A proposal by Zhou Hongyi, a member of the National Committee of the Chinese People's Political Consultative Conference (CPPCC) and founder of 360 Group, titled "Building a Data Circulation Security Infrastructure Platform to Escort the High-Quality Development of Digital China," has been successfully selected among the list of 100 outstanding proposals. This proposal focuses on the core challenges of data circulation security and puts forward a systematic solution, providing an important reference for promoting the compliant and efficient flow of data elements and aiding the development of new quality productive forces.
With the establishment of the National Data Administration and the implementation of a series of fundamental systems, China's data element market is experiencing explosive growth. Statistics show that the transaction scale of the national data market reached 1.6 trillion yuan in 2024, a year-on-year increase of over 30%, with the transaction scale in the on-market sector even doubling. However, as data dividends are released at an accelerated pace, security challenges are becoming increasingly severe.
Confronted with the complex and systemic risks arising from the expanding scale of data circulation, Zhou Hongyi pointed out in his proposal that current data security governance faces "three major shortcomings." Firstly, most market entities adopt isolated protection models, leading to security data being siloed and resulting in weak overall situational awareness. Secondly, security construction and operational standards vary across regions, causing resource waste due to duplicated investments. Thirdly, there is a lack of cross-industry and cross-regional coordination mechanisms, making it difficult to address composite threats like APT attacks and collaborative challenges. These issues have become critical bottlenecks that restrict the release of data value and threaten the digital economy ecosystem.
To address the aforementioned pain points, Zhou Hongyi put forward three recommendations in his proposal. The first is to build a data circulation security infrastructure platform to break down "information silos," establish a full-process, end-to-end security monitoring mechanism, and form a multi-dimensional protection system. The second is to establish unified security standards, regulating aspects such as certified access and data desensitization to ensure the entire circulation process is controlled. The third is to create a multi-stakeholder collaborative operation system, integrating resources from regulatory bodies, data suppliers, and demanders to achieve dynamic control throughout the entire data lifecycle.