HOME   Cart(0)   Quotation   About-Us Tax PDFs Standard-List Powered by Google www.ChineseStandard.net Database: 189759 (22 Jun 2025)

GB/T 45392-2025 English PDF

Standard Briefing:

Stadard ID: GB/T 45392-2025
Stadard Title: Data security technology - Security requirements for automated decision making based on personal information
Price (USD): 359
Lead day (Deliver True-PDF English version): 4 days [Need to translate]
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 45392-2025English359 Add to Cart 4 days [Need to translate] Data security technology - Security requirements for automated decision making based on personal information Valid GB/T 45392-2025

PDF Samples:


Basic Data:

Standard ID GB/T 45392-2025 (GB/T45392-2025)
Description (Translated English) Data security technology - Security requirements for automated decision making based on personal information
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.030
Word Count Estimation 18,111
Date of Issue 2025-03-28
Date of Implementation 10/1/2025
Issuing agency(ies) State Administration for Market Regulation, National Standardization Administration

Contents, Scope, and Excerpt:

GB/T 45392-2025.Data security technology Security requirements for automated decision-making based on personal information ICS 35.030 CCSL80 National Standard of the People's Republic of China Data security technology based on the automation of personal information Decision security requirements Released on 2025-03-28 2025-10-01 Implementation State Administration for Market Regulation The National Standardization Administration issued Table of contents Preface III 1 Range 1 2 Normative references 1 3 Terms and Definitions 1 4 Overview 2 4.1 Automated decision-making process 2 4.2 Computer programs and algorithms used for automated decision-making 3 4.3 Scope of information processed through automated decision making 3 4.4 Security risks of automated decision making 3 5 Safety Principles 4 6 General safety requirements 4 7 Algorithm security requirements 4 7.1 Algorithm Impact Assessment 4 7.2 Algorithm Security Technical Requirements 5 7.3 Algorithm security and reliability requirements 5 7.4 Algorithm Security Human Intervention Requirements 5 7.5 Training and testing data requirements to ensure algorithm security 5 7.6 Technical documentation requirements for algorithm development 6 7.7 Algorithm safe operation requirements 6 7.8 Other requirements 7 8 Feature Generation Safety Requirements 7 8.1 Requirements for processing personal information generated by features 7 8.2 Computational safety requirements for feature generation 8 9 Decision-making security requirements 8 9.1 Basic Requirements 8 9.2 Informative requirements before decision making 8 9.3 Requirements for protecting individual rights in decision-making 9 10 Special security requirements for typical scenarios of automated decision-making 9 10.1 Educational or professional opportunities 9 10.2 Credit or Insurance Assessment 9 10.3 Public governance areas such as social welfare qualifications 9 10.4 Labor relations field10 10.5 Security requirements for automated decision-making for special groups10 10.6 Information push, commercial marketing 10 10.7 Commercial Transactions11 Reference 12 Preface This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents" Drafting. Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents. This document was proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260). This document was drafted by. Beijing Institute of Technology, China Academy of Information and Communications Technology, China Electronics Technology Standardization Institute, China Cyberspace Security Research Institute Review Technology and Certification Center, Beijing Douyin Information Service Co., Ltd., Beijing Baidu Netcom Technology Co., Ltd., Beijing Shangyin Technology Co., Ltd. Beijing Sankuai Online Technology Co., Ltd., Beike Real Estate (Beijing) Technology Co., Ltd., Shanghai Meishida Business Consulting Co., Ltd., Shanghai Shan Yong Law Firm, Beijing Jingtian & Gongcheng Law Firm, Beijing Xiaoju Technology Co., Ltd., Beijing Hanhua Feitian Xinan Technology Co., Ltd., Ctrip Information Technology (Shanghai) Co., Ltd., Ant Technology Group Co., Ltd., Alibaba (Beijing) Software Services Co., Ltd., Beijing Kuaishou Technology Co., Ltd., Beijing Jingdong Shangke Information Technology Co., Ltd., Beijing Weimeng Chuangke Network Technology Co., Ltd., Beijing Tengyun Tianxia Technology Co., Ltd., Beijing Zhonglun Law Firm, Beijing Foreign Studies University, China University of Political Science and Law, Beijing University of Posts and Telecommunications, Yuncong Technology Group Co., Ltd., Honor Device Co., Ltd., Beijing DeepQuest AI Basic Technology Research Co., Ltd., OPPO Guangdong Mobile Communications Co., Ltd. The main drafters of this document are. Hong Yanqing, Tian Shen, Ge Xin, Wu Mengyi, Zhu Manli, Wang Jinsong, Zhang Chao, Zhao Ranran, Liu Xiaocen, Xue Jing, Xu Quanquan, Wan Fang, Zhang Linghan, Wang Ding, Peng Gen, Fan Hua, Wang Lei, Chen Tian, He Yanzhe, Liu Ying, Ge Mengying, Wang Jingzhou, Luo Hongwei, Sun Tie, Xu Rui, Zhang Na, Li Weijing, Liu Rong, Gu Wei, Guo Jianling, Zhou Yang, Wu Jiawei, Hu Naying, Ding Xiaoqiang, Hu Liping, Fu Yanyan, Bai Xiaoyuan, Shi Yuzhen, Zhao Xiaona, Li Jun, Peng Juntao, Wu Shaoqing, Huang Rong, Fan Ye, Liang Tianxiang. Data security technology based on the automation of personal information Decision security requirements 1 Scope This document proposes basic security principles for automated decision-making based on personal information, and stipulates general security requirements, algorithm security requirements, Feature generation safety requirements, decision-making safety requirements, and special safety requirements for typical scenarios of automated decision-making. This document applies to personal information processors that conduct automated decision-making to regulate their algorithm development, feature generation and decision-making activities. Regulatory authorities and third-party assessment agencies supervise, manage and evaluate automated decision-making. 2 Normative references The contents of the following documents constitute essential clauses of this document through normative references in this document. For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document. GB/T 35273 Information security technology Personal information security specification GB/T 41391 Information security technology Basic requirements for mobile Internet applications (Apps) to collect personal information GB/T 41479 Information security technology - Security requirements for network data processing GB/T 42888-2023 Information security technology machine learning algorithm security assessment specification 3 Terms and definitions The terms and definitions defined in GB/T 35273 and the following apply to this document. 3.1 The computer program automatically analyzes and evaluates a person's behavior, hobbies, or economic, health, and credit status, and Decision-making activities. Note. Automated decision making can be further decomposed into two processes. feature generation and decision making. 3.2 After the personal information is automatically processed by a computer program, it is automatically generated by a computer program about the preferences, occupation, Information about your financial, health, education, and credit status. Note. Personal characteristic information does not include personal biometric information. 3.3 Personal information is automatically processed through computer programs, and personal features are extracted, selected, calculated and output. The process of obtaining the input information needed to make individual decisions. Note. Abbreviated as “feature generation”. 3.4 decision making The computer program generates personal characteristic information as input, which can affect the individual's own state, the physical environment in which he lives, and the ......

Similar Standards:

GB/T 42453   GB/T 42447   GB/T 42460   GB/T 45396   GB/T 45389