Workflow
填补公共数据运营制度空白,四川为数据要素市场化“探路”
Mei Ri Jing Ji Xin Wen·2025-11-03 02:53

Core Viewpoint - The introduction of the "Implementation Measures for Public Data Resource Registration Management" and "Implementation Measures for Public Data Resource Authorized Operation" in Sichuan aims to fill the institutional gap in public data operation and provide a basis for subsequent detailed regulations [1][2]. Group 1: Public Data Resource Significance - Public data resources, generated by government departments and enterprises during service provision, have become an important production factor, significantly supporting digital government construction and optimizing the business environment [1][2]. - Sichuan's rich electronic information industry and abundant data resources present a strong foundation for advancing public data resource registration and authorized operation [2]. Group 2: Authorization and Operation Framework - The new measures clarify the authorization levels and modes, with a focus on overall authorization while allowing for field-specific and scenario-based authorizations as needed [2]. - The approach of "managing at the first level and allowing flexibility at the second level" will be adopted to select operational institutions for data authorization and operation [2]. Group 3: Application Scenarios - In the healthcare sector, Sichuan is leveraging patient and disease data to create AI datasets, enhancing the efficiency of medical data utilization [3]. - The city of Chengdu is exploring smart city governance through data resources, effectively aiding urban management [3]. Group 4: Data Security and Open Access - Sichuan's strategy emphasizes "safe and controllable, value-releasing" principles, ensuring that public data development is manageable and secure [5]. - The province will implement a strict data classification and protection system, ensuring compliance and risk control from the source [5]. Group 5: Future Plans - Sichuan plans to accelerate the construction of a public data resource registration platform and clarify the scope of authorized operations, operational models, and data security requirements [5].