Think Tank

Ensuring national economic security through information security

2026-03-20   

Security is the prerequisite for development, and development is the guarantee of security. The outline of the 15th Five Year Plan proposes to "safeguard national economic security". Economic security is the key to sustained and healthy economic development and an important guarantee for Chinese path to modernization. With the development of digital technology and the expansion of the digital industry, the digital economy has become an important driving force for high-quality economic development. At the same time, digital security risks are becoming increasingly prominent. General Secretary Xi Jinping emphasized that "we must resolutely safeguard China's development interests, actively prevent various risks, and ensure national economic security" and "safeguard national data security, protect personal information and trade secrets". In the context of the rapid development of the global digital economy and the emergence of digital elements as core means of production, ensuring information security has become an inevitable requirement for safeguarding economic security. Based on the overall national security concept, we should make a systematic layout from the aspects of laws and policies, information security personnel training and technology research and development, strengthening information security awareness, international information security cooperation, etc., to ensure national economic security with information security, and to lay a solid foundation for comprehensively promoting the construction of a powerful country and national rejuvenation with Chinese path to modernization. 1. To improve the regulatory framework for information security, it is necessary to further perfect the legal and policy system for information security. Based on the current legal frameworks such as the Data Security Law and the Cybersecurity Law, supporting regulations and implementation rules should be refined to clarify the responsibilities and obligations of all parties involved in information security protection. Strengthen rigid constraints in key areas and optimize governance models in key industries. Strictly implement the requirements of "original data not leaving the domain, backup data traceable, and high-sensitivity data localization" for key areas such as critical information infrastructure, personal privacy, and national classified data. For key emerging industries such as artificial intelligence, on the one hand, special rules and policies will be formulated to focus on security risks, and detailed rules and regulations will be formulated for the verification standards of training data sources, requirements for algorithm discrimination prevention and control, and obligations for generating content identification; On the other hand, accelerate the inclusion of the requirement for the proportion of self-developed data processing algorithms into the legal framework, guide enterprises to tackle core algorithm technologies through the establishment of special support funds and other supporting policies, and improve the security autonomy of enterprise data processing. Properly handle the relationship between data security and efficiency, always prioritize security, and standardize data circulation and transaction behavior. At the domestic level, clear data transaction rules and processes should be established to ensure the legality, standardization, and transparency of data transactions, and transaction security should be guaranteed through technical means such as data encryption, access control, and security auditing. At the overseas level, optimize the regulatory mechanism for cross-border data circulation: establish a dynamic management mechanism of "whitelist+security assessment" for cross-border data circulation, clarify the scope of countries and regions that legally receive data, and ensure that the cross-border flow of data is controllable and traceable; Build a full chain supervision system of "pre evaluation, in-process monitoring, and post traceability", requiring data operators to complete the collection and storage of information data within the country, conduct security assessments and submit corresponding security reports before leaving the country. Build a multi-party collaborative security system and improve cross departmental coordination and supervision mechanisms. Establish a joint meeting mechanism, where relevant departments share key information such as data security filing, circulation transactions, entry and exit management, risk assessment, and post disposal. Build a national information security assessment platform and a unified indicator system, improve information sharing mechanisms, and promote the formation of an information security protection ecosystem involving multiple stakeholders such as the government, enterprises, associations, and research institutes. Strengthen law enforcement and supervision, and improve emergency response mechanisms. Strictly implement the key data review system, apply technologies such as "encrypted transmission+implicit watermarking" to critical data to ensure data transmission security; Conduct network security checks and risk assessments on data operators and related enterprises based on data volume and type, and conduct regular special inspections to prevent potential risks; Develop a graded and classified emergency response plan for information security incidents, within the emergency response framework of "discovery control assessment remediation summary", clarify standardized disposal processes for scenarios such as data breaches, network attacks, and system crashes, and ensure the timeliness and effectiveness of emergency response. 2. Strengthen the cultivation of information security talents and technological research and development. Information security work needs to be supported by high-quality talents and driven by innovation. Only by promoting the development of education and technology talents as a whole, doing a good job in talent cultivation, adhering to technology research and development leading industrial upgrading, accelerating the transformation of scientific and technological achievements, can talent cultivation and technology research and development empower national information security work, and lay a talent and technical foundation for effective protection of information security. Strengthen the cultivation of high-level talents and enhance practical training in information security. Universities should be guided to offer customized professional directions and optimize their training systems in the field of information security, with a focus on integrating information security with disciplines such as artificial intelligence, biomedical science, and economic law, in order to cultivate high-quality talents with interdisciplinary research backgrounds. Deepen the collaborative education between industry, academia, and research institutions, support universities, technology enterprises, and research institutions in the field of information security to establish stable cooperative relationships, and cultivate compound talents with both innovation and practical abilities through deepening the integration of industry, academia, and research in the field of information security. In the digital economy demonstration zone, support universities, research institutions, and enterprises to jointly build information security training bases, and cultivate a group of professional and technical talents with practical experience in computer science, artificial intelligence, and information security. Accurately integrating ideological and political education into the entire process of curriculum teaching and practical training, and building a high-quality information security talent team that loves the Party and has firm beliefs. Increase government investment in information security and accelerate the research and application of security technologies. Firstly, increase investment in basic research and core technology development in the field of information security, such as establishing a national level information security technology special fund, introducing policies such as technology innovation rewards, financial support, and government procurement, focusing on supporting the research and development of key core technologies such as data encryption, security auditing, and intrusion detection, and encouraging and guiding enterprises to carry out information security protection technology research and development. Secondly, support universities, research institutions, and enterprises to jointly build innovation platforms, promote the deep integration of technological innovation and industrial innovation in the field of information security, and connect all links of the "basic research technology breakthrough industrial application" chain. Finally, promote the application of advanced technologies such as "security sandboxes", "data anonymization", and "zero trust architecture" in the field of information security, encourage enterprises to use localized information security technologies, and achieve structured management of "information security filtering+intellectual property protection+personal information anonymization". 3. Enhancing awareness of information security and firmly establishing national security awareness, creating a strong atmosphere for the whole society to pay attention to information security, are the value goals and practical guidance for effectively carrying out information security work. We should strengthen the information security awareness of enterprises, vigorously improve the information security quality of the masses, firmly adhere to the bottom line of information security, and form a strong joint force of the whole society to safeguard national information security. Establish specialized information security governance organizations by industry, and establish industry security assessment and sharing mechanisms. On the one hand, we support the establishment of specialized information security protection organizations in key industries such as finance, energy, and artificial intelligence, and involve enterprise leaders, research experts, and information security practitioners to jointly develop industry information security self-discipline conventions, clarifying behavioral norms for data collection, storage, trading, and other aspects. We will focus on improving the technical specifications for information security protection, refining the requirements for key technical operations, embedding the principles of "minimum necessity" and "informed consent" into the entire data processing process, and creating a compliant and orderly industry ecosystem. On the other hand, industry associations take the lead in conducting annual safety compliance ratings, publishing industry safety white papers and typical risk cases, building cross enterprise safety information sharing platforms, and providing risk warning services for small and medium-sized enterprises. Strengthen the main responsibility of enterprises and build a solid defense line for information security. Encourage enterprises to embed information security concepts into their development strategies, conduct regular thematic training, and strengthen the information security awareness of all employees. Promote enterprises to establish and improve data lifecycle management systems, and achieve closed-loop supervision of the entire chain of data collection, storage, use, and destruction. Establish a sound grading evaluation system for enterprise digital information management capabilities, and provide incentive policies such as government priority procurement and project application tilt to enterprises with higher ratings, guiding them to enhance their ability to independently protect information security. Carry out popular science education for all and enhance the information security literacy of the whole society. On the one hand, coordinated by relevant departments and relying on various channels such as television, social media, and community promotion, we will strengthen the interpretation of information security policies, risk warnings, and knowledge dissemination, and enhance the public's awareness of information security and risk prevention. On the other hand, support industry associations and information security enterprises to carry out free public consultation, providing voluntary assistance to the public in personal information protection, network security problem investigation, and other areas. In addition, we will pay attention to the risk of information leakage in cross-border communication among citizens, carry out special publicity and education, publish and popularize cross-border information security guidelines, and ensure the information security of citizens' cross-border communication. 4. Participating in international information security cooperation, the rapid evolution of emerging technologies such as artificial intelligence and cloud computing has made information attack methods increasingly diverse and intelligent. Faced with these common challenges, no country can stand alone, nor can any country solve them alone. Only by actively participating in national information security cooperation and reaching international consensus can we provide a secure information network environment and a safe and orderly ecology for human development and progress. Deeply participate in the formulation of international rules for information security and align with high standard digital economic and trade rules. In terms of rule making, relying on the United Nations, G20, APEC, and other organizations, we deeply participate in international standard consultations in key information infrastructure, network security, personal information protection, and data security, and contribute to China's solutions for information security governance. Establish an efficient information security response cooperation mechanism with governments of various countries, with a focus on promoting consensus on cross-border data flows such as "mutual recognition of security assessments" and "integration of compliance systems", and improving the ability to respond to and handle cross-border information and data security incidents. In terms of application of technical standards, relying on the International Organization for Standardization, we took the lead in formulating technical specifications for data encryption, anonymous processing, generative artificial intelligence security signs and other technologies, and promoted the transformation of technical solutions in China's advantageous fields such as quantum security communications, industrial Internet security, etc. into international standards. Build multi-level multilateral information security cooperation and strengthen cross-border collaborative governance capabilities. Actively building a cross-border cooperation framework, strengthening mutual trust through high-level dialogues, special meetings, etc., and establishing an international security cooperation system for cross-border data flow. Deepen cross-border joint research and development of key information security technologies, focus on cooperation in core areas such as data encryption and anonymization, and consolidate global consensus on maintaining information security. In addition, actively promoting academic exchanges and cooperation between China's information security research teams and world-class institutions, and jointly cultivating high-quality information security talents. Establish a collaborative mechanism for handling information security crimes, and work together to combat cross-border illegal activities such as data theft, personal privacy breaches, and corporate property attacks. Establish a sound system for safeguarding the overseas rights and interests of enterprises, and build a strong security barrier for going global. An information security maintenance service platform should be established to provide information security assessment, risk warning, and legal adaptation services for overseas Chinese enterprises, guiding them in dealing with overseas data review and security litigation. Classify and deal with overseas information security threats: For general overseas information security threats, urge relevant parties to rectify them in a timely manner through bilateral consultations, public statements, and other means; Targeting malicious suppression, data theft, and networking

Edit:Luoyu Responsible editor:Wang Xiaojing

Source:GMW.cn

Special statement: if the pictures and texts reproduced or quoted on this site infringe your legitimate rights and interests, please contact this site, and this site will correct and delete them in time. For copyright issues and website cooperation, please contact through outlook new era email:lwxsd@liaowanghn.com

Recommended Reading Change it

Links