2025-12-5 10.1.6.65
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/T 42460-2023
GB/T 42460-2023   Information security technology—Guide for evaluating the effectiveness of personal information de-identification (English Version)
Standard No.: GB/T 42460-2023 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 9500 words Translation Price(USD):285.0 remind me the price change

Email:

Implemented on:2023-10-1 Delivery: via email in 1 business day

→ → →

,,2023-10-1,16824088545150000c1a1b5a9b7c78fa
Standard No.: GB/T 42460-2023
English Name: Information security technology—Guide for evaluating the effectiveness of personal information de-identification
Chinese Name: 信息安全技术 个人信息去标识化效果评估指南
Chinese Classification: L80    Data encryption
Professional Classification: GB    National Standard
Source Content Issued by: SAMR; SAC
Issued on: 2023-03-17
Implemented on: 2023-10-1
Status: valid
Target Language: English
File Format: PDF
Word Count: 9500 words
Translation Price(USD): 285.0
Delivery: via email in 1 business day
Information security technology - Guide for evaluating the effectiveness of personal information de-identification 1 Scope This document provides the guide for classifying and evaluating the effectiveness of personal information de-identification. This document is applicable to personal information de-identification activities as well as personal information security management, supervision and evaluation. 2 Normative references The following documents contain provisions which, through reference in this text, constitute provisions of this document. For dated references, only the edition cited applies. For undated references, the latest edition (including any amendments) applies. GB/T 25069-2022 Information security techniques - Terminology GB/T 35273-2020 Information security technology - Personal information security specification GB/T 37964-2019 Information security technology - Guide for de-identifying personal information 3 Terms and definitions For the purposes of this document, the terms and definitions given in GB/T 25069-2022, GB/T 35273-2020, GB/T 37964-2019 and the following apply. 3.1 personal information all kinds of information related to identified or identifiable natural persons, recorded electronically or otherwise Note: It does not include anonymized information. [Source: GB/T 35273-2020, 3.1, modified] 3.2 personal information subject natural person identified by or connected to personal information [Source: GB/T 35273-2020, 3.3] 3.3 de-identification process of processing personal information in technical terms so that the personal information subject cannot be identified or connected without additional information [Source: GB/T 35273-2020, 3.15] 3.4 microdata structured dataset in which each record (row) corresponds to a personal information subject and each field (column) in the record corresponds to an attribute [Source: GB/T 37964-2019, 3.4] 3.5 identifier one or more attributes of the microdata, which can realize the unique identification of personal information subject Note: Identifiers are classified into direct identifiers and quasi-identifiers. [Source: GB/T 37964-2019, 3.6] 3.6 direct identifier attribute of microdata that can be individually used to identify the personal information subject in specific context Note: See Annex A for common direct identifiers. [Source: GB/T 37964-2019, 3.7] 3.7 quasi-identifier attribute of microdata that, when combined with other attributes, can be used to uniquely identify the personal information subject Note: See Annex B for common quasi-identifiers, and Annex C for identification of quasi-identifiers. [Source: GB/T 37964-2019, 3.8] 3.8 re-identification process of re-associating a de-identified dataset to the original personal information subject or a personal information subject [Source: GB/T 37964-2019, 3.9] 3.9 completely public sharing release of data, usually release of data directly to the public via the Internet, with data being difficult to recall once after being released [Source: GB/T 37964-2019, 3.12] 3.10 controlled public sharing constraining the use of data through data use agreement [Source: GB/T 37964-2019, 3.13] 3.11 enclave public sharing sharing of data within a physical or virtual enclave, out of which data cannot flow [Source: GB/T 37964-2019, 3.14] 3.12 re-identification risk identifiability probability that the personal information subject can be identified from the data 3.13 equivalence class collection of record rows in microdata where all quasi-identifiers have the same attribute value 3.14 acceptable risk threshold critical value set for re-identification risk Note: When the re-identification risk is greater than this value, mitigation measures (including de-identification) and emergency measures shall be taken to realize that the risk is within a controllable range. 4 Classification of effectiveness of personal information de-identification Based on whether the data can be used to directly identify the personal information subject, or to what probability it can be used to identify the personal information subject, the identifiability of personal information is classified into 4 classes, as detailed in Table 1, to distinguish the effectiveness of personal information de-identification. Table 1 Classification of personal information identifiability into 4 classes Classification Classification basis Class 1 Contain direct identifiers, which can be used to directly identify the personal information subject in specific context Class 2 Contain no direct identifiers but quasi-identifiers, with the re-identification risk higher than or equal to the acceptable risk threshold Class 3 Contain no direct identifiers but quasi-identifiers, with the re-identification risk lower than the acceptable risk threshold Class 4 Contain no identifiers
Foreword i Introduction ii 1 Scope 2 Normative references 3 Terms and definitions 4 Classification of effectiveness of personal information de-identification 5 Process for evaluating the effectiveness of personal information de-identification 6 Evaluation practice 6.1 Preparation for evaluation 6.2 Qualitative evaluation 6.3 Quantitative evaluation 6.4 Formation of evaluation conclusion 6.5 Communication and negotiation 6.6 Evaluation process document management Annex A (Informative) Examples of direct identifiers Annex B (Informative) Examples of quasi-identifiers Annex C (Information) Quasi-identifier identification Annex D (Informative) Example of de-identification effectiveness evaluation based on K-anonymity model Bibliography
Referred in GB/T 42460-2023:
*GB/T 25069-2022 Information security techniques—Terminology
*GB/T 35273-2020 Information security technology—Personal information security specification
*GB/T 37964-2019 Information security technology—Guide for de-identifying personal information
Code of China
Standard
GB/T 42460-2023  Information security technology—Guide for evaluating the effectiveness of personal information de-identification (English Version)
Standard No.GB/T 42460-2023
Statusvalid
LanguageEnglish
File FormatPDF
Word Count9500 words
Price(USD)285.0
Implemented on2023-10-1
Deliveryvia email in 1 business day
Detail of GB/T 42460-2023
Standard No.
GB/T 42460-2023
English Name
Information security technology—Guide for evaluating the effectiveness of personal information de-identification
Chinese Name
信息安全技术 个人信息去标识化效果评估指南
Chinese Classification
L80
Professional Classification
GB
ICS Classification
Issued by
SAMR; SAC
Issued on
2023-03-17
Implemented on
2023-10-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
9500 words
Price(USD)
285.0
Keywords
GB/T 42460-2023, GB 42460-2023, GBT 42460-2023, GB/T42460-2023, GB/T 42460, GB/T42460, GB42460-2023, GB 42460, GB42460, GBT42460-2023, GBT 42460, GBT42460
Introduction of GB/T 42460-2023
Information security technology - Guide for evaluating the effectiveness of personal information de-identification 1 Scope This document provides the guide for classifying and evaluating the effectiveness of personal information de-identification. This document is applicable to personal information de-identification activities as well as personal information security management, supervision and evaluation. 2 Normative references The following documents contain provisions which, through reference in this text, constitute provisions of this document. For dated references, only the edition cited applies. For undated references, the latest edition (including any amendments) applies. GB/T 25069-2022 Information security techniques - Terminology GB/T 35273-2020 Information security technology - Personal information security specification GB/T 37964-2019 Information security technology - Guide for de-identifying personal information 3 Terms and definitions For the purposes of this document, the terms and definitions given in GB/T 25069-2022, GB/T 35273-2020, GB/T 37964-2019 and the following apply. 3.1 personal information all kinds of information related to identified or identifiable natural persons, recorded electronically or otherwise Note: It does not include anonymized information. [Source: GB/T 35273-2020, 3.1, modified] 3.2 personal information subject natural person identified by or connected to personal information [Source: GB/T 35273-2020, 3.3] 3.3 de-identification process of processing personal information in technical terms so that the personal information subject cannot be identified or connected without additional information [Source: GB/T 35273-2020, 3.15] 3.4 microdata structured dataset in which each record (row) corresponds to a personal information subject and each field (column) in the record corresponds to an attribute [Source: GB/T 37964-2019, 3.4] 3.5 identifier one or more attributes of the microdata, which can realize the unique identification of personal information subject Note: Identifiers are classified into direct identifiers and quasi-identifiers. [Source: GB/T 37964-2019, 3.6] 3.6 direct identifier attribute of microdata that can be individually used to identify the personal information subject in specific context Note: See Annex A for common direct identifiers. [Source: GB/T 37964-2019, 3.7] 3.7 quasi-identifier attribute of microdata that, when combined with other attributes, can be used to uniquely identify the personal information subject Note: See Annex B for common quasi-identifiers, and Annex C for identification of quasi-identifiers. [Source: GB/T 37964-2019, 3.8] 3.8 re-identification process of re-associating a de-identified dataset to the original personal information subject or a personal information subject [Source: GB/T 37964-2019, 3.9] 3.9 completely public sharing release of data, usually release of data directly to the public via the Internet, with data being difficult to recall once after being released [Source: GB/T 37964-2019, 3.12] 3.10 controlled public sharing constraining the use of data through data use agreement [Source: GB/T 37964-2019, 3.13] 3.11 enclave public sharing sharing of data within a physical or virtual enclave, out of which data cannot flow [Source: GB/T 37964-2019, 3.14] 3.12 re-identification risk identifiability probability that the personal information subject can be identified from the data 3.13 equivalence class collection of record rows in microdata where all quasi-identifiers have the same attribute value 3.14 acceptable risk threshold critical value set for re-identification risk Note: When the re-identification risk is greater than this value, mitigation measures (including de-identification) and emergency measures shall be taken to realize that the risk is within a controllable range. 4 Classification of effectiveness of personal information de-identification Based on whether the data can be used to directly identify the personal information subject, or to what probability it can be used to identify the personal information subject, the identifiability of personal information is classified into 4 classes, as detailed in Table 1, to distinguish the effectiveness of personal information de-identification. Table 1 Classification of personal information identifiability into 4 classes Classification Classification basis Class 1 Contain direct identifiers, which can be used to directly identify the personal information subject in specific context Class 2 Contain no direct identifiers but quasi-identifiers, with the re-identification risk higher than or equal to the acceptable risk threshold Class 3 Contain no direct identifiers but quasi-identifiers, with the re-identification risk lower than the acceptable risk threshold Class 4 Contain no identifiers
Contents of GB/T 42460-2023
Foreword i Introduction ii 1 Scope 2 Normative references 3 Terms and definitions 4 Classification of effectiveness of personal information de-identification 5 Process for evaluating the effectiveness of personal information de-identification 6 Evaluation practice 6.1 Preparation for evaluation 6.2 Qualitative evaluation 6.3 Quantitative evaluation 6.4 Formation of evaluation conclusion 6.5 Communication and negotiation 6.6 Evaluation process document management Annex A (Informative) Examples of direct identifiers Annex B (Informative) Examples of quasi-identifiers Annex C (Information) Quasi-identifier identification Annex D (Informative) Example of de-identification effectiveness evaluation based on K-anonymity model Bibliography
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/T 42460-2023, GB 42460-2023, GBT 42460-2023, GB/T42460-2023, GB/T 42460, GB/T42460, GB42460-2023, GB 42460, GB42460, GBT42460-2023, GBT 42460, GBT42460