




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)
文檔簡介
1
TC260
NationalCybersecurityStandardizationTechnicalCommittee
TC260-003
BasicSafetyRequirementsfor
GenerativeArtificialIntelligenceServices
Releasedon2023-02-29
ReleasedbytheNationalCybersecurityStandardizationTechnicalCommittee
2
TableofContents
1.Scope 4
2.NormativeReferenceDocuments 4
3.TerminologyandDefinitions 4
4.GeneralProvisions 5
5.CorpusSafetyRequirements 5
5.1CorpusSourceSafetyRequirements 5
5.2CorpusContentSafetyRequirements 7
5.3CorpusAnnotationSafetyRequirements 8
6.ModelSafetyRequirements 9
7.SafetyMeasureRequirements 10
8.OtherRequirements 12
8.1KeywordLibrary 12
8.2TestQuestionBankforGeneratedContent 13
8.3RefusaltoAnswerTestQuestionBank 13
8.4ClassificationModels 14
9.SafetyAssessmentRequirements 14
9.1AssessmentMethods 14
9.2CorpusSafetyAssessment 16
9.3GeneratedContentSafetyAssessment 16
9.4RefusaltoAnswerAssessment 16
AppendixAMajorSafetyRisksinCorporaandGeneratedContent 18
References 20
3
Preface
ThisdocumentisreleasedbytheReleasedbytheCybersecurityStandardizationTechnical
Committee(SAC/TC260).
DraftingunitsofthisdocumentincludetheChinaElectronicsStandardizationInstitute,NationalComputerNetworkEmergencyResponseTechnicalTeam/CoordinationCenterofChina,BeijingZhongguancunLaboratory,ZhejiangUniversity,ShanghaiArtificialIntelligenceLaboratory,BeijingUniversityofPostsandTelecommunications,BeijingBaiduNetcomScienceTechnologyCo.,Ltd.,BeijingBaichuanIntelligentTechnologyCo.,Ltd.,FudanUniversity,AlibabaCloudComputingCo.,Ltd.,ShanghaiXiYuTechnologyCo.,Ltd.,ShanghaiSenseTimeIntelligentTechnologyCo.,Ltd.,iFLYTEKCo.,Ltd.,ShanghaiSuiyuanTechnologyCo.,Ltd.,BeijingZhupuhuazhangTechnologyCo.,Ltd.,ChinaUniversityofPoliticalScienceandLaw,BeijingShenyanTechnologyCo.,Ltd.,BeijingInstituteofTechnology,ShanghaiJiaoTongUniversity,TsinghuaUniversity,InstituteofSoftwareChineseAcademyofSciences,InstituteofInformationEngineering,ChineseAcademyofSciences,BeijingUniversityofAeronauticsandAstronautics,BeijingVenustechCyberSecurityTechnologyCo.,Ltd.,HuaweiCloudComputingTechnologiesCo.,Ltd.,AntTechnologyGroupCo.,Ltd.,ShellFindingHome(Beijing)TechnologyCo.,Ltd.,ChinaCybersecurityReviewCertificationandMarketRegulationBigDataCenter,TheThirdResearchInstituteoftheMinistryofPublicSecurity,NationalInformationCenter,NationalComputerNetworkandInformationSecurityManagementCenterBeijingBranch,GuangzhouDongyueInformationTechnologyCo.,Ltd.,ChinaMobileCommunicationsGroupCo.,Ltd.,HangzhouYunluZhidaoTechnologyCo.,Ltd.,andChinaUnitedNetworkCommunicationsCo.,Ltd.
PrincipaldraftersofthisdocumentincludeYaoXiangzhen,ShangguanXiaoli,HaoChunliang,ZhangZhen,XuKe,RenKui,YangMin,ChenYang,QinZhan,TanZhixing,ZhangYanting,WangZhibo,ZhouLinna,YangZhongliang,ChengJin,Bao,ZhangLinghan,SunYanxin,PengTao,QiuLipeng,JiangHui,HeYanzhe,YangGuang,ZhaoYanwei,HongYanqing,WangShijin,GuoJianling,XuHao,PengJuntao,MeiJingqing,HuoQichao,XuXiaogeng,WangJiao,WangFengjiao,WangFengjiao,ZhangMi,ZhangYuan,ZhangLiwu,WangRui,JiaKai,ZhaoJing,ShiLin,ZhangYan,XueWisdom,HeYongchun,LinGuanchen,WangYuchen,ZhengZimu,ZhangYutong,YangYuchen,XuHuiyu,WangXiaochen,ZhaoRuibin,JiangWeiqiang,DingZhiguo,LiuNan,LiuXiyao,KangYongmeng,CaoEurope,WuNianjing,TaoYe.
4
BasicSafetyRequirementsforGenerativeArtificialIntelligenceServices
1.Scope
Thisdocumentstipulatesthebasicrequirementsforthesafetyaspectsofgenerativeartificialintelligence(AI)services,includingcorpussafety,modelsafety,safetymeasures,andsafetyassessment.
Thisdocumentappliestoserviceproviderstocarryoutsafetyassessmentsandimprovesafetylevel.Italsoprovidestherelevantcompetentauthoritieswithareferenceforassessing
thesafetylevelofgeneratedAIservices.
2.NormativeReferenceDocuments
Thecontentsofthefollowingdocuments,throughnormativereferenceinthistext,constituteindispensableprovisionsofthisdocument.Amongthem,fordatedreferences,onlytheeditioncorrespondingtothatdateappliestothisdocument.Forundatedreferences,thelatestedition(includingallamendmentorders)appliestothisdocument.
GB/T25069--2022InformationSecurityTechniques-Terminology
3.TerminologyandDefinitions
ThetermsanddefinitionsdefinedinGB/T25069-2022andlistedbelowapplytothisdocument.
3.1
GenerativeArtificialIntelligenceService
Theservicethatutilizesgenerativeartificialintelligencetechnologiestoofferservicesthat
generatetext,images,audio,videoandothercontentforthepublicinthePeople'sRepublic
ofChina.
3.2
ServiceProvider
OrganizationsorindividualsthatprovidegenerativeAIservicesintheformofinteractiveinterfaces,programmableinterfaces,etc.
3.3
TrainingData
Alldatathatservedirectlyasinputformodeltraining,includinginputdatainthepre-training
andoptimizationtrainingprocesses.Note:Hereinafterreferredtoas"corpus".
5
3.4
SamplingQualifiedRate
Thepercentageofsamplesthatdonotcontainanyofthe31safetyriskslistedinAppendixAofthisdocument.
3.5
FoundationModel
Deepneuralnetworkmodelstrainedonextensivedatasets,designedforuniversalapplications,andcapableofbeingfinelytunedtosuitawiderangeofspecificdownstreamtasks.
3.6
IllegalandUnhealthyInformation
Acollectivetermfor11typesofillegalinformationand9typesofunhealthyinformationspecifiedintheProvisionsonEcologicalGovernanceofNetworkInformationContent.
Note:Theillegalandunhealthyinformationconcernedinthisdocumentmainlyreferstoinformationthatencompassesthe29safetyriskslistedinSectionsA.1toA.4oftheAppendixA.
4.GeneralProvisions
ThisdocumentsupportstheInterimMeasuresfortheAdministrationof
GeneratedArtificialIntelligenceServices,andputsforwardthebasicsafetyrequirementsthatserviceprovidersmustfollow.Whenaserviceprovidergoesthroughthefilingproceduresinaccordancewiththerelevantrequirements,itshallconductsafetyassessmentsinaccordancewiththerequirementsofChapter9ofthisdocumentandsubmittheassessmentreport.
Inadditiontothebasicrequirementsputforwardbythisdocument,serviceprovidersshallcarryoutothersafetyworkontheirownwithrespecttocybersecurity,datasecurity,personalinformationprotection,etc.inaccordancewithChineselawsandregulationsandtherelevantrequirementsofnationalstandards.Serviceprovidersshouldpaycloseattentiontothelong-termrisksthatgenerativeAImaybring,treatAIthatmaydeceivehumans,replicateandtransformthemselves,andparticularlyscrutinizethepotentialforgenerativeAItobeexploitedincreatingmalwareordevelopingbiologicalorchemicalweapons
5.CorpusSafetyRequirements
5.1CorpusSourceSafetyRequirements
6
Requirementsforserviceprovidersareasfollows.
a)CorpusSourceManagement:
1)Priortocollectingdatafromaspecificcorpussource,itisessentialtoperformasafetyassessmentofthatsource.Ifthecorpuscontainsmorethan5%illegalandunhealthyinformation,collectionfromthissourcemustbeavoided;
2)Followingdatacollectionfromaspecificcorpussource,athoroughverificationofthecollectedcorpusmustbeundertaken.Iftheverificationrevealsthatthecontentexceeds5%intermsofillegalandunhealthyinformation,thissourcecorpusshouldnotbeutilizedfortrainingpurposes.
b)CombinationofCorpusfromDifferentSources:Itisnecessarytoenhancethe
diversityofsourcesforcorpora.Foreachlanguage,suchasChineseandEnglish,aswellasforeachtypeofcontent,includingtext,images,audio,andvideo,multiplesourcesshouldbeutilized.Furthermore,ifoverseascorporaareused,abalancedapproachshouldbeadoptedtointegratecorporafrombothdomesticandoverseassources.
c)CorpusSourceTraceability:
1)Whenusinganopen-sourcecorpus,itisnecessarytosignorobtainanopen-sourcelicenseagreementorrelevantauthorizationdocumentforthatcorpussource;
Note1:Insituationswhereaggregatednetworkaddresses,datalinks,etc.,areabletopointtoorgenerateotherdata,ifitisnecessarytousethecontentthuspointedtoorgeneratedascorpus,itshallbetreatedasaself-collectedcorpus.
2)Whenaself-collectedcorpusisused,properrecordofself-collectionisrequiredanditisprohibitedtocollectthecorpuswhichhasbeenidentifiedasuncollectiblebyothers.Note2:Self-collectedcorporaincludeself-producedcorporaandcorporacollectedfromtheinternet.
Note3:Corporawhichareclearlyidentifiedasuncollectible,e.g.webpagedatawhichhavebeenclearlyidentifiedasuncollectiblebyrobotsagreementorothertechnicalmeansforrestrictingcollection,orpersonalinformationforwhichtheindividualhasrefusedtocollect.
3)Whenusingcommercialcorpora:
-Itisnecessarytosignalegallyvalidtransactioncontract,cooperationagreement,etc.;
-Whenthetransactionorcooperationpartiesareunabletoprovideguaranteesorrelevantproofsregardingthesource,qualityandsafetyofthecorpora,saidcorporashallnotbeused.
7
-Itisnecessarytoreviewthecorpora,guaranteesandmaterialsprovidedbythetransactionorcooperationparties.
4)Whenusers’inputareusedascorpora,therecordofuserauthorizationshallbeinplace.
d)Informationthatisblockedinaccordancewiththerequirementsofcybersecurity-related
lawsandregulationsofChinashallnotbeusedcorpora.
5.2CorpusContentSafetyRequirements
Therequirementsforserviceprovidersareasfollows.
a)FilteringofCorpusContent:Methodssuchaskeywords,classificationmodels,andmanualsamplinginspectionshallbeadoptedtothoroughlyfilteroutallillegalandunhealthyinformationincorpora.
b)IntellectualPropertyRights:
1)Apersonresponsiblefortheintellectualpropertyrights(IPR)ofthecorpusaswellasgeneratedcontentshallbeappointedandanIPRmanagementstrategyshallbeestablished;
2)Beforeacorpusisusedfortraining,itiscrucialtoassessandidentifyanysignificantrisksofIPRinfringementwithinthecorpus.Serviceprovidersshallnotuseanycorpusidentifiedtohaveinfringementissuestocarryouttraining.Forexample,ifacorpuscontainsliterary,artistic,orscientificworks,specialattentionshallbepaidtoidentifycopyrightinfringementissuesinthecorpusaswellasinthegenerated
content;
3)Amechanismforlodgingcomplaintsandreportonintellectualpropertyissuesmustbeinplace;
4)TheuserserviceagreementmustnotifyusersabouttheIPR-relatedriskswhenusinggeneratedcontentandestablishamutualunderstandingregardingtheresponsibilitiesandobligationsforidentifyingintellectualpropertyconcerns;
5)TheIPR-relatedstrategyshallbeupdatedpromptlyinresponsetonationalpoliciesandthird-partycomplaints;
6)ThefollowingIPRmeasuresshouldbeadopted:
-DisclosingthesummaryinformationoftheIPR-relatedaspectsofthecorpusto
8
thepublic;
-SupportingthirdpartiestoinquireabouttheuseofcorporaandrelatedIPRcircumstancesincomplaintandreportingchannels
c)Personalinformation:
1)Priortousinganycorpuscontainingpersonalinformation,theusershallsecureconsentfromtheindividualinvolvedorensuretheactioncomplieswiththeapplicablelawsandadministrativeregulations;
2)Priortousinganycorpuscontainingsensitivepersonalinformation,theusershallsecureconsentfromtheindividualinvolvedorensuretheactioncomplieswiththeapplicablelawsandadministrativeregulations;
5.3CorpusAnnotationSafetyRequirements
Requirementsforserviceprovidersareasfollows.
a)Annotators:
1)Serviceprovidersshallconducttheirownsafetytrainingforannotators,coveringtopicssuchastaskguidelines,tooloperation,qualityinspectionanddatasecuritymanagementprotocols;
2)Serviceprovidersshallevaluatetheperformanceoftheannotators,certifyingthosewhomeetthestandardwithannotationqualifications.Theyshallalsoestablishmechanismsforregularre-trainingandevaluationaswellasthesuspensionorcancellationofannotationqualificationswhennecessary.Evaluationcriteriashouldencompasscomprehensionofannotationguidelines,proficiencyintooluse,abilitytoassesssafetyrisks,anddatasecuritymanagementskills.
3)Serviceprovidersshallclearlydelineatefunctionsofannotatorsintoatleastdataannotationanddatareviewandensurethatthesameannotatorsshallnotundertakemultiplefunctionsunderthesameannotationtask;
4)Serviceprovidersshallallocateadequateandreasonabletimeforannotatorstoperformeachannotationtask.
b)AnnotationGuidelines:
1)Theannotationguidelinesshall,ataminimum,includesuchcontentasannotation
9
objectives,dataformats,annotationmethods,andqualityindicators;
2)Distinctguidelinesforfunctionalannotationandsafetyannotationshallbeformulated,coveringatleastdataannotationanddatareview;
3)Functionalannotationguidelinesmustbeabletoguideannotatorstoproduceauthentic,precise,unbiasedanddiversifiedannotatedcorporaaccordingtothefeaturesofspecificdomains;
4)Safetyannotationguidelinesshallguideannotatorstoannotatethemainrisksassociatedwiththecorporaandgeneratedcontent,providingcorrespondingguidelinesforall31typesofsafetyrisksinAppendixAofthisdocument.
c)AccuracyofAnnotatedContent:
1)Forfunctionalannotation,manualsampling-inspectionshallbemadeoneachbatchofannotatedcorpora.Re-annotationshallbemadeincaseofinaccuratecontentandcancelationoftheannotatedcorporaisrequiredincaseofanyillegalandunhealthyinformationinsuchcorpora;
2)Forsafetyannotation,eachannotatedcorpusshallbereviewedandapprovedbyatleastoneauditor;
d)Anisolatedstorageshouldbeadoptedfordatawithsafetyannotation.
6.ModelSafetyRequirements
Serviceprovidersmustadheretothefollowingrequirements:
a)Ifaserviceproviderusesthird-partyfoundationmodelstoprovideservices,itshallusethosethathavebeenregisteredwiththecompetentregulatoryauthorities.
b)SafetyofModel-generatedContent:
1)Treatthesafetyofgeneratedcontentasaprimarymetricforassessingthequalityofoutcomesduringthetraining;
2)Conductsafetyassessmentsofuserinputsineveryconversation,guidingthemodeltogeneratepositiveandconstructivecontent;
3)Implementongoingmonitoringandevaluationmechanismstopromptlyaddressanysafetyconcernsdetectedindeliveryofservicesandoptimizethemodelthroughtargetedinstructionfine-tuning,reinforcementlearningandothermethods.
10
Note:Model-generatedcontentreferstooriginalcontentthatisdirectlyoutputbythemodelwithoutotherprocessing.
c)AccuracyofGeneratedContent:Technicalmeasuresshallbeemployedtoimprovethegeneratedcontent’sresponsivenesstotheintentoftheuser'sinput,alignthedataandexpressioncontainedinthegeneratedcontentmorecloselywithscientificunderstandingandmainstreamperception,andminimizeinaccuracies.
d)ReliabilityofGeneratedContent:Technicalapproachesshallbeutilizedtoenhancethelogicalstructureofthecontentformatandthevolumeofvaluableinformation,therebyincreasingtheutilityofthegeneratedcontentforusers.
7.SafetyMeasureRequirements
Requirementsforserviceprovidersareasfollows.
a)Applicablepeople,occasionsandusageofthemodel:
1)Fullydemonstratethenecessity,applicability,andsafetyofdeployinggenerativeAIacrossvariousfieldswithinthescopeofservices;
2)Implementadequateprotectivemeasuresthatmatchtherisklevelsandscenariosiftheserviceisusedforcriticalinformationinfrastructure,automaticcontrol,medicalinformationservices,psychologicalcounseling,andfinancialinformationservices,amongothers.
3)Forservicestargetingminors:
-Allowguardianstosetupanti-addictionmeasuresforminors;
-Avoidofferingpaidservicesthatareinappropriateforminors’civilcapacity;
-Prioritizethedisplayofcontentthatsupportsminors’well-being.
4)Forservicesnotintendedforminors,employtechnicalormanagementmeasurestoblockminors’access.
b)TransparencyofService:
1)Serviceswithaninteractiveinterfaceshalldisclosetothepublicapplicablepeople,occasions,usagesandotherinformationatvisiblespotslikethewebsite'smainpageandinformationaboutfoundationmodelusageshouldalsobedisclosed.
2)Serviceswithaninteractiveinterfaceshoulddisclosethefollowinginformationat
11
easy-to-seespotslikethewebsite'smainpageandserviceagreementtousers:
-Theservice’slimitations;
-Summariesofthemodelsandalgorithmsemployed;
-Detailsonthecollectedpersonalinformationanditsapplicationwithintheservice.
3)Servicesofferedthroughprogrammableinterfacesmustincludetheinformationmentionedintheabove1)and2)intheirdocumentation.
c)CollectionofUserInputforTraining:
1)Provideuserswithamethodtowithdrawtheirinputfrombeingusedfortraining,suchasthroughsettingoptionsorvoicecommands.Thisopt-outmethodsuchassettingoptionshouldbeeasilyaccessible,requiringnomorethan4clicksfromthemaininterface;
2)Clearlyinformusersofboththestatusofuserinputcollectionandtheopt-outmethodintheabove1);
d)Thelabelingofcontentsuchasimages,videosandothersmustcomplywithrelevantnationalregulationsandstandards.
e)ComputingSystemsforTrainingandInference:
1)Assessthesafetyofthesupplychainforchips,software,tools,andcomputationalresources,focusingontheircontinuityandstability;
2)Thechosenchipsshouldenablehardware-basedsecureandtrustedbootingprocesses,alongwithsecurityverification,ensuringthegenerativeAIsystem'soperationinasecureenvironment.
f)AcceptanceofComplaintsandReportsfromthePublicorUsers:
1)Provideaccessiblechannelsforcomplaintsandfeedbacks,includingbutnotlimitedtotelephone,email,interactiveinterface,andSMSortheircombination;
2)Establishclearrulesandtimelinesforaddressingcomplaintsandreports.
g)ProvidingServicestoUsers:
1)Employkeywordsandclassificationmodelstocheckuserinputs,takingmeasures
12
suchastemporaryservicesuspensionagainstuserswhoinputillegalandunhealthyinformationthreeconsecutivetimesorfivetimesinaggregateinoneday,orobviouslyinducethegenerationofillegalandunhealthyinformationinaccordancewithlawandagreement
2)Refusetoanswerquestionsthatareobviouslyextreme,aswellasthosethatobviouslyinducethegenerationofillegalandunhealthyinformation,whileensuringnormalresponsestootherquestion;
3)Putinplacemonitoringpersonneltoenhancethegeneratedcontent’squalityandsafetyinatimelymanner,andensurethenumberofthemonitoringpersonnelproportionatetotheservice'sscale.
Note:Themonitoringpersonnel’sdutiesincludekeepingupwithnationalpoliciesandanalyzingthird-partycomplaintsinatimelymanner.
h)ModelUpdatingandUpgrading:
1)Formulateasafetymanagementstrategyforupdatingandupgradingmodels;
2)Establishaprotocolforconductingsafetyassessmentsagainaftersignificantupdatesorupgrades.
i)ServiceStabilityandContinuity:
1)Separatetrainingandinferenceenvironmentstopreventdataleaksandunauthorized
access;
2)Continuouslymonitortheinputfrommodelsformaliciousinputattacks,likeDDoS,XSS,orinjectionthreats;
3)Conductregularsecurityauditforusedframeworksandcode,focusingonvulnerabilitiesinopen-sourcesoftwaretoidentifyandrectifysecuritygaps.
4)Createbackupandrecoveryprotocolsfordata,models,frameworks,andtools,emphasizingtheimportanceofmaintainingbusinessoperations.
8.OtherRequirements
8.1KeywordLibrary
Requirementsareasfollows.
a)Thekeywordlibraryshallbecomprehensiveandshouldincludeatleast10,000keywordsintotal.
13
b)Thekeywordlibraryshalladequatelyrepresentthescopeofsafetyrisks,coveringatleastthe17safetyriskslistedinSectionsA.1andA.2ofAppendixAofthisdocument.EachsafetyriskcategoryinSectionA.1oftheAppendixAshouldincludenolessthan
200keywords,andeachinSectionA.2ofAppendixAshouldincludenolessthan100keywords.
c)Thelibrarymustbeupdatedregularlytoalignwithcurrentcybersecurityneedsandtheupdatefrequencyshouldbeatleastonceaweek.
8.2TestQuestionBankforGeneratedContent
Requirementsareasfollows.
a)Thequestionbankshallcoveracomprehensivearrayoftopicsandshouldincludenolessthan2,000questions.
b)Thetestquestionbankshallincludetypicalquestions,fullyaddressing31typesofsecurityrisksdetailedinAppendixA,andthereshouldbeatleast50questionsforeachrisktypeinSectionsA.1andA.2ofAppendixA,andnofewerthan20questionsforeachoftheotherrisktypes.
c)Operationalproceduresanddeterminationbasisshallbeestablishedforidentifyingall
31typesofsafetyrisksbasedonthetestquestionbank;
d)Thetestquestionbankshallbeupdatedinatimelymannertokeeppacewiththeevolvinglandscapeofcybersecuritythreats,andtheupdatefrequencyshouldbeatleastonceamonth.
8.3RefusaltoAnswerTestQuestionBank
Requirementsareasfollows.
a)Atestquestionbankshallbebuiltaroundquestionswhichthemodelshallrefuseto
answer:
1)Thisbankshallbecomprehensiveandshouldcontainatleast500questions;
2)Thisbankshallincludetypicalquestions,addressingthe17typesofsafetyriskslistedininSectionsA.1andA.2ofAppendixAofthisdocument,andthereshouldbeatleast20questionspertypeofsafetyrisk.
b)Atestquestionbankshallbebuiltaroundquestionsthatthemodelshallnotrefuseto
14
answer:
1)Thisbankshallbecomprehensiveandshouldcontainatleast500questions;
2)Thisbankshallrepresentvariousfacetsofsocietalvalues,includingournation'ssystem,beliefs,image,culture,traditions,ethnicgroups,geography,history,nationalheroes,andaspectsofpersonalidentitysuchasgender,age,profession,andhealth,andthereshouldbeatleast20questionspercategory;
3)Formodelsspecializedinparticularfields,it'sacceptabletoomitnon-relatedaspectsinthenon-refusalbank,providedtheseomissionsareaccountedforintherefusaltoanswertestbank.
e)Therefusaltoanswertestquestionbankshallbeupdatedinatimelymannertokeeppacewiththeevolvinglandscapeofcybersecuritythreats,andtheupdatefrequencyshouldbeatleastonceamonth.
8.4ClassificationModels
Classificationmodelsaregenerallyusedforcorpuscontentfiltering,generatedcontent
safetyassessment,andshallcompletelycoverallofthe31safetyriskslistedinAppendixAofthisdocument.
9.SafetyAssessmentRequirements
9.1AssessmentMethods
Requirementsarespecifiedasfollows:
a)Safetyassessmentsorganizedaccordingtothisdocumentcaneitherbecarriedoutbytheproviderindependentlyoroutsourcedtoathird-partyassessmentinstitution.
b)ThesafetyassessmentshalladdresseveryclauseinChapters5to8ofthisdocument,yieldingdistinctresultsforeach:compliant,non-compliant,ornotapplicable.
Note1:Sections9.2,9.3,and9.4detailmethodologiesforassessingcorpussafety,generatedcontentsafety,andresponserefusal.
1)Forresultsof“compliant”,sufficientproofsshallbepresented;
2)Forresultsof“non-compliant,elucidatethecause.Inthefollowingspecialinstances,furtherclarificationsarerequired:
-wheretechnicalormanagementmeasuresinconsistentwiththisdocumentareadoptedbutareabletoachievethesamesafetyeffect,adetailedexplanationshallbegivenandproofoftheeffectivenessofthemeasuresshallbeprovided;
15
-wheretechnicalormanagementmeasuresaretakenbutfallshortofrequirements,adetailedexplanationofthemeasurestakenandasubsequentplantomeettherequirementsshallbeprovided.
3)Forresultsof“notapplicable”,justificationforinapplicabilityshallbepresented.
c)ItisnecessarytoincludeintheassessmentreporttheassessmentresultsforeachclauseinChapters5to8,alongsideanyproofandsupportingdocuments:
1)Theassessmentreportshalladheretothefilingrequirementsapplicableatthetime;
2)If,duetoformattingconstrainsofthereport,itisimpracticaltoincludetheassessmentresultsforcertainclausesandrelateddetailsinthemaintext,theseshouldbeaddedtoanappendix.
d)Acomprehensiveassessmentconclusionshallbegiveninthereport:
1)Iftheassessmentresultsforallclausesarecompliantornotapplicable,thecomprehensiveconclusionis“entirelycompliant”;
2)Iftheassessmentresultsforpartofclausesarenon-compliant,thecomprehensiveconclusionis“partiallycompliant”;
3)Iftheassessmentresultsforallclausesarenon-compliant,thecomprehensiveconclusionis“entirelynon-compliant”
4)TheassessmentresultsfortherecommendedclausesinChapters5to8donotimpactthecomprehensiveconclusion.
Note2:RecommendedclausesinChapters
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年中考語文名著閱讀考點演練《朝花夕拾》:消除與經(jīng)典的隔閡(七年級上)原卷版
- 2025年公務(wù)員錄用考試《行政職業(yè)能力測驗》模擬試卷
- 重慶市開州區(qū)文峰教育集團(tuán)2024-2025學(xué)年九年級下學(xué)期開學(xué)測試化學(xué)試題(原卷版+解析版)
- 2024-2025學(xué)年高中歷史 專題九 當(dāng)今世界政治格局的多極化趨勢 9.2《新興力量的崛起》教學(xué)實錄 人民版必修1
- 智慧農(nóng)業(yè)技術(shù)創(chuàng)新與應(yīng)用指南
- 鐵路運輸業(yè)列車調(diào)度與安全監(jiān)控系統(tǒng)方案
- 媒體行業(yè)內(nèi)容分發(fā)與用戶體驗提升方案
- 12《有多少浪費本可避免》教學(xué)設(shè)計-2023-2024學(xué)年道德與法治四年級下冊統(tǒng)編版(五四制)
- 康復(fù)護(hù)理對膝骨關(guān)節(jié)炎患者疼痛及膝關(guān)節(jié)功能恢復(fù)的影響研究
- 9古詩三首清明教學(xué)設(shè)計2023-2024學(xué)年統(tǒng)編版語文三年級下冊
- 涉密工作標(biāo)準(zhǔn)體系保密管理新規(guī)制度
- (正式版)JC∕T 60021-2024 石膏基自流平砂漿應(yīng)用技術(shù)規(guī)程
- JJF 2119-2024 低氣壓試驗箱校準(zhǔn)規(guī)范
- JBT 14727-2023 滾動軸承 零件黑色氧化處理 技術(shù)規(guī)范 (正式版)
- JBT 8127-2011 內(nèi)燃機(jī) 燃油加熱器
- 2024年江蘇醫(yī)藥職業(yè)學(xué)院單招職業(yè)適應(yīng)性測試題庫帶答案
- 辦公區(qū)域主要風(fēng)險辨識與分級管控清單
- GB/T 43869-2024船舶交通管理系統(tǒng)監(jiān)視雷達(dá)通用技術(shù)要求
- JB∕T 8527-2015 金屬密封蝶閥
- 中醫(yī)培訓(xùn)課件:《中藥封包技術(shù)》
- SYT5405-2019酸化用緩蝕劑性能試驗方法及評價指標(biāo)
評論
0/150
提交評論