Welcome to the CHEMWIN

customer service

Help Center :

FAQ Reference Guide

Customer Service :

Trading Time : 09:30-17:00 GMT+8

Customer Service line : +86 400-9692-206

(09:30-18:00 GMT+8)

Inquire Now
All Categories

[Market information]:The central bank issued the financial science and technology development plan (2022-2025) to improve the efficiency of financial supervision and reduce compliance costs.

Recently, the People's Bank of China announced the full text of the "Financial Technology Development Plan (2022-2025)" (hereinafter referred to as the "Plan"), reviewing the past financial technology development, while looking forward to the 2022-2025 financial technology development.


In terms of the application of regulatory technology, the Plan points out that in-depth regulatory technology applications, such as monetary policy, payment and settlement, anti-money laundering, credit investigation, and consumer protection, digital compliance tools are used to seamlessly embed transaction behavior monitoring, business data reporting, and risk event reporting to improve financial supervision efficiency and reduce compliance costs.


in bridging the digital divide, the Plan calls for strengthening financial accessibility services. Aiming at intelligent service methods, focusing on high-frequency financial scenarios in the daily life of the elderly, disabled, ethnic minorities, etc., deeply mining technical advantages such as artificial intelligence and big data, and optimizing interface interaction, content reading, operation prompts, voice assistance and other functions, Encourage the application of "care mode" and "elders mode", and establish a "fault-tolerant" product interaction mechanism, different from person to person, we will create aging and barrier-free mobile financial products and services such as large-character version, voice version, national language version and simplified version. Through experience learning, trial application, experience exchange, mutual assistance and other means to improve users' digital literacy, efforts will be made to bridge the digital divide caused by difficulties in the use of intelligent technology, so that the masses can better share the achievements of financial technology development.


In terms of financial technology innovation supervision, the Plan requires that, in accordance with the financial licensing business principles, all financial activities must be included in the supervision in accordance with laws and regulations, strictly clarify financial business boundaries, and strengthen the standardized management of financial institutions and technology companies. Financial technology innovation implements penetrating supervision. Prevent the blurring of business boundaries and layers of packaging products in the name of "scientific and technological innovation. We will adhere to the problem-oriented and goal-oriented approach, improve the system of regulatory rules that are compatible with financial digitization, establish professional ethics standards for financial science and technology, and build a "safety net" to prevent the transmission of technical risks to the financial sector ". Insist that financial innovation must be carried out under the premise of prudential supervision, make full use of financial technology innovation supervision tools, strengthen the full life cycle management of financial technology innovation behavior, establish and improve risk joint control and comprehensive compensation, information disclosure and commitment statement, internal control and service quality Management, safety assessment and compliance audit and other mechanisms, strengthen the main responsibility of innovation risk management of practitioners, and prevent potential risks in the integration of finance and technology from the source, effectively protect the legitimate rights and interests of financial consumers and maintain the order of market competition.


In terms of data sharing, the Plan requires that data be shared in an orderly manner. In terms of technology, actively apply multi-party security computing, federal learning, differential privacy, alliance chain and other technologies, explore the establishment of a cross-subject data security sharing privacy computing platform, and standardize the development of data sharing applications under the premise of ensuring that the original data does not leave the domain to ensure Data interaction is safe, use compliance, and scope is controllable, so that data can be used and invisible, and data does not move. In terms of management, explore the establishment of diversified data sharing and ownership determination mechanisms, clarify the ownership relationship, use conditions, and sharing scope of data, and realize cross-institutional, cross-regional, and cross-regional through model calculations, fuzzy queries, and intelligent verification. The orderly sharing of industry data resources enhances the scale effect and positive externalities of financial data under the premise of ensuring the minimum necessary and dedicated purposes, and improves the efficiency of data element resource allocation.


At the same time, the Plan clearly requires data security protection. Strictly implement data security protection laws, regulations, standards and specifications, clarify the person in charge of data security and the management organization, and comprehensively use the methods of statement and publicity, user express, etc., to clarify the purpose of original data and derivative data collection, processing methods and scope of use, and ensure that users are fully informed, Standardize the use of data collection under the premise of clear authorization to avoid excessive collection, misuse, and overflow of data. Establish and improve long-term mechanisms and protective measures for data life-cycle security management, use technical means such as concealment query, de-labeling, and trusted execution environment to prevent data reverse tracking, privacy disclosure, data tampering and improper use, and protect the privacy of data subjects from infringement in accordance with laws and regulations. Establish a historical data security cleaning mechanism, use professional technology and tools to delete and destroy user data beyond the shelf life in a timely manner, and regularly carry out data recoverability verification to ensure that data cannot be restored. If it is really necessary to save as sample data, it should be approved by the user and de-identified, moved to the non-production database for storage, to ensure that the user's private information is not directly or indirectly identified, and effectively protect the user data security.

  • 化易天下咨询

    Quick Response

    Customer service is available 24/7 for extremely fast response

  • 化易天下销售

    Exclusive Services

    Dedicated consultant 1 to 1 service

  • 化工品交易市场

    Massive Resources

    Connecting resources upstream and downstream

  • B2B化工交易

    Technology Advanced

    Technology Information Service

  • 化工贸易金融服务

    Transaction Security

    Merchant authentication and risk control model

  • 化工仓储服务平台

    One-stop service

    Trading logistics warehouse-style services