Normative references pe Terms and definitions Valuation principle 4.1 Overview 4.2 Value of conducting appraisal Ne 4.3 Purpose of appraisal report Ne 4.4 Subject responsible for appraisal 4.5 Fundamental principles of appraisal Pe elements of appraisal implementation process 5.1 Evaluation necessity analysis 5.2 Evaluation preparation 5.3 Data Mapping Analysis 5.4 Risk Source Identification and Analysis 5.7 Assessment Report Site ee Improvement and Chat Evaluative Compliance Examples and Assessment Highlights High-risk Personal Information Processing Activities Examples and pp Personal Information Security Impact Assessment Common Tools Table pp Personal Information Security Impact Evaluation reference method Ne must co 4.6 Evaluation implementation needs to be considered <="" td="">
GB/T 39335-2020 Referenced Document
GB/T 20984 Information security technology—Risk assessment method for information security*, 2022-04-15 Update
GB/T 25069 Information security techniques—Terminology*, 2022-03-09 Update
GB/T 35273 Information security technology—Personal information security specification
GB/T 39335-2020 history
2020GB/T 39335-2020 Information security technology—Guidance for personal information security impact assessment