How to promote information security and password applications in various industries? The "Technology Afternoon Tea" event in Pudong clarified the medical | data | Pudong
Recently, the Pudong New Area Science and Technology Afternoon Tea Event was held with the theme of "Strengthening Data Security in Various Fields and Promoting the Construction of Password Application Security". The event is jointly organized by the Big Data Center of Pudong New Area in Shanghai and Shanghai Digital Industry Development Co., Ltd., and co organized by the Shanghai Commercial Cryptography Industry Association and Shanghai Yinjiang Intelligent Technology Co., Ltd. The aim is to deeply implement the Cryptography Law and the Regulations on Commercial Cryptography Management, implement the strategy of building a strong digital China and network country, and strengthen the informatization construction and password application in the medical, education, state-owned assets and other related fields of Pudong New Area in Shanghai.
During this period, the relevant person in charge of the Commercial Password Management Department of the Shanghai Municipal Password Administration interpreted the relevant policies on password applications, focusing on providing detailed explanations on the basis of password application policies, the scope and implementation plan of password applications, and the implementation process of password applications. This allowed attendees to have a clear understanding of the requirements for password application work. The relevant person in charge of the Shanghai Information Technology Application Innovation Comprehensive Service Center further elaborated on the functions and unique advantages of the Information Technology Application Innovation Comprehensive Service Center, and proposed the adaptation verification service functions and capabilities provided by the service center in confidential evaluation and testing. They shared specific content on technical support cases for adaptation verification on domestic software and hardware, the scope of talent training for adaptation verification, the requirements for adaptation process application, and the development of ecological partners.
Shi Weiguo, Director of Marketing Department of Zhixun Password Detection Technology Co., Ltd., pointed out in the theme sharing of "Commercial Password Application and Security Assessment" that the focus of security assessment work should run through the planning, construction, and operation of the system; Secondly, it is important to emphasize the importance of synchronous planning, construction, operation, and regular evaluation. At the same time, a detailed explanation was provided on the implementation process and content of confidential evaluation, as well as specific confidential evaluation items and key evaluation points, so that the attending audience had a clear overall understanding of how to carry out confidential evaluation work. At the same time, as the part-time deputy secretary-general of the Shanghai Commercial Cryptography Industry Association, he gave a detailed introduction to the association's role and related work in promoting the development of Shanghai's commercial cryptography industry, improving network security levels, and promoting Shanghai's socio-economic development.
The reporter learned that "Science and Technology Afternoon Tea" is a digital Pudong brand activity, focusing on the key work of reform and innovation in Pudong's leading area, and hot topics of urban digital transformation and high-quality industrial development. It regularly invites industry experts, technology experts, frontline scholars, and relevant responsible persons of functional departments to initiate collisions of thinking and spark inspiration, jointly enlighten wisdom, broaden horizons, stimulate innovation, and solve problems. On the same day, Li Yuliang, Product Director of Shanghai Shangxun Information Technology Co., Ltd., shared the theme of "Using AI Big Models to Realize Intelligent Management and Application of Data Assets in Innovative IT Environment". He pointed out that the regulatory requirements for medical data security come from policies and regulations such as the Data Security Law, the Personal Information Protection Law, and the Network Security Management Measures for Medical and Health Institutions. Based on his rich experience in data security, he proposed solutions and ideas for intelligent management and application of medical data based on AI big models, addressing the challenges of medical data security management and the contradiction between data classification and grading.
Four guests, including Yang Champion, Director of Data Operations at Shanghai Digital Industry Development Co., Ltd., Xing Fei, Chairman of Shanghai Shangxun Information Technology Co., Ltd., Wei Jie, General Manager of Shanghai Ge'er Anxin Technology Co., Ltd., and Shi Weiguo, Deputy Secretary General of Shanghai Commercial Cryptography Industry Association, participated in the second half of the round table exchange session, discussing issues such as "how to plan and construct in the field of data operation and data security", "how the association can play a functional role in promoting commercial cryptography and information construction", "how to implement data security in information system replacement construction work", and "how top enterprises can create value for information system construction ecology in medical, education, and other fields".
2023 is a transitional year for the comprehensive upgrade and transformation of Pudong's information system. Pudong will continue to strengthen communication and exchange with various industries, accelerate the construction of information systems and password applications in key areas such as healthcare, education, and state-owned assets.