Path:
Home >
GB/T >
Page206 > GB/T 44588-2024
Price & Delivery
US$289.00 · In stock · Download in 9 secondsGB/T 44588-2024: Data security technology - Personal information processing rules of internet platforms, products and services
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See
step-by-step procedureStatus: Valid
| Std ID | Version | USD | Buy | Deliver [PDF] in | Title (Description) |
| GB/T 44588-2024 | English | 289 |
Add to Cart
|
3 days [Need to translate]
|
Data security technology - Personal information processing rules of internet platforms, products and services
|
Click to Preview a similar PDF
Basic data
| Standard ID | GB/T 44588-2024 (GB/T44588-2024) |
| Description (Translated English) | Data security technology - Personal information processing rules of internet platforms, products and services |
| Sector / Industry | National Standard (Recommended) |
| Classification of Chinese Standard | L80 |
| Classification of International Standard | 35.030 |
| Word Count Estimation | 14,167 |
| Date of Issue | 2024-09-29 |
| Date of Implementation | 2025-04-01 |
| Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 44588-2024: Data security technology - Personal information processing rules of internet platforms, products and services
---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
ICS 35.030
CCSL80
National Standard of the People's Republic of China
Data security technology Internet platform and product services
Personal Information Processing Rules
internetplatforms, products and services
2025-04-01 Implementation
State Administration for Market Regulation
The National Standardization Administration issued
Table of Contents
Preface III
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Abbreviations 2
5 Overview 2
6 Basic requirements for personal information processing rules 3
7 Procedures for the preparation of personal information handling rules 3
8 Contents of personal information processing rules 3
9 Publication of personal information processing rules 6
10 Revision of personal information processing rules 7
11 Dispute resolution regarding personal information handling rules 7
References 8
Foreword
This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents"
Drafting.
Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents.
This document was proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260).
This document was drafted by. Beijing Institute of Technology, National Computer Network Emergency Response Technical Processing Coordination Center, China Electronics Technology Standardization Research Institute
China Academy of Information and Communications Technology, China Cyberspace Research Institute, Perfect World (Beijing) Software Technology Development Co., Ltd., Shanghai Ctrip Business
Beijing Douyin Information Service Co., Ltd., Beike Real Estate (Beijing) Technology Co., Ltd., Beijing Weibo Vision Technology Co., Ltd.
Company, Great Wall Motor Co., Ltd., Beijing Baidu Netcom Technology Co., Ltd., Beijing Sankuai Technology Co., Ltd., OPPO Guangdong Mobile
Communications Co., Ltd., Vivo Mobile Communications Co., Ltd., Beijing Tengyun Tianxia Technology Co., Ltd., iReader Technology Co., Ltd., Shanghai SenseTime
Intelligent Technology Co., Ltd., Beijing Shangyin Technology Co., Ltd., Beijing Zhuanzhuan Spirit Technology Co., Ltd., Beijing Jingtian & Gongcheng Law Firm
Shanghai Branch of the Firm, Qi'anxin Technology Group Co., Ltd., Huawei Technologies Co., Ltd., Honor Terminal Co., Ltd., Beijing Samsung Communications Technology Co., Ltd.
Technology Research Co., Ltd., Beijing Xiaoju Technology Co., Ltd., China Telecom Co., Ltd. Jiangxi Branch, Beijing Tongyuan Legal Consulting Co., Ltd.
Company, China National Petroleum Corporation Changqing Oilfield Branch, Guangzhou Shiyuan Electronic Technology Co., Ltd., Hangzhou Xiaoying Innovation
Technology Co., Ltd.
The main drafters of this document are. Hong Yanqing, Ren Yan, Zhu Xuefeng, Xue Ying, Xue Chen, Wu Mengyi, Ge Mengying, He Yanzhe, Yang Qin, Ge Xin, Hu Ying,
Tian Shen, Dou Yu, Chen Tian, He Yunyun, Li Yanjie, Gao Chao, Liu Xiaocen, Li Weijing, Lin Xingchen, Zhang Chao, Wu Di, Xue Jing, Xu Quanquan, Li Hangmin,
Yu Fang, Yuan Lizhi, Yang Dan, Wang Yiyu, Yi Li, Wang Jingzhou, Li Yangchun, Song Ziyi, Wang Haitang, Huang Rong, Liu Rong, Cheng Yan, Gao Siping, Tian Linchuan,
Mao Xinyi, Fu Yanyan, Zhao Pengyang, Yi Qiang, Zhao Xiaona, Sun Shuxian, Chen Shu, Cheng Jin, Lu Meng, Wu Geng, Wang Xing, Song Xiaoai, Li Shihong, Zhou Yang,
Zhu Lei, Wang Danhui, Xie Boyan, Zhang Cheng, Ma Ke, Zhang Bowen, Yang Xinyu, Jia Ke, Zhang Wei, An Jincheng, Lian Xiyu, Wu Yue, Zhang Na, Tian Mingren,
Guo Li, Su Ying, Song Yangqi, Jiao Qionghui, Liao Hanxing.
Data security technology Internet platform and product services
Personal Information Processing Rules
1 Scope
This document specifies the basic requirements, compilation procedures, content, and publication format of the rules for the processing of personal information on Internet platforms and product services.
The requirements include the format, rules for handling personal information, and dispute resolution.
This document is applicable to the process of regulating the formulation and publication of personal information processing rules by operators of Internet platforms and product services.
Supervise, manage and evaluate personal information processing rules.
2 Normative references
The contents of the following documents constitute essential clauses of this document through normative references in this document.
For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to
This document.
GB/T 25069-2022 Information Security Technical Terminology
GB/T 35273-2020 Information security technology Personal information security specification
3 Terms and definitions
The terms and definitions defined in GB/T 25069-2022 and GB/T 35273-2020 and the following apply to this document.
3.1
Internet platforms, products and services
A platform, product or service that directly provides the required business functions to the subject of personal information through the Internet.
3.2
An application running on a mobile smart terminal.
Note. This includes application software pre-installed on smart terminals, downloaded and installed, and software developed based on the application software development platform interface that users can use without installation.
Mini programs, quick applications, etc., referred to as App.
[Source. GB/T 41391-2022, 3.1, modified]
3.3
Personal information
Any information related to an identified or identifiable natural person recorded electronically or otherwise, excluding any information that has been anonymized.
information.
[Source. GB/T 35273-2020, 3.1, modified]
3.4
Once leaked or illegally used, it is likely to cause the personal dignity of natural persons to be infringed or the personal and property safety to be endangered.
information.
...