Tagged articles
9 articles
Page 1 of 1
Black & White Path
Black & White Path
Feb 11, 2026 · Information Security

New Policy Unveiled: Data Security, Risk Assessment, and Vulnerability Management Markets Poised for Surge

The new “Automotive Data Outbound Security Guidelines (2026)” issued by MIIT and other ministries seeks to balance data security with cross‑border flow, defining a two‑layer demand, detailing data categories, assessment, contracts, certification, and protection measures, and signalling a massive market opportunity for data‑security services in the automotive industry.

Regulatory ComplianceVulnerability Managementautomotive
0 likes · 15 min read
New Policy Unveiled: Data Security, Risk Assessment, and Vulnerability Management Markets Poised for Surge
Eric Tech Circle
Eric Tech Circle
Jan 13, 2025 · Industry Insights

Essential Qualification Checklist for Launching a WeChat Mini Program

This guide outlines all the pre‑launch qualifications needed for a WeChat mini program—including cloud service setup, domain and ICP filing, developer account registration, merchant number acquisition, and service‑specific permits—so developers can avoid delays and streamline their launch process.

Cloud ServicesICP filingQualification Checklist
0 likes · 4 min read
Essential Qualification Checklist for Launching a WeChat Mini Program
Architecture Breakthrough
Architecture Breakthrough
Nov 12, 2024 · Industry Insights

Understanding Corporate Banking Clients: IDs, Licenses, and Seals Explained

This article provides fintech developers with a comprehensive overview of corporate banking client classifications, the unified social credit code, business license types (paper and electronic), and the various corporate seals, helping them grasp essential regulatory concepts for effective KYC and service design.

Business LicenseCorporate BankingCorporate Seal
0 likes · 13 min read
Understanding Corporate Banking Clients: IDs, Licenses, and Seals Explained
AntTech
AntTech
Apr 2, 2024 · Information Security

Web3 Anti-Money Laundering Platform: Real-Time Risk Identification and Prevention

This article outlines Ant Group's Web3 multi‑dimensional intelligent anti‑money‑laundering platform, detailing common cryptocurrency risk types, regulatory compliance challenges, and the platform's real‑time monitoring, contract scanning, and graph‑based risk tagging capabilities for proactive detection and rapid response.

Regulatory ComplianceRisk DetectionWeb3
0 likes · 9 min read
Web3 Anti-Money Laundering Platform: Real-Time Risk Identification and Prevention
php Courses
php Courses
Jul 12, 2023 · Mobile Development

Implementation Guide for New App Network Entry Requirements: Personal Information Protection, Permission Calls, Updates, and Signature

This article explains how to adapt mobile apps to the latest Ministry of Industry and Information Technology network entry rules by covering basic mode design, personal data protection, permission request practices, update notifications, and signature authenticity, while also listing example implementations from popular apps.

App UpdateRegulatory Compliancemobile app
0 likes · 6 min read
Implementation Guide for New App Network Entry Requirements: Personal Information Protection, Permission Calls, Updates, and Signature
DataFunSummit
DataFunSummit
Dec 15, 2022 · Information Security

Multi‑Party Secure Risk Control: Challenges, Architecture, and Practice

This article examines the growing complexity of financial risk scenarios, outlines global privacy regulations, describes Ant Group's three‑layer multi‑party secure risk‑control architecture, showcases anti‑fraud and external client use cases, and discusses current challenges and future directions for secure, privacy‑preserving risk management.

Regulatory Compliancefinancial securityprivacy protection
0 likes · 14 min read
Multi‑Party Secure Risk Control: Challenges, Architecture, and Practice
政采云技术
政采云技术
Nov 7, 2022 · Information Security

Zhejiang Government Procurement Cloud's Data Security and Compliance Framework

Zhejiang Government Procurement Cloud's CTO Liu Changyu presented at the Cloud Summit, detailing the company's comprehensive data security and compliance framework including 'three-in-one' certifications, 'four-in-one' data security construction, and intelligent data classification strategies.

Regulatory Compliancecompliance frameworkdata classification
0 likes · 5 min read
Zhejiang Government Procurement Cloud's Data Security and Compliance Framework
Efficient Ops
Efficient Ops
Jan 25, 2022 · Artificial Intelligence

How China’s AI Model Risk Governance Maturity Model Shapes Enterprise Compliance

The CAICT‑led “Artificial Intelligence Model Risk Governance Capability Maturity Model” standard defines lifecycle risk controls, offers a five‑level assessment framework, and guides Chinese enterprises in meeting regulatory demands, improving fairness, transparency, privacy, auditability, and overall model safety.

AI GovernanceRegulatory Complianceassessment
0 likes · 7 min read
How China’s AI Model Risk Governance Maturity Model Shapes Enterprise Compliance
Efficient Ops
Efficient Ops
Sep 17, 2020 · Cloud Computing

How Ping An Reached 80% Cloud Migration in 5 Years: Strategies & Governance

This article examines how Ping An Group rapidly migrated over 80% of its complex financial IT systems to the cloud between 2015 and 2020, detailing differentiated cloud strategies, unified governance, security certifications, and the resulting business agility, risk mitigation, and digital transformation benefits.

IT GovernanceRegulatory Compliancecloud migration
0 likes · 8 min read
How Ping An Reached 80% Cloud Migration in 5 Years: Strategies & Governance