GB/T 32921-2016 Translated English of Chinese Standard (GB/T32921-2016): Information security technology -- Security criterion on supplier conduct of information technology products [Buy--download True-PDF in 3-second: https://play.google.com/books > Sign in > This BOOK > "3-dots" > Export > Save as "*.pdf"]https://www.chinesestandard.net, 05/11/2021 - 10 من الصفحات This Standard specifies the basic guidelines that information technology product suppliers shall abide by, so as to protect user-related information and maintain user information security in the process of providing information technology products. This Standard applies to the management of supplier behavior in the supply, operation or maintenance of information technology products. It can also provide a basis for the research and development, operation and maintenance, and evaluation of information technology products. |
عبارات ومصطلحات مألوفة
Basic Security Beijing changing product China clearly informed collecting user related collection and processing collection of user control activities implemented controlling the user's critical information infrastructure data interaction detection and verification Display prompt information encryption algorithm encryption technology expressed consent GB/T guidelines that information information NOTE information related Information security technology information systems information technology products information when collecting inspection and verification interaction between products ISO/IEC maintain the interface management measures national critical information Necessary technical Network NIST notified operation port and protocol product configuration products and suppliers prohibit protect user related provide detection provides information technology referenced document remote control activities Safety guidelines security of user Security techniques specifies the basic Standard specifies stored Strengthening the Protection taken to ensure technical and management technology product suppliers Terms and definitions test or maintain third-party organization user information user purchases user related information user-related information user's product verification methods