41807-2022) | | Description (Translated English) | Information security technology - Security requirements of voiceprint recognition data | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.030 | | Word Count Estimation | 18,159 | | Date of Issue | 2022-10-14 | | Date of Implementation | 2023-05-01 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 41807-2022: Information security technology - Security requirements of voiceprint recognition data ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology -- Security requirements of voiceprint recognition data
ICS 35.030
CCSL80
National Standards of People's Republic of China
Information Security Technology
Voiceprint Recognition Data Security Requirements
Published on 2022-10-12
2023-05-01 Implementation
State Administration for Market Regulation
Released by the National Standardization Administration
directory
Preface I
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Overview 2
4.1 Typical Scenario 2
4.2 Typical risks3
5 Basic Safety Requirements 3
6 Data collection4
6.1 General requirements 4
6.2 Identification Application 5
6.3 Non-identification applications5
6.4 Scientific experiments and tests 5
7 Data Storage and Transmission 6
7.1 General requirements 6
7.2 Identification application 6
7.3 Non-Identification Applications 6
8 Data usage 6
8.1 General requirements 6
8.2 Scientific experiments and tests 6
9 Data provided 7
9.1 General requirements7
9.2 Identification application 7
9.3 Non-Identifier Applications 7
9.4 Scientific experiments and tests 7
10 Data Disclosure7
11 Data deletion8
11.1 General requirements 8
11.2 Scientific experiments and tests 8
Appendix A (Informative) Voiceprint Recognition Data Security Risk Analysis 9
Appendix B (Informative) Example of Informed Consent 10
Reference 15
foreword
This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules of Standardization Documents"
drafted.
Please note that some content of this document may be patented. The issuing agency of this document assumes no responsibility for identifying patents.
This document is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260).
This document is drafted by. Beijing Deyi Yintong Technology Co., Ltd., China Electronics Standardization Institute, Tsinghua University, Beijing Microelectronics Technology Co., Ltd.
Call Technology Co., Ltd., National Certification Technology (Beijing) Co., Ltd., Beijing Baidu Netcom Technology Co., Ltd., Beijing Shuguang Yitong Technology Co., Ltd.
Company, Bank of Xi'an Co., Ltd., iFLYTEK Co., Ltd., Yuncong Technology Group Co., Ltd., Hisense Group Holding Shares
Co., Ltd., Beijing Eyes Technology Co., Ltd., China Academy of Information and Communications Technology, Beijing Zhongdun Anxin Technology Development Co., Ltd., the third Ministry of Public Security
Research Institute, National Industrial Information Security Development Research Center, Beijing Software Product Quality Inspection Center, Beijing Yuanjian Information Technology Co., Ltd.
Company, Beijing UnionPay Gold Card Technology Co., Ltd., Jingdong Technology Holdings Co., Ltd., Xiamen Tiancong Intelligent Software Co., Ltd., Ant Technology Collection
Group Co., Ltd., Beijing Xiaomi Mobile Software Co., Ltd., Lenovo (Beijing) Co., Ltd., China Telecom Group Co., Ltd., Xiamen University
Xue, Shanghai Zhangshu Technology Co., Ltd., Beijing Sound Intelligence Technology Co., Ltd., Galaxy Waterdrop Technology (Beijing) Co., Ltd., Datatang (Beijing) Technology
Co., Ltd.
The main drafters of this document. Zheng Fang, Wu Xiaojun, Hao Chunliang, Huang Xiaoni, Wang Xiaogang, Xu Xiaogeng, Xu Mingxing, Hu Ying, Liu Yiheng, Li Jun,
Wang Yang, Yu Xueping, Changsun Fei, Ma Wanzhong, Li Jun, Gao Xuesong, Yang Chunlin, Fu Shan, Wang Kailin, Li Meitao, Kong Hao, Rong Ling, You Hanxu, Zheng Rong,
Li Bowen, Yang Bo, Fu Li, Lei Wentian, Lin Guanchen, Li Mingju, Li Ruxin, Zeng Ranran, Hong Qingyang, Gao Xing, Chen Xiaoliang, Zhang Man, Gu Xiaoxia,
Wang Daliang, Cheng Xingliang, Chen Cong, Lin Yanghuichen, Zhang Jin.
Information Security Technology
Voiceprint Recognition Data Security Requirements
1 Scope
This document stipulates the rights of data processors in the collection, storage, use, transmission, provision, disclosure, deletion and other activities of voiceprint recognition data.
safety requirements.
This document applies to standardize the data processing behavior of data processors for voiceprint recognition.
2 Normative references
The contents of the following documents constitute essential provisions of this document through normative references in the text. Among them, dated citations
documents, only the version corresponding to that date applies to this document; for undated references, the latest edition (including all amendments) applies to
this document.
GB/T 25069 Information Security Technical Terminology
GB/T 35273 Information Security Technology Personal Information Security Specification
GB/T 37988 Information Security Technology Data Security Capability Maturity Model
GB/T 39335 Information Security Technology Personal Information Security Impact Assessment Guide
GB/T 40660 Information Security Technology Basic Requirements for Biometric Information Protection
GB/T 41479 Information Security Technology Network Data Processing Security Requirements
3 Terms and Definitions
GB/T 25069, GB/T 35273, GB/T 37988, GB/T 40660 and GB/T 41479 and the following terms and definitions
applies to this document.
3.1
The specific natural person corresponding to the voiceprint identification data.
Note. This document is referred to as "data subject".
3.2
speech sample speechsample
An analog or digital representation of speech.
Note. The voiceprint of the data subject is contained in the voice samples collected directly from the data subject.
3.3
voiceprint
The general term for the biological characteristics and behavioral characteristics contained in human speech that can be used to characterize and identify data subjects.
3.4
Voice samples from which voiceprints can be extracted.
Note 1.If the voice samples collected in the intelligent voice interaction process have not undergone special processing, voiceprints can be extracted, which belong to voiceprint voice samples.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 41807-2022_English be delivered?Answer: Upon your order, we will start to translate GB/T 41807-2022_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 41807-2022_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 41807-2022_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|