Building a Trusted Data Space: Ensuring Data Security and Driving Digital Economic Development

Building a Trusted Data Space: Ensuring Data Security and Driving Digital Economic DevelopmentIn the intelligent era, data has become a crucial factor of production, and its value is increasingly prominent. However, data security issues are also becoming increasingly severe, impacting personal privacy, corporate interests, social stability, and even national security

Building a Trusted Data Space: Ensuring Data Security and Driving Digital Economic Development

In the intelligent era, data has become a crucial factor of production, and its value is increasingly prominent. However, data security issues are also becoming increasingly severe, impacting personal privacy, corporate interests, social stability, and even national security. Data security was a key focus at this year's Two Sessions (the annual meetings of the National People's Congress and the Chinese People's Political Consultative Conference). Sun Song'er, a member of the 13th Anhui Provincial Committee of the Chinese People's Political Consultative Conference, Senior Vice President of H3C Group, and President of H3C Information Security Technology Co., Ltd., offered several constructive suggestions regarding trusted data spaces and data security, contributing valuable insights to the high-quality development of China's data industry.

Building a Trusted Data Space: Ensuring Data Security and Driving Digital Economic Development

Sun's suggestions encompass multiple dimensions, from improving infrastructure and strengthening legal frameworks to enhancing talent cultivation, reflecting her in-depth understanding of trusted data space construction. She believes that accelerating the construction of pilot demonstration projects for trusted data spaces and improving data infrastructure to achieve safe and efficient data circulation is paramount. Hefei, as one of the first national pilot cities for data circulation and utilization, possesses a solid foundation for this. Sun suggests that Hefei should leverage its regional development characteristics and the pilot program opportunities to actively promote data infrastructure construction, facilitating efficient data flow between different entities and regions to meet the needs of multi-party flexible data resource transmission within the trusted data space. Simultaneously, it's crucial to effectively integrate and utilize data resources, strengthen research on data processing capabilities and data circulation and sharing technologies, providing a controllable, manageable, and preventable secure and trustworthy environment for data circulation and utilization. Only then can the full value of data be unleashed, driving the vigorous development of the digital economy.

Sound legal regulations and technical standards are cornerstones of the healthy development of a trusted data space. Sun emphasizes the need to promote the standardization transformation of data across departments and industries, establishing unified and trustworthy data space standards and regulations. This requires formulating and improving relevant laws and regulations, clarifying data ownership, regulating the rights and interests of each stage of data circulation, and providing a solid legal guarantee for data flow. With the ongoing acceleration of globalization, cross-border data flows are becoming increasingly frequent. Faced with an increasingly complex international data governance environment, Sun suggests that China should actively participate in international data governance cooperation, utilizing multilateral frameworks such as the EU-China dialogue, the G20, BRICS, and the Shanghai Cooperation Organization to explore the establishment of a dialogue and cooperation mechanism for trusted data spaces, fostering consensus and enhancing China's voice in international data governance. Active participation in international cooperation is essential for better protecting national data security interests and gaining greater influence in international data governance.

The National Data Administration's "Data Element " Three-Year Action Plan (2024-2026) emphasizes the fundamental principle of "safe and orderly" development, stating the need to "insist on integrating security throughout the entire process of creating and realizing the value of digital elements, strictly adhering to the bottom line of data security." Sun strongly agrees, emphasizing that data security is the lifeline of a trusted data space. Therefore, she suggests establishing and improving data security management systems, clarifying the respective security responsibilities and obligations of data owners, users, and managers, forming a data security management structure with clear responsibilities and collaborative governance. Simultaneously, it's necessary to increase investment in R&D in key technological areas such as data encryption, access control, and data desensitization, improving data security technology levels, and actively promoting the application of cutting-edge technologies such as privacy computing and blockchain in trusted data spaces, allowing for the full utilization of data value while ensuring privacy data remains "usable but invisible." Only in this way can the maximum value of data be unlocked while ensuring data security.

Professional talent is the lifeblood of innovation and development, and an important support for ensuring the security of a trusted data space. Sun points out that the government should jointly support higher education institutions and vocational schools in strengthening data security-related programs, optimizing course settings, and increasing practical training in data security to cultivate compound talent with both technical and management expertise. Enterprises should leverage their advantages to jointly build laboratories and internship bases with universities and research institutions, providing students with practical opportunities and supplying the market with practical talent, building a talent reserve for the future of the data industry. Only by cultivating a large number of high-quality professionals can a solid talent foundation be provided for the development of a trusted data space.

Data security has become a crucial pillar in digital transformation. Sun suggests that regulatory bodies, academia, and clients should collaborate to thoroughly research the security supervision and protection needs of data in different industries and development stages, promoting high-quality development of trusted data spaces. Only through multi-party cooperation can data security challenges be better addressed, building a safe and reliable trusted data space.

In conclusion, Sun Song'er's suggestions provide a comprehensive framework and approach for building a trusted data space. These suggestions not only cover multiple aspects, including technology, law, and management, but also emphasize the importance of international cooperation and talent cultivation. The full implementation of these suggestions will provide strong support for the development of China's data industry, helping China secure a more advantageous competitive position in the digital economy era. Building a secure and trustworthy data space is not only a crucial measure for ensuring national security and social stability but also an important engine for promoting high-quality economic and social development. Through collaborative efforts, we are confident in building a safe, reliable, efficient, and convenient trusted data space in the near future, contributing to the construction of a digital China. This requires the joint efforts of the government, enterprises, universities, and all sectors of society to jointly promote the construction of a trusted data space, ensuring data security, unleashing data value, and promoting the healthy development of the digital economy. Only in this way can we seize the initiative in the digital economy era and achieve high-quality development. Strengthening international cooperation, actively participating in the formulation of international data governance rules, and enhancing China's voice in international data governance are also crucial. This requires active participation in international organizational activities and strengthening exchanges and cooperation with other countries to jointly build a fair, just, and reasonable international data governance system. Simultaneously, increasing investment in R&D of data security technologies and enhancing independent innovation capabilities are essential to better address future challenges. Cultivating high-quality data security professionals is also crucial. This requires the joint efforts of the government, universities, and enterprises to strengthen talent cultivation and provide strong talent support for the construction of a trusted data space. Through the concerted efforts of multiple parties, we can certainly build a safe, reliable, efficient, and convenient trusted data space, contributing to the construction of a digital China. The construction of a trusted data space is a long and complex process that requires our continued efforts and continuous improvement. Only in this way can we better leverage the value of data and promote the healthy development of the digital economy. Strengthening data security management and ensuring data security are the core tasks of building a trusted data space. This requires establishing and improving data security management systems, clarifying the responsibilities and obligations of all parties, and forming a data security management structure with clear responsibilities and collaborative governance. Simultaneously, it's necessary to strengthen the research and development and application of data security technologies, improving data security protection capabilities, and ensuring data security and reliability. Finally, it is necessary to strengthen international cooperation, actively participate in the formulation of international data governance rules, and enhance China's voice in international data governance, jointly building a safe, reliable, fair, and just international data environment.


Disclaimer: The content of this article is sourced from the internet. The copyright of the text, images, and other materials belongs to the original author. The platform reprints the materials for the purpose of conveying more information. The content of the article is for reference and learning only, and should not be used for commercial purposes. If it infringes on your legitimate rights and interests, please contact us promptly and we will handle it as soon as possible! We respect copyright and are committed to protecting it. Thank you for sharing.(Email:[email protected])