Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Topsec Data Security Governance System Construction Scheme

Requirement Background

With the increasing use of information technology in people's everyday life, size of various data is expanding rapidly. Data needs to be transferred in an ordered way to ensure sound economic development. However, data transfer brings security risks to enterprises while facilitating their corporate operations. As severe security incidents occur frequently all over the world, data security has become a major concern of enterprises. China has issued a series of laws and standards regarding data security, such as the Data Security Law of the People's Republic of China, GB/T 37988-2019 Information security technology—Data security capability maturity model, and GB/T 37964-2019 Information security technology—Guide for de-identifying personal information. Data security governance system construction solutions must comply with these laws and standards while addressing needs of enterprises for data assessment and organizational capability assessment.

Activity & Announcement
Solution

With the purpose of helping users cope with the data security risks caused by unclear data asset inventory, chaotic data exchange management, ambiguous management responsibilities, fragmented security technology measures, deficient systems, insufficient auditing capabilities, and many other data security risks, this scheme focuses on the design around the customer's actual needs for data security. This program is based on the compliance requirements put forward by the Data Security Law, the Network Security Law, the Personal Information Protection Law, and the Regulations on Network Data Security Protection, and combines the construction theory of data security technology and management by Gartner. It takes data security governance assessment and consulting as a starting point, takes the data security objectives of their business as a basis, establishes a data security organizational structure, clearly defines the boundaries of data security rights and responsibilities, and improves the data security management system, so that the management means can be enforced and put into practice. By constructing the data security technology protection system, it guarantees the full implementation of hierarchical control and establishes the data security operation and control mechanism to provide support for business operations in the long term. It also establishes a corresponding data security monitoring mechanism, and sets up a list of important data catalogs, data security risks, security records of data events, and data export and reporting through the control platform, and creates the corresponding approval process and approval system, which meets the relevant regulatory requirements of the state.

From data assets, organizational structure, management system, security facilities, continuous operation and other aspects, the overall design of the program focuses on the user's data security concerns to build an overall security solution, achieving all-round and three-dimensional data security protection that fits the user's business.

Value to Customers
Enhance data security capability comprehensively

We conduct a basic assessment of the current situation to understand the data security risks faced by the organization, and carry out organizational construction, management construction, technical tool construction, and O&M protection construction according to the results. Thus, the enterprise data security construction meets the requirements of laws and regulations with comprehensively upgraded data security capability.

Strengthen data security management capabilities

Establishing companion data security standards, working mechanisms and procedures, defining data security governance and protection objectives, building data security capabilities covering the entire data process, and making the data security management process evidence-based.

Establish the closed-loop operation safeguard system

By establishing a data security operation safeguard system, the scheme forms the operation capability of “construction, management and utilization”, including data security O&M, emergency planning and rehearsal, monitoring and early warning, emergency response, disaster recovery and others, which forms the optimization capability of continuous improvement.