The state formulates an open catalog of government data, builds a unified, standardized, interconnected, secure and controllable government data open platform, and promotes the open utilization of government data. When state agencies entrust others to build and maintain e-government systems and store and process government data, they must go through strict approval procedures and supervise the entrusted party to perform corresponding data security protection obligations. The entrusted party shall perform data security protection obligations in accordance with laws, regulations and contractual agreements, and shall not retain, use, leak or provide government data to others without authorization.
? Institutions engaged in data transaction intermediary services when providing services shall require the data provider to explain the source of the data, verify the identity of both parties to the transaction, and retain audit and transaction records.
According to Article 29 of the "Data Security Law of the People's Republic of China", risk monitoring should be strengthened when carrying out data processing activities. When data security defects, loopholes and other risks are discovered, immediate measures should be taken Remedial measures; when a data security incident occurs, disposal measures should be taken immediately, users should be notified promptly and reported to the relevant competent authorities in accordance with regulations.