Corporate Data Security Market Is Expected to Stay Solid

来源 :China’s foreign Trade | 被引量 : 0次 | 上传用户:guojinhong
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  On August 20, the 30th meet- ing of the Standing Committee of the 13th National People’s Congress passed the Personal Information Protection Law of the People’s Republic of China (the law), which will come into force on November 1, 2021. Following the Cyber Security Law in 2016 and the Data Security Law in June 2021, the Personal Information Protection Law further clarifies the principles for the collection and disposal of personal information, marking the establishment of a comprehensive legal safeguard system for information security in China.
  In recent years, China has been active in data and privacy protectionrelated legislation and law enforcement, enforcing these in many many high-risk industries and scenarios.
  Clarifying and strengthening domestic needs for data security
  The Personal Information Protection Law is clear in identifying the need for data security domestically, with a fine higher than that in the EU.
  In the era of big data, cloud computing and other information integration technology, the time is right for China to promote personal information protection legislation. According to Deloitte Touche Tohmatsu, as of June 2021, more than eight out of ten countries and regions around the world have been or are in the process of formulating personal information protection laws and rules. China is one of these, designing a differentiated system based on existing thinking.
  As analysts from Guosheng Securities said, this law is important, as it clarifies that anyone using personal information should obtain consent of the relevant individual in advance, and if anything is to change about the use of information the individual needs to be informed again. At the same time, those hot issues like blanket authorization and mandatory consent, the law specifically requires that individual consent should be obtained for handling of sensitive personal information, providing personal information to others or making it public, transferring personal information across borders, etc., and clarifies that it is forbidden to excessively collect personal information, as well as to refuse to provide products or services to individuals who do not consent. Besides, the law gives individuals the right to withdraw their consent, in which case individual’s personal information collection should be stopped, and existing personal information should be deleted.
  As more and more companies use big data to analyze and evaluate consumers for commercial marketing, some begin illegally utilizing the information about consumers’ economic status, consumption habits, and sensitivity to prices, etc., to mislead and defraud them by applying discriminatory and differential prices and so on. The most typical breach was “big data-enabled price discrimination against existing customers” which triggered a heated debate. As to such activities, the law clearly stipulates that decisions made automatically based on customers’ personal information should be transparent, fair and just, and that it is not allowed to apply unreasonable differential treatment to individuals in terms of prices and other transaction conditions.   The law classifies information such as biometric information, religious beliefs, specific identity markers, medical and health care, financial accounts, and whereabouts and trajectories as sensitive personal information, and requires that sensitive personal information can be handled only if it is for a specific purpose and in sufficient necessity, and under strict protection measures, and that an impact assessment should be conducted beforehand and the individual should be informed of the necessity as well as possible results.


  Serious violations of the law shall be ordered to be corrected by provincial and above departments assuming the responsibility of personal information protection, while law-breaking companies will be punished by confiscating illegal income, and paying fines of up to RMB 50 million or no more than 5% of the previous year’s turnover, be ordered to suspend and/or rectify relevant businesses, or even be revoked permission or license for relevant businesses by competent authorities after being officially notified.
  Great potential for the corporate data security market
  As the law comes into force, there is great potential for various industries involving personal information in China.
  Financial data is of commercial value naturally and needs to be regulated. Derivative personal information, obtained from analysis, summarizing, and deduction of sensitive personal information related to financial transactions, is of great value for risk control and businesses. As hospitals adopt Internet technology into medical and healthcare activities, data sharing and circulation has become necessary, but isolation and other static protection measures are not enough to prevent risks inflowing data. Therefore, medical data, which includes patients’ privacy and is getting diversified in types and forms, has become an increasingly serious challenge for data security, and Internet-enabled hospitals need to analyze and prevent data security risks through a dynamic and changing perspective. Meanwhile, as intelligent vehicle industry and Internet of Vehicles develop, AI technology represented by autonomous driving is getting more popular, and data processing capacity is continuously improved, causing increasingly prominent auto data security challenges and risks, especially in the effective utilization of auto data and protection of national security and the legitimate rights and interests of individuals.   Automotive data processors should take their responsibility to protect personal information and the legitimate rights and interests of individuals. Prior to the dispose of automotive data that contains personal information, relevant individuals should be informed in a prominent manner, and the consent should be obtained. Otherwise, the disposal should comply with other circumstances specified in the law and administrative regulations. It should obtain separate consent of relevant individuals for the disposal of sensitive personal information, meet specific requirements of strictly limiting the purposes, making prompts when collecting data and terminating collection, or following laws, administrative regulations and mandatory national standards. Automotive data collection can only include biometric features such as fingerprints, voice prints, faces, heart rhythms and so on for the purpose of improving driving safety.
  The size of the data security service marketis expected to reach RMB 10 billion
  In recent years, China intensively issued and carried out laws and regulations such as the Data Security Law, Regulations on Security Protection of Critical Information Infrastructure and the Personal Information Protection Law. Just from the perspective of privacy, which is a part of data security, based on Gartner’s prediction, in 2023 more than 80% of companies worldwide will face at least one law or regulation of data protection focusing on privacy, and in 2024 this market will exceed USD 15 billion for expenditure inprivacy data protection and compliance technology.
  Data security computing modules are commonly used in big data service scenarios, and added to AI computing platforms, to provide security, storage and computing services based on data as AI applications. So, taking the revenue of AI platforms as the upper limit of privacy computing output value, according to IDC, in 2020 the size of big data market in China was about USD 10.42 billion, of which the software market contributed USD 2.65 billion, and about USD 400 million by AI platforms. IDC forecasted that from 2018 to 2024 the AI industry would have a compound annual growth rate of 39%, meaning revenue of AI platforms is expected to reach USD 1.5 billion in 2024, while these data security solutions may contribute up to RMB 10 billion.
  Privacy computing technology solves the problem that flowing data is available but not visible, helps to settle down the contradiction between data protection and utilization, and has now been widely applied in fields like finance, medical care and government affairs.   Industry experts emphasized the need to take into account both data application and security when trying to explore data value, balance efficiency and risk, and make use of data under the premise of ensuring security.
  KPMG expected that the data security technology and service market couldreach RMB 10 billion in 2023, and as IT architecture goes to the cloud, this will contribute RB 100 billion to data security SaaS business in the long run.
  Taking the consumption loan scenarios as an example, assuming in 2030 the penetration rate of credit risk modeling will reach 60% using federated learning in financial institutions and a service fee rate of 1% is applied, and short-term consumption credit market in China maintains an annualized compound growth rate of 8% by 2030 which was RMB 9.92 trillion in 2019, meaning the market size will reach RMB 21.42 trillion in 2030. Revenue of data security business is expected to reach RMB 12,850 billion. When taking into account scenarios such as the Internet as well as medical and governmental big data, the potential is even greater.
  According to Guosheng Securities, typical data security application scenarios usually contains three parties. First is the Internet as the users, and in the future Cyberspace Administration of China and other regulatory authorities in China may lead the platform construction, with third-party enterprises that have shareholders of state-owned enterprises and technical reserves to provide technology and operations. As the users of data, Internet-based companies have to consider the service features and payment capacity, so they have urgent needs for compliance, including minimizing data collection and avoiding abuse. As to the data providers, like banking industry and medical institutions in federated modeling, they should prevent original data from going out, and send encrypted information to the intermediate party. In addition, these privacy computing technology service providers should build computing systems for customers, including deploying service nodes at business operators, data collectors and trusted third parties.
其他文献
In 2020, amidst a significantly weak international trade market, ASEAN became the largest trading partner of China in history. In 2021, the economic and trade cooperation between China and ASEAN count
The energy structure transition has become a big concern for many countries and regions in the world. Uruguay is one of the countries that have seen successes in transitioning its energy structure.  A
According to preliminary es- timates, the gross domestic product (GDP) in the first three quarters reached RMB 82,313.1 billion, a year-on-year increase of 9.8% at comparable prices, with an average t
Anccording to the data of the General Administration of customs, in the first eight months of this year, China’s total import and export trade reached RMB 24.78 trillion, up by 23.7% from last year an
The coronavirus (COVID-19) pandemic severely disrupted travel and tourism, and recovery is now expected to be slower than previously anticipated. Reviving the sector requires collaboration and coordin
At present, digitization has been growing fast in the field of global trade and the scope of digital service trade has been expanding. Compared with global figures of the digital trade, China has been
CCPIT  Expo 2020 Dubai Offers a Chance to Enhance Dialogue  President Xi Jinping emphasized the need for people of all nations to jointly strengthen global governance, pursue innovation-driven develop
According to the 2021 China Busi- ness Report issued by the American Chamber of Commerce in Shanghai and PwC (China), nearly 60% of surveyed member companies of the American Chamber of Commerce in Sha
On October 1, Expo 2020 Dubai was opened to visitors, and the China Pavilion opened its gate on the same day. Chinese President Xi Jinping made a video message for the China Pavilion of Expo 2020 Duba
1980年9月18日下午,美国空军下土戴维·鲍威尔(Airman David P.Powell)驾车飞驰在阿肯色州的65号高速公路上,他正穿过美国南方大片荒无人烟的区域,目的地是一座编号374-7的“大力神”2洲际弹道导弹地下发射井,任务是对其进行例行检查。  正如在上篇中介绍的,美国空军在“大力神”2的部署上是围绕一座发射井来建造颇为精干的小型发射基地,每18个这样的小型发射基地分散部署在三个美