HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (12 Oct 2025)

GB/T 43697-2024 English PDF

US$619.00 · In stock
Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 43697-2024: Data security technology - Rules for data classification and grading
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 43697-2024English619 Add to Cart 5 days [Need to translate] Data security technology - Rules for data classification and grading Valid GB/T 43697-2024

PDF similar to GB/T 43697-2024


Standard similar to GB/T 43697-2024

GB/T 43779   GB/T 43696   GB/T 42453   GB/T 43694   

Basic data

Standard ID GB/T 43697-2024 (GB/T43697-2024)
Description (Translated English) Data security technology - Rules for data classification and grading
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.030
Word Count Estimation 30,339
Date of Issue 2024-03-15
Date of Implementation 2024-10-01
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration

GB/T 43697-2024: Data security technology - Rules for data classification and grading

---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.030 CCSL80 National Standards of People's Republic of China Data security technology data classification and grading rules Released on 2024-03-15 2024-10-01 Implementation State Administration for Market Regulation The National Standardization Administration issued

Table of Contents

Preface III Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Basic Principles 2 5 Data classification rules 2 5.1 Data Classification Framework 2 5.2 Data Classification Method 3 6 Data Classification Rules 3 6.1 Data Classification Framework 3 6.2 Data classification method 4 6.3 Data classification elements 4 6.4 Data Impact Analysis 4 6.5 Level determination rules 5 6.6 Comprehensive determination level 6 7 Data classification and grading process 7 7.1 Industry data classification and grading process 7 7.2 Processor data classification and grading process 7 Appendix A (Informative) Data Classification Reference Based on Description Object and Data Subject 8 Appendix B (Informative) Examples of Personal Information Classification 9 Appendix C (Informative) Common considerations for identifying data classification elements 11 Appendix D (Informative) Common Considerations for Safety Risks 13 Appendix E (Informative) Factors to be considered for impact 14 Appendix F (Informative) Impact Level Reference Example 16 Appendix G (Normative) Guidance on Identifying Important Data 18 Appendix H (Informative) General Data Classification Reference 20 Appendix I (Informative) Derived Data Classification Reference 22 Appendix J (Informative) Dynamic Update Scenarios Reference 23 Reference 24

Foreword

This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents" Drafting. Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents. This document was proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260). This document was drafted by. China Electronics Technology Standardization Institute, University of Science and Technology of China, National Computer Network Emergency Response Technical Processing Coordination Center, National Information Technology Security Research Center, China Information Security Evaluation Center, China Cyberspace Research Institute, China Cyber Security Review Center Technology and Certification Center, National Industrial Information Security Development Research Center, National Information Center, Beijing Municipal Government Information Security Center (Beijing Beijing Information Security Evaluation Center), the Third Research Institute of the Ministry of Public Security, China Academy of Information and Communications Technology, Tsinghua University, China People's Public Security University, China Academy of Science and Technology Software Research Institute of the College, Ministry of Transport Science and Technology Research Institute, Hangzhou Anheng Information Technology Co., Ltd., 360 Digital Security Technology Group Co., Ltd., Beijing Douyin Information Service Co., Ltd., Beijing Kuaishou Technology Co., Ltd., China Nuclear Energy Association, China Petrochemical Corporation Co., Ltd., China UnionPay Co., Ltd., China Postal Savings Bank Co., Ltd., Alibaba (Beijing) Software Services Co., Ltd. Ant Group Co., Ltd., Huawei Technologies Co., Ltd., Beijing Baidu Netcom Technology Co., Ltd., China Mobile Communications Group Co., Ltd. Co., Ltd., China Telecom Group Co., Ltd., Beijing iQiyi Technology Co., Ltd., Shuku (Shanghai) Technology Co., Ltd., Beijing Qihoo Technology Co., Ltd. Ltd., Sangfor Technologies Co., Ltd., Venustech Information Technology Group Co., Ltd., Qi'anxin Technology Group Co., Ltd. company. The main drafters of this document are. Yao Xiangzhen, Zuo Xiaodong, Hu Ying, Zhou Chenwei, Wu Mengting, Chen Qi, Zhou Yachao, Shangguan Xiaoli, Lu Lei, Ren Yingjie, Chen Te, Yan Hui, Yang Chen, Yang Xiaowei, Li Wenting, Zhuo Zihan, Xing Xiao, Yang Tao, Li Min, Duan Jinghui, Xu Jinghui, Li Yuan, Ren Weihong, Jin Bo, Hu Zhenquan, Geng Guining, Shan Boshen, Xu Wanxiu, Zhang Min, Yan Min, Du Jing, Yang Guang, Jiang Wei, Yang Shuaifeng, Sun Yan, Liu Bei, Guo Mingduo, Zhang Xiye, Cao Jing, Lu Tianliang, Yang Xiaohan, Yang Bolong, Luo Hongwei, Wang Xin, Hao Chunliang, Zhu Xuefeng, Sha Rui, Jiang Nan, Guo Yanling, Liu Lei, Tian Xin, Zhang Fang, Zhu Chenhong, Peng Juntao, Yong Sun, Xiaoyuan Bai, Jin Peng, Xinmiao Chang, Shi Li, Haitang Wang, Shuxiang Zhong, Xiao Zhang, Yanting Zhang, Weiqiang Jiang, Dongyuan Fan, Libao Yang, Chenchao Xu, Qingjun Fan, Zhang Yuguang, Lan Yuna, Zhang Yi, Lu Zhongming, Ye Runguo, Song Botao, Yao Zhuo, Song Xiaopeng, Liu Qianwei, An Jincheng.

Introduction

On September 1, 2021, the "Data Security Law of the People's Republic of China" was officially implemented, which clearly stipulates that "the state shall establish a data classification and grading protection system. The system proposes that “according to the importance of data in economic and social development, and once it is tampered with, damaged, leaked or illegally obtained, The data shall be classified and protected according to the degree of harm caused to national security, public interests, or the legitimate rights and interests of individuals and organizations. To carry out data classification and grading protection work, we first need to classify and grade the data, identify the important data and core data involved, and then This document is under the guidance of the National Data Security Coordination Mechanism and is based on the Data Security Law, Cybersecurity Law of the People's Republic of China, Personal Information Protection Law of the People's Republic of China and related regulations give data The general rules for classification and grading are used to guide various industries, regions, departments and data processors in carrying out data classification and grading work. Data security technology data classification and grading rules

1 Scope

This document specifies the principles, framework, methods and processes for data classification and grading, and provides guidance for identifying important data. This document is applicable to the competent (regulatory) departments of the industry for reference in formulating data classification and grading standards and specifications in this industry and field. Carry out data classification and grading work in various regions and departments, and provide reference for data processors to carry out data classification and grading. This document does not apply to data involving state secrets and military data.

2 Normative references

The contents of the following documents constitute the essential clauses of this document through normative references in this document. For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document. GB/T 25069-2022 Information Security Technical Terminology

3 Terms and definitions

The terms and definitions defined in GB/T 25069-2022 and the following apply to this document. 3.1 data Any recording of information by electronic or other means. 3.2 Important data keydata Once leaked, tampered or damaged, it may directly endanger the Data on national security, economic operation, social stability, and public health and safety. Note. Data that only affects the organization itself or individual citizens is generally not considered important data. 3.3 Core Data If the information has high coverage, high precision, large scale, or certain depth in a field, group, or region, it will be used illegally or shared. Sharing important data that may directly affect political security. Note. Core data mainly include data related to key areas of national security, data related to the lifeline of the national economy, important people's livelihood, and major public interests. Other data determined by relevant departments through evaluation. 3.4 General data Other data besides core data and important data. 3.5 Personal information Various information related to an identified or identifiable natural person recorded electronically or otherwise. 3.6 Personal information that, once leaked or illegally used, may easily cause infringement upon a natural person’s personal dignity or endanger personal or property safety.

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 43697-2024_English be delivered?

Answer: Upon your order, we will start to translate GB/T 43697-2024_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 43697-2024_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 43697-2024_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.