Can Huawei be trusted with handling sensitive data in its network equipment ?

Huawei has implemented robust mechanisms and compliance measures to ensure the secure handling of sensitive data in its network equipment. The company's commitment to GDPR compliance, privacy impact assessments, and emergency response mechanisms for data breaches demonstrate its dedication to protecting user privacy. Additionally, Huawei's Data Security Center and Data Loss Prevention technologies further enhance the security of sensitive data. Therefore, there is substantial evidence to suggest that Huawei can be trusted with handling sensitive data in its network equipment.
Can Huawei be trusted with handling sensitive data in its network equipment

Huawei, as a global leader in providing information and communication technology (ICT) infrastructure and smart devices, has faced scrutiny regarding the handling of sensitive data in its network equipment.

Below are some key points to consider when evaluating Huawei's trustworthiness in this context:

Sensitive Data Handling

1. Identification Rules: Huawei Cloud's Data Security Center uses built-in rules for identifying sensitive data. Users can also customize new rules to classify scattered data based on identification rules, which are mandatory for creating identification templates.

2. Sensitivity Configuration: The Data Security Center provides built-in data security levels and allows users to customize new levels to classify rules.

3. Identification Template: Huawei Cloud offers built-in templates based on data security classifying and grading standards, with the option to customize new templates for managing scattered rules in a unified manner.

4. Identification Task: Based on the created identification task, DSC automatically identifies sensitive data in specified databases and generates identification results and reports.

5. Viewing Results: After scanning, users can view the identification result in the task list and handle any abnormal events based on the identification result.

Privacy Law Compliance

1. GDPR Compliance: Huawei complies with globally applicable privacy laws, including the General Data Protection Regulation (GDPR), ensuring that relevant businesses comply with applicable GDPR requirements.

2. PIA Process: Huawei uses the privacy impact assessment (PIA) approach to assess and mitigate privacy risks in products and services. This process includes assessing personal data processing, creating data inventories and flow diagrams, and determining Huawei's role in data processing.

3. Data Breach Handling: Huawei has established an emergency response mechanism for personal data breaches, aiming to minimize loss caused by breaches and ensure affected persons are informed.

Data Security Center

1. Data Identification: DSC helps identify, classify, and mask sensitive or confidential data, aiding in protecting customers and preventing data breaches.

2. Risk Reduction: DSC reduces the risk of data loss and brand damage due to harmful data loss or theft of valuable personal customer data.

3. Compliance Assistance: With complex data protection laws being introduced, DSC provides a tool for enterprises to remain compliant.

4. Smart Algorithms: Using smart algorithms, preset rules, and configurable filters, DSC quickly identifies and automatically classifies sensitive data that needs protection.

5. Non-Destructive Masking: DSC masks data and watermarks files if they are identified and then accessed, exported, or moved from the original source without saving a copy or changing the original data asset.

Data Loss Prevention

1. Data Obtaining: DLP obtains enterprise intranet data through various means such as scanning terminals, monitoring network protocol links, and monitoring applications.

2. Content Identification: DLP performs in-depth content identification to determine if data contains sensitive information, using common and advanced detection technologies.

3. Data Control: After identifying sensitive information, DLP controls the files carrying such information based on given policies.

Data Masking Techniques

1. Static Data Masking: DSC can mask large amounts of data at once based on configured masking rules, used when sensitive data is delivered to development, testing, or external environments.

2. Dynamic Data Masking: DSC provides APIs for dynamic data masking, applied when data is queried from external systems like production applications or data exchange.

In conclusion, Huawei has implemented robust mechanisms and compliance measures to ensure the secure handling of sensitive data in its network equipment. The company's commitment to GDPR compliance, privacy impact assessments, and emergency response mechanisms for data breaches demonstrate its dedication to protecting user privacy. Additionally, Huawei's Data Security Center and Data Loss Prevention technologies further enhance the security of sensitive data. Therefore, there is substantial evidence to suggest that Huawei can be trusted with handling sensitive data in its network equipment.