HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

RB/T 182-2023 English PDF

US$1119.00 · In stock
Delivery: <= 8 days. True-PDF full-copy in English will be manually translated and delivered via email.
RB/T 182-2023: Evaluation specifications for personal information security of application software in smart mobile terminals
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
RB/T 182-2023English1119 Add to Cart 8 days [Need to translate] Evaluation specifications for personal information security of application software in smart mobile terminals Valid RB/T 182-2023

PDF similar to RB/T 182-2023


Standard similar to RB/T 182-2023

GB/T 1.1   RB/T 033   GB/T 1.2   RB/T 177   RB/T 176   RB/T 174   

Basic data

Standard ID RB/T 182-2023 (RB/T182-2023)
Description (Translated English) Evaluation specifications for personal information security of application software in smart mobile terminals
Sector / Industry Chinese Industry Standard (Recommended)
Classification of Chinese Standard A00
Classification of International Standard 03.120.20
Word Count Estimation 56,520
Date of Issue 2024-05-20
Date of Implementation 2024-07-01
Issuing agency(ies) National Certification and Accreditation Administration

RB/T 182-2023: Evaluation specifications for personal information security of application software in smart mobile terminals


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 03.120.20 CCSA00 Certification and Accreditation Industry Standards of the People's Republic of China Personal information security of mobile smart terminal application software Evaluation Standards Released on 2024-05-20 2024-07-01 Implementation The National Certification and Accreditation Administration issued Published by China Standards Press

Table of Contents

Preface III 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Evaluation Process 2 4.1 Overview 2 4.2 Main evaluation links 3 5 Evaluation Requirements 4 5.1 Team Building 4 5.2 Develop a plan 4 5.3 Implementation Evaluation 5 5.4 Result Record 5 6 Evaluation content and methods 5 6.1 Collection of Personal Information 5 6.2 Storage of Personal Information10 6.3 Use of Personal Information13 6.4 Rights of Personal Information Subjects17 6.5 Entrusted processing, sharing, transfer and public disclosure of personal information22 6.6 Handling of Personal Information Security Incidents 31 6.7 Requirements for personal information security management of organizations 32 7 Evaluation results and judgment 38 7.1 Document review results 38 7.2 Technical Verification Result Determination 38 7.3 Determination of on-site audit results 38 7.4 Certification Decision 39 Appendix A (Normative) Contents of Personal Information Security Assessment for Mobile Smart Terminal Application Software 40 Appendix B (Informative) Description of Evaluation Item Coding Rules 45 References 47

Foreword

This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents" Drafting. Please note that some of the contents of this document may involve patents. The publishing organization of this document does not assume the responsibility for identifying patents. This document is proposed and coordinated by the Certification and Accreditation Administration of the People's Republic of China. This document was drafted by. China Cybersecurity Review and Certification and Market Supervision Big Data Center, Beijing Software Product Quality Inspection and Testing Center Center, Shanghai Information Security Evaluation and Certification Center, the 15th Research Institute of China Electronics Technology Group Corporation, China Academy of Information and Communications Technology, Ministry of Public Security First Research Institute, Beijing University of Posts and Telecommunications, Institute of Software, Chinese Academy of Sciences. The main drafters of this document are. Zhang Xiaomei, Xu Jinghui, Xin Jianfeng, Wang Wei, Gu Min, Hu Shi, Yuan Cuihong, Chen Shujuan, Tian Qingyun, He Jing, Wen Yanli, Hao Weibo, Wang Yanhong, Ren Fengli, Han Yu, Ji Naijie, Su Purui, Zhang Miao, Yan Yan, and Wang Ye. Personal information security of mobile smart terminal application software Evaluation Standards

1 Scope

This document specifies the evaluation process, evaluation requirements, evaluation content and methods, and evaluation criteria for the personal information security of mobile smart terminal application software. Result determination. This document is applicable to certification bodies and technical verification bodies for testing, evaluating and Certification and other activities.

2 Normative references

The contents of the following documents constitute essential clauses of this document through normative references in this document. For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document. GB/T 35273-2020 Information security technology Personal information security specification

3 Terms and definitions

The terms and definitions defined in GB/T 35273-2020 and the following apply to this document. 3.1 Application software developed for mobile smart terminals, including third-party application software pre-installed in mobile smart terminals, and Internet service providers Application software provided by the provider for downloading, installing and upgrading through mobile application distribution platforms such as websites and app stores. Note. Abbreviated as “App”. [Source. GB/T 34975-2017, 3.3, modified] 3.2 Certification body An organization that engages in third-party certification activities related to products, services, processes, systems or people. NOTE. A certification body may carry out testing and inspection activities itself or entrust another body to carry out these activities on its behalf. [Source. RB/T 072-2021, 4.6] 3.3 Network operators who provide information services to users through mobile smart terminal application software are responsible for the operation of mobile smart terminal application software. Operate and assume legal responsibility for the security of personal information in mobile smart terminal application software. 3.4 The process by which professional technicians conduct compliance verification using methods such as testing, inspection and document verification.