Equal protection assessment is network information security level protection assessment, is certified by the Ministry of Public Security has the qualification assessment organization, according to the national information security level protection specification, entrusted by the relevant units, in accordance with the relevant management specifications and technical standards, the information system security level protection status of the testing and evaluation activities.
Equal protection assessment level division: equal protection assessment level total **** divided into five levels: equal protection level 1, equal protection level 2, equal protection level 3, equal protection level 4 and equal protection level 5.
Level 1: The network information system will cause damage to the lawful rights and interests of citizens, legal persons and other organizations when it is damaged, but it will not harm national security, social order and public **** interests.
Second level: the network information system is damaged in such a way as to cause serious harm to the lawful rights and interests of citizens, legal persons and other organizations, or to the social order and public **** interests, but not to the detriment of national security.
Third level: after the network information system is damaged, it will cause serious damage to social order and public **** interests, or damage to national security.
Level IV: The network information system, after being damaged, will cause particularly serious damage to social order and public **** interests, or cause serious damage to national security.
Level V: The network information system, when damaged, will cause particularly serious damage to national security.
Industry systems requiring equal protection: including but not limited to such industries as finance, healthcare, education, energy, communications, transportation, government agencies, enterprises and institutions, central enterprises, the credit industry, software development, Internet of Things, industrial data security, big data, cloud computing, express delivery, hotels, and so on.