2025-12-14 216.73.216.3
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/Cryptographic Techniques 2008
Cryptographic Techniques 2008   Regulations on Government Procurement of Information Products Containing Cryptographic Techniques (English Version)
Standard No.: Cryptographic Techniques 2008 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 1200 words Translation Price(USD):60.0 remind me the price change

Email:

Implemented on:2008-3-1 Delivery: via email in 1 business day

→ → →

,,2008-3-1,1535686209455000cffb7c12ed4fa3cc
Standard No.: Cryptographic Techniques 2008
English Name: Regulations on Government Procurement of Information Products Containing Cryptographic Techniques
Chinese Name: 含有密码技术的信息产品政府采购规定
Professional Classification: Cr    
Source Content Issued by: SCAB, MOST, MPS, MSS, MOF, MIT, MOFCOM, SSB, SCIO
Issued on: 2008-01-08
Implemented on: 2008-3-1
Status: valid
Target Language: English
File Format: PDF
Word Count: 1200 words
Translation Price(USD): 60.0
Delivery: via email in 1 business day
Regulations on Government Procurement of Information Products Containing Cryptographic Techniques 含有密码技术的信息产品政府采购规定 Article 1 With a view to protecting national information security and regulating the procurement activities of information products containing cryptographic techniques in government information system and information systems involving state secrets, the Regulations is hereby formulated in accordance with Government Procurement Law of People’s Republic of China, Law of the People's Republic of China on Guarding State Secrets, National Security Law of the People's Republic of China, Regulations on Administration of Commercial Cipher Codes and relevant laws and regulations. Article 2 The information products containing cryptographic techniques mentioned in the Regulations refer to softwares and hardwares realizing security functions such as information encryption and decryption, certification and authentication, authorization management and access control by cryptographic techniques. Article 3 For the purposes of the Regulations, procurement activities of information products containing cryptographic techniques in government information system and information systems involving state secrets by state organs, institutions and organizations at all levels (hereinafter collectively referred to as the Purchaser) with fiscal funds apply. Article 4 The cryptography administration departments, finance departments and secrecy administration departments at all levels shall, in accordance with their respective responsibilities, supervise and manage the procurement of information products containing cryptographic techniques in government information system and information systems involving state secrets. Other relevant departments of people's governments at all levels shall, in accordance with law, fulfill their management responsibilities to supervise and manage the government procurement activities related to the Regulations. Article 5 The State implements catalog management on procurement of information products containing cryptographic techniques. When purchasing information products containing cryptographic techniques, the Purchaser shall select those in the catalog. Article 6 Specific scope of information products containing cryptographic techniques is determined by the State Cryptography Administration jointly with Ministry of Science and Technology, Ministry of Public Security, Ministry of State Security, Ministry of Finance, Ministry of Information Industry, Ministry of Commerce, National Administration for the Protection of State Secrets and State Council Informatization Office. The Ministry of Finance shall, in conjunction with the State Cryptography Administration, develop a government procurement catalog of information products containing cryptographic techniques within the scope as determined, and then release it within appropriate range and adjust timely.
Article 1 With a view to protecting national information security and regulating the procurement activities of information products containing cryptographic techniques in government information system and information systems involving state secrets, the Regulations is hereby formulated in accordance with Government Procurement Law of People’s Republic of China, Law of the People's Republic of China on Guarding State Secrets, National Security Law of the People's Republic of China, Regulations on Administration of Commercial Cipher Codes and relevant laws and regulations. Article 2 The information products containing cryptographic techniques mentioned in the Regulations refer to softwares and hardwares realizing security functions such as information encryption and decryption, certification and authentication, authorization management and access control by cryptographic techniques. Article 3 For the purposes of the Regulations, procurement activities of information products containing cryptographic techniques in government information system and information systems involving state secrets by state organs, institutions and organizations at all levels (hereinafter collectively referred to as the Purchaser) with fiscal funds apply. Article 4 The cryptography administration departments, finance departments and secrecy administration departments at all levels shall, in accordance with their respective responsibilities, supervise and manage the procurement of information products containing cryptographic techniques in government information system and information systems involving state secrets. Other relevant departments of people's governments at all levels shall, in accordance with law, fulfill their management responsibilities to supervise and manage the government procurement activities related to the Regulations.
Referred in Cryptographic Techniques 2008:
*GB 4943.1-2011 Information technology equipment -Safety - Part 1: General requirements
*FZ/T 73020-2012 Knitted Casual Wear
*GB/T 14048.5-2017 Low-voltage switchgear and controlgear-Part 5-1:Control circuit devices and switching element-Electromechanical control circuit devices
*GB 4706.1-2005 Household and Similar Electrical Appliances – Safety - Part 1: General Requirements
*QB/T 1333-2018 Handbag and Knapsack
*GB 5749-2022 Standards for drinking water quality
*GB 150-2011 Pressure Vessels (Collection GB150.1~150.4-2011)
*QB/T 1333-2018 Handbag and Knapsack
*GB 17625.1-2022 Electromagnetic compatibility—Limits—Part 1: Limits for harmonic current emissions (equipment input current ≤ 16A per phase)
*TSG 21-2016/XG1-2020 Supervision Regulation on Safety Technology for Stationary Pressure Vessel,includes Amendment 1
*GB 14748-2006 Safety Requirements for Wheeled Child Conveyances
*GB/T 35590-2017 Information technology―General specification for portable digital equipments used power bank
*GB 3565-2005 Safety requirements for bicycles
*GB/T 3077-2015 Alloy structure steels
*GB/T 19001-2016 Quality management systems―Requirements
*GB/T 699-2015 Quality carbon structural steels
Code of China
Standard
Cryptographic Techniques 2008  Regulations on Government Procurement of Information Products Containing Cryptographic Techniques (English Version)
Standard No.Cryptographic Techniques 2008
Statusvalid
LanguageEnglish
File FormatPDF
Word Count1200 words
Price(USD)60.0
Implemented on2008-3-1
Deliveryvia email in 1 business day
Detail of Cryptographic Techniques 2008
Standard No.
Cryptographic Techniques 2008
English Name
Regulations on Government Procurement of Information Products Containing Cryptographic Techniques
Chinese Name
含有密码技术的信息产品政府采购规定
Chinese Classification
Professional Classification
Cr
ICS Classification
Issued by
SCAB, MOST, MPS, MSS, MOF, MIT, MOFCOM, SSB, SCIO
Issued on
2008-01-08
Implemented on
2008-3-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
1200 words
Price(USD)
60.0
Keywords
Cryptographic Techniques 2008, Cryptographic/T Techniques 2008, CryptographicT Techniques 2008, CryptographicTechniques2008, Cryptographic/TTechniques2008, CryptographicTTechniques2008,
Introduction of Cryptographic Techniques 2008
Regulations on Government Procurement of Information Products Containing Cryptographic Techniques 含有密码技术的信息产品政府采购规定 Article 1 With a view to protecting national information security and regulating the procurement activities of information products containing cryptographic techniques in government information system and information systems involving state secrets, the Regulations is hereby formulated in accordance with Government Procurement Law of People’s Republic of China, Law of the People's Republic of China on Guarding State Secrets, National Security Law of the People's Republic of China, Regulations on Administration of Commercial Cipher Codes and relevant laws and regulations. Article 2 The information products containing cryptographic techniques mentioned in the Regulations refer to softwares and hardwares realizing security functions such as information encryption and decryption, certification and authentication, authorization management and access control by cryptographic techniques. Article 3 For the purposes of the Regulations, procurement activities of information products containing cryptographic techniques in government information system and information systems involving state secrets by state organs, institutions and organizations at all levels (hereinafter collectively referred to as the Purchaser) with fiscal funds apply. Article 4 The cryptography administration departments, finance departments and secrecy administration departments at all levels shall, in accordance with their respective responsibilities, supervise and manage the procurement of information products containing cryptographic techniques in government information system and information systems involving state secrets. Other relevant departments of people's governments at all levels shall, in accordance with law, fulfill their management responsibilities to supervise and manage the government procurement activities related to the Regulations. Article 5 The State implements catalog management on procurement of information products containing cryptographic techniques. When purchasing information products containing cryptographic techniques, the Purchaser shall select those in the catalog. Article 6 Specific scope of information products containing cryptographic techniques is determined by the State Cryptography Administration jointly with Ministry of Science and Technology, Ministry of Public Security, Ministry of State Security, Ministry of Finance, Ministry of Information Industry, Ministry of Commerce, National Administration for the Protection of State Secrets and State Council Informatization Office. The Ministry of Finance shall, in conjunction with the State Cryptography Administration, develop a government procurement catalog of information products containing cryptographic techniques within the scope as determined, and then release it within appropriate range and adjust timely.
Contents of Cryptographic Techniques 2008
Article 1 With a view to protecting national information security and regulating the procurement activities of information products containing cryptographic techniques in government information system and information systems involving state secrets, the Regulations is hereby formulated in accordance with Government Procurement Law of People’s Republic of China, Law of the People's Republic of China on Guarding State Secrets, National Security Law of the People's Republic of China, Regulations on Administration of Commercial Cipher Codes and relevant laws and regulations. Article 2 The information products containing cryptographic techniques mentioned in the Regulations refer to softwares and hardwares realizing security functions such as information encryption and decryption, certification and authentication, authorization management and access control by cryptographic techniques. Article 3 For the purposes of the Regulations, procurement activities of information products containing cryptographic techniques in government information system and information systems involving state secrets by state organs, institutions and organizations at all levels (hereinafter collectively referred to as the Purchaser) with fiscal funds apply. Article 4 The cryptography administration departments, finance departments and secrecy administration departments at all levels shall, in accordance with their respective responsibilities, supervise and manage the procurement of information products containing cryptographic techniques in government information system and information systems involving state secrets. Other relevant departments of people's governments at all levels shall, in accordance with law, fulfill their management responsibilities to supervise and manage the government procurement activities related to the Regulations.
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
Cryptographic Techniques 2008, Cryptographic/T Techniques 2008, CryptographicT Techniques 2008, CryptographicTechniques2008, Cryptographic/TTechniques2008, CryptographicTTechniques2008,