Information and Communications Technology and Policy

Information and Communications Technology and Policy

Information and Communications Technology and Policy ›› 2024, Vol. 50 ›› Issue (1): 7-12.doi: 10.12267/j.issn.2096-5931.2024.01.002

Previous Articles     Next Articles

Exploration of personal information transfer and security compliance

XIN Jianfeng, ZHANG Xiaomei, BI Qiang, YANG Li, CHEN Shujuan   

  1. China Cybersecurity Review Technology and Certification Center, Beijing 100001, China
  • Received:2023-12-01 Online:2024-01-25 Published:2024-02-01

Abstract:

Based on the review of domestic regulations and standards related to personal information security, this paper first classifies and studies the transfer methods of personal information. In addition, it sorts out, classifies, and analyzes the actual security compliance problems encountered in the process of personal information transfer. Then, it proposes a security compliance analysis model for personal information transfer. Finally, it gives security compliance suggestions for the personal information transfer activities of personal information controllers.

Key words: personal information transfer, security compliance, compliance suggestions, personal information controller

CLC Number: