版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
1
TC260
NationalCybersecurityStandardizationTechnicalCommittee
TC260-003
BasicSafetyRequirementsfor
GenerativeArtificialIntelligenceServices
Releasedon2023-02-29
ReleasedbytheNationalCybersecurityStandardizationTechnicalCommittee
2
TableofContents
1.Scope 4
2.NormativeReferenceDocuments 4
3.TerminologyandDefinitions 4
4.GeneralProvisions 5
5.CorpusSafetyRequirements 5
5.1CorpusSourceSafetyRequirements 5
5.2CorpusContentSafetyRequirements 7
5.3CorpusAnnotationSafetyRequirements 8
6.ModelSafetyRequirements 9
7.SafetyMeasureRequirements 10
8.OtherRequirements 12
8.1KeywordLibrary 12
8.2TestQuestionBankforGeneratedContent 13
8.3RefusaltoAnswerTestQuestionBank 13
8.4ClassificationModels 14
9.SafetyAssessmentRequirements 14
9.1AssessmentMethods 14
9.2CorpusSafetyAssessment 16
9.3GeneratedContentSafetyAssessment 16
9.4RefusaltoAnswerAssessment 16
AppendixAMajorSafetyRisksinCorporaandGeneratedContent 18
References 20
3
Preface
ThisdocumentisreleasedbytheReleasedbytheCybersecurityStandardizationTechnical
Committee(SAC/TC260).
DraftingunitsofthisdocumentincludetheChinaElectronicsStandardizationInstitute,NationalComputerNetworkEmergencyResponseTechnicalTeam/CoordinationCenterofChina,BeijingZhongguancunLaboratory,ZhejiangUniversity,ShanghaiArtificialIntelligenceLaboratory,BeijingUniversityofPostsandTelecommunications,BeijingBaiduNetcomScienceTechnologyCo.,Ltd.,BeijingBaichuanIntelligentTechnologyCo.,Ltd.,FudanUniversity,AlibabaCloudComputingCo.,Ltd.,ShanghaiXiYuTechnologyCo.,Ltd.,ShanghaiSenseTimeIntelligentTechnologyCo.,Ltd.,iFLYTEKCo.,Ltd.,ShanghaiSuiyuanTechnologyCo.,Ltd.,BeijingZhupuhuazhangTechnologyCo.,Ltd.,ChinaUniversityofPoliticalScienceandLaw,BeijingShenyanTechnologyCo.,Ltd.,BeijingInstituteofTechnology,ShanghaiJiaoTongUniversity,TsinghuaUniversity,InstituteofSoftwareChineseAcademyofSciences,InstituteofInformationEngineering,ChineseAcademyofSciences,BeijingUniversityofAeronauticsandAstronautics,BeijingVenustechCyberSecurityTechnologyCo.,Ltd.,HuaweiCloudComputingTechnologiesCo.,Ltd.,AntTechnologyGroupCo.,Ltd.,ShellFindingHome(Beijing)TechnologyCo.,Ltd.,ChinaCybersecurityReviewCertificationandMarketRegulationBigDataCenter,TheThirdResearchInstituteoftheMinistryofPublicSecurity,NationalInformationCenter,NationalComputerNetworkandInformationSecurityManagementCenterBeijingBranch,GuangzhouDongyueInformationTechnologyCo.,Ltd.,ChinaMobileCommunicationsGroupCo.,Ltd.,HangzhouYunluZhidaoTechnologyCo.,Ltd.,andChinaUnitedNetworkCommunicationsCo.,Ltd.
PrincipaldraftersofthisdocumentincludeYaoXiangzhen,ShangguanXiaoli,HaoChunliang,ZhangZhen,XuKe,RenKui,YangMin,ChenYang,QinZhan,TanZhixing,ZhangYanting,WangZhibo,ZhouLinna,YangZhongliang,ChengJin,Bao,ZhangLinghan,SunYanxin,PengTao,QiuLipeng,JiangHui,HeYanzhe,YangGuang,ZhaoYanwei,HongYanqing,WangShijin,GuoJianling,XuHao,PengJuntao,MeiJingqing,HuoQichao,XuXiaogeng,WangJiao,WangFengjiao,WangFengjiao,ZhangMi,ZhangYuan,ZhangLiwu,WangRui,JiaKai,ZhaoJing,ShiLin,ZhangYan,XueWisdom,HeYongchun,LinGuanchen,WangYuchen,ZhengZimu,ZhangYutong,YangYuchen,XuHuiyu,WangXiaochen,ZhaoRuibin,JiangWeiqiang,DingZhiguo,LiuNan,LiuXiyao,KangYongmeng,CaoEurope,WuNianjing,TaoYe.
4
BasicSafetyRequirementsforGenerativeArtificialIntelligenceServices
1.Scope
Thisdocumentstipulatesthebasicrequirementsforthesafetyaspectsofgenerativeartificialintelligence(AI)services,includingcorpussafety,modelsafety,safetymeasures,andsafetyassessment.
Thisdocumentappliestoserviceproviderstocarryoutsafetyassessmentsandimprovesafetylevel.Italsoprovidestherelevantcompetentauthoritieswithareferenceforassessing
thesafetylevelofgeneratedAIservices.
2.NormativeReferenceDocuments
Thecontentsofthefollowingdocuments,throughnormativereferenceinthistext,constituteindispensableprovisionsofthisdocument.Amongthem,fordatedreferences,onlytheeditioncorrespondingtothatdateappliestothisdocument.Forundatedreferences,thelatestedition(includingallamendmentorders)appliestothisdocument.
GB/T25069--2022InformationSecurityTechniques-Terminology
3.TerminologyandDefinitions
ThetermsanddefinitionsdefinedinGB/T25069-2022andlistedbelowapplytothisdocument.
3.1
GenerativeArtificialIntelligenceService
Theservicethatutilizesgenerativeartificialintelligencetechnologiestoofferservicesthat
generatetext,images,audio,videoandothercontentforthepublicinthePeople'sRepublic
ofChina.
3.2
ServiceProvider
OrganizationsorindividualsthatprovidegenerativeAIservicesintheformofinteractiveinterfaces,programmableinterfaces,etc.
3.3
TrainingData
Alldatathatservedirectlyasinputformodeltraining,includinginputdatainthepre-training
andoptimizationtrainingprocesses.Note:Hereinafterreferredtoas"corpus".
5
3.4
SamplingQualifiedRate
Thepercentageofsamplesthatdonotcontainanyofthe31safetyriskslistedinAppendixAofthisdocument.
3.5
FoundationModel
Deepneuralnetworkmodelstrainedonextensivedatasets,designedforuniversalapplications,andcapableofbeingfinelytunedtosuitawiderangeofspecificdownstreamtasks.
3.6
IllegalandUnhealthyInformation
Acollectivetermfor11typesofillegalinformationand9typesofunhealthyinformationspecifiedintheProvisionsonEcologicalGovernanceofNetworkInformationContent.
Note:Theillegalandunhealthyinformationconcernedinthisdocumentmainlyreferstoinformationthatencompassesthe29safetyriskslistedinSectionsA.1toA.4oftheAppendixA.
4.GeneralProvisions
ThisdocumentsupportstheInterimMeasuresfortheAdministrationof
GeneratedArtificialIntelligenceServices,andputsforwardthebasicsafetyrequirementsthatserviceprovidersmustfollow.Whenaserviceprovidergoesthroughthefilingproceduresinaccordancewiththerelevantrequirements,itshallconductsafetyassessmentsinaccordancewiththerequirementsofChapter9ofthisdocumentandsubmittheassessmentreport.
Inadditiontothebasicrequirementsputforwardbythisdocument,serviceprovidersshallcarryoutothersafetyworkontheirownwithrespecttocybersecurity,datasecurity,personalinformationprotection,etc.inaccordancewithChineselawsandregulationsandtherelevantrequirementsofnationalstandards.Serviceprovidersshouldpaycloseattentiontothelong-termrisksthatgenerativeAImaybring,treatAIthatmaydeceivehumans,replicateandtransformthemselves,andparticularlyscrutinizethepotentialforgenerativeAItobeexploitedincreatingmalwareordevelopingbiologicalorchemicalweapons
5.CorpusSafetyRequirements
5.1CorpusSourceSafetyRequirements
6
Requirementsforserviceprovidersareasfollows.
a)CorpusSourceManagement:
1)Priortocollectingdatafromaspecificcorpussource,itisessentialtoperformasafetyassessmentofthatsource.Ifthecorpuscontainsmorethan5%illegalandunhealthyinformation,collectionfromthissourcemustbeavoided;
2)Followingdatacollectionfromaspecificcorpussource,athoroughverificationofthecollectedcorpusmustbeundertaken.Iftheverificationrevealsthatthecontentexceeds5%intermsofillegalandunhealthyinformation,thissourcecorpusshouldnotbeutilizedfortrainingpurposes.
b)CombinationofCorpusfromDifferentSources:Itisnecessarytoenhancethe
diversityofsourcesforcorpora.Foreachlanguage,suchasChineseandEnglish,aswellasforeachtypeofcontent,includingtext,images,audio,andvideo,multiplesourcesshouldbeutilized.Furthermore,ifoverseascorporaareused,abalancedapproachshouldbeadoptedtointegratecorporafrombothdomesticandoverseassources.
c)CorpusSourceTraceability:
1)Whenusinganopen-sourcecorpus,itisnecessarytosignorobtainanopen-sourcelicenseagreementorrelevantauthorizationdocumentforthatcorpussource;
Note1:Insituationswhereaggregatednetworkaddresses,datalinks,etc.,areabletopointtoorgenerateotherdata,ifitisnecessarytousethecontentthuspointedtoorgeneratedascorpus,itshallbetreatedasaself-collectedcorpus.
2)Whenaself-collectedcorpusisused,properrecordofself-collectionisrequiredanditisprohibitedtocollectthecorpuswhichhasbeenidentifiedasuncollectiblebyothers.Note2:Self-collectedcorporaincludeself-producedcorporaandcorporacollectedfromtheinternet.
Note3:Corporawhichareclearlyidentifiedasuncollectible,e.g.webpagedatawhichhavebeenclearlyidentifiedasuncollectiblebyrobotsagreementorothertechnicalmeansforrestrictingcollection,orpersonalinformationforwhichtheindividualhasrefusedtocollect.
3)Whenusingcommercialcorpora:
-Itisnecessarytosignalegallyvalidtransactioncontract,cooperationagreement,etc.;
-Whenthetransactionorcooperationpartiesareunabletoprovideguaranteesorrelevantproofsregardingthesource,qualityandsafetyofthecorpora,saidcorporashallnotbeused.
7
-Itisnecessarytoreviewthecorpora,guaranteesandmaterialsprovidedbythetransactionorcooperationparties.
4)Whenusers’inputareusedascorpora,therecordofuserauthorizationshallbeinplace.
d)Informationthatisblockedinaccordancewiththerequirementsofcybersecurity-related
lawsandregulationsofChinashallnotbeusedcorpora.
5.2CorpusContentSafetyRequirements
Therequirementsforserviceprovidersareasfollows.
a)FilteringofCorpusContent:Methodssuchaskeywords,classificationmodels,andmanualsamplinginspectionshallbeadoptedtothoroughlyfilteroutallillegalandunhealthyinformationincorpora.
b)IntellectualPropertyRights:
1)Apersonresponsiblefortheintellectualpropertyrights(IPR)ofthecorpusaswellasgeneratedcontentshallbeappointedandanIPRmanagementstrategyshallbeestablished;
2)Beforeacorpusisusedfortraining,itiscrucialtoassessandidentifyanysignificantrisksofIPRinfringementwithinthecorpus.Serviceprovidersshallnotuseanycorpusidentifiedtohaveinfringementissuestocarryouttraining.Forexample,ifacorpuscontainsliterary,artistic,orscientificworks,specialattentionshallbepaidtoidentifycopyrightinfringementissuesinthecorpusaswellasinthegenerated
content;
3)Amechanismforlodgingcomplaintsandreportonintellectualpropertyissuesmustbeinplace;
4)TheuserserviceagreementmustnotifyusersabouttheIPR-relatedriskswhenusinggeneratedcontentandestablishamutualunderstandingregardingtheresponsibilitiesandobligationsforidentifyingintellectualpropertyconcerns;
5)TheIPR-relatedstrategyshallbeupdatedpromptlyinresponsetonationalpoliciesandthird-partycomplaints;
6)ThefollowingIPRmeasuresshouldbeadopted:
-DisclosingthesummaryinformationoftheIPR-relatedaspectsofthecorpusto
8
thepublic;
-SupportingthirdpartiestoinquireabouttheuseofcorporaandrelatedIPRcircumstancesincomplaintandreportingchannels
c)Personalinformation:
1)Priortousinganycorpuscontainingpersonalinformation,theusershallsecureconsentfromtheindividualinvolvedorensuretheactioncomplieswiththeapplicablelawsandadministrativeregulations;
2)Priortousinganycorpuscontainingsensitivepersonalinformation,theusershallsecureconsentfromtheindividualinvolvedorensuretheactioncomplieswiththeapplicablelawsandadministrativeregulations;
5.3CorpusAnnotationSafetyRequirements
Requirementsforserviceprovidersareasfollows.
a)Annotators:
1)Serviceprovidersshallconducttheirownsafetytrainingforannotators,coveringtopicssuchastaskguidelines,tooloperation,qualityinspectionanddatasecuritymanagementprotocols;
2)Serviceprovidersshallevaluatetheperformanceoftheannotators,certifyingthosewhomeetthestandardwithannotationqualifications.Theyshallalsoestablishmechanismsforregularre-trainingandevaluationaswellasthesuspensionorcancellationofannotationqualificationswhennecessary.Evaluationcriteriashouldencompasscomprehensionofannotationguidelines,proficiencyintooluse,abilitytoassesssafetyrisks,anddatasecuritymanagementskills.
3)Serviceprovidersshallclearlydelineatefunctionsofannotatorsintoatleastdataannotationanddatareviewandensurethatthesameannotatorsshallnotundertakemultiplefunctionsunderthesameannotationtask;
4)Serviceprovidersshallallocateadequateandreasonabletimeforannotatorstoperformeachannotationtask.
b)AnnotationGuidelines:
1)Theannotationguidelinesshall,ataminimum,includesuchcontentasannotation
9
objectives,dataformats,annotationmethods,andqualityindicators;
2)Distinctguidelinesforfunctionalannotationandsafetyannotationshallbeformulated,coveringatleastdataannotationanddatareview;
3)Functionalannotationguidelinesmustbeabletoguideannotatorstoproduceauthentic,precise,unbiasedanddiversifiedannotatedcorporaaccordingtothefeaturesofspecificdomains;
4)Safetyannotationguidelinesshallguideannotatorstoannotatethemainrisksassociatedwiththecorporaandgeneratedcontent,providingcorrespondingguidelinesforall31typesofsafetyrisksinAppendixAofthisdocument.
c)AccuracyofAnnotatedContent:
1)Forfunctionalannotation,manualsampling-inspectionshallbemadeoneachbatchofannotatedcorpora.Re-annotationshallbemadeincaseofinaccuratecontentandcancelationoftheannotatedcorporaisrequiredincaseofanyillegalandunhealthyinformationinsuchcorpora;
2)Forsafetyannotation,eachannotatedcorpusshallbereviewedandapprovedbyatleastoneauditor;
d)Anisolatedstorageshouldbeadoptedfordatawithsafetyannotation.
6.ModelSafetyRequirements
Serviceprovidersmustadheretothefollowingrequirements:
a)Ifaserviceproviderusesthird-partyfoundationmodelstoprovideservices,itshallusethosethathavebeenregisteredwiththecompetentregulatoryauthorities.
b)SafetyofModel-generatedContent:
1)Treatthesafetyofgeneratedcontentasaprimarymetricforassessingthequalityofoutcomesduringthetraining;
2)Conductsafetyassessmentsofuserinputsineveryconversation,guidingthemodeltogeneratepositiveandconstructivecontent;
3)Implementongoingmonitoringandevaluationmechanismstopromptlyaddressanysafetyconcernsdetectedindeliveryofservicesandoptimizethemodelthroughtargetedinstructionfine-tuning,reinforcementlearningandothermethods.
10
Note:Model-generatedcontentreferstooriginalcontentthatisdirectlyoutputbythemodelwithoutotherprocessing.
c)AccuracyofGeneratedContent:Technicalmeasuresshallbeemployedtoimprovethegeneratedcontent’sresponsivenesstotheintentoftheuser'sinput,alignthedataandexpressioncontainedinthegeneratedcontentmorecloselywithscientificunderstandingandmainstreamperception,andminimizeinaccuracies.
d)ReliabilityofGeneratedContent:Technicalapproachesshallbeutilizedtoenhancethelogicalstructureofthecontentformatandthevolumeofvaluableinformation,therebyincreasingtheutilityofthegeneratedcontentforusers.
7.SafetyMeasureRequirements
Requirementsforserviceprovidersareasfollows.
a)Applicablepeople,occasionsandusageofthemodel:
1)Fullydemonstratethenecessity,applicability,andsafetyofdeployinggenerativeAIacrossvariousfieldswithinthescopeofservices;
2)Implementadequateprotectivemeasuresthatmatchtherisklevelsandscenariosiftheserviceisusedforcriticalinformationinfrastructure,automaticcontrol,medicalinformationservices,psychologicalcounseling,andfinancialinformationservices,amongothers.
3)Forservicestargetingminors:
-Allowguardianstosetupanti-addictionmeasuresforminors;
-Avoidofferingpaidservicesthatareinappropriateforminors’civilcapacity;
-Prioritizethedisplayofcontentthatsupportsminors’well-being.
4)Forservicesnotintendedforminors,employtechnicalormanagementmeasurestoblockminors’access.
b)TransparencyofService:
1)Serviceswithaninteractiveinterfaceshalldisclosetothepublicapplicablepeople,occasions,usagesandotherinformationatvisiblespotslikethewebsite'smainpageandinformationaboutfoundationmodelusageshouldalsobedisclosed.
2)Serviceswithaninteractiveinterfaceshoulddisclosethefollowinginformationat
11
easy-to-seespotslikethewebsite'smainpageandserviceagreementtousers:
-Theservice’slimitations;
-Summariesofthemodelsandalgorithmsemployed;
-Detailsonthecollectedpersonalinformationanditsapplicationwithintheservice.
3)Servicesofferedthroughprogrammableinterfacesmustincludetheinformationmentionedintheabove1)and2)intheirdocumentation.
c)CollectionofUserInputforTraining:
1)Provideuserswithamethodtowithdrawtheirinputfrombeingusedfortraining,suchasthroughsettingoptionsorvoicecommands.Thisopt-outmethodsuchassettingoptionshouldbeeasilyaccessible,requiringnomorethan4clicksfromthemaininterface;
2)Clearlyinformusersofboththestatusofuserinputcollectionandtheopt-outmethodintheabove1);
d)Thelabelingofcontentsuchasimages,videosandothersmustcomplywithrelevantnationalregulationsandstandards.
e)ComputingSystemsforTrainingandInference:
1)Assessthesafetyofthesupplychainforchips,software,tools,andcomputationalresources,focusingontheircontinuityandstability;
2)Thechosenchipsshouldenablehardware-basedsecureandtrustedbootingprocesses,alongwithsecurityverification,ensuringthegenerativeAIsystem'soperationinasecureenvironment.
f)AcceptanceofComplaintsandReportsfromthePublicorUsers:
1)Provideaccessiblechannelsforcomplaintsandfeedbacks,includingbutnotlimitedtotelephone,email,interactiveinterface,andSMSortheircombination;
2)Establishclearrulesandtimelinesforaddressingcomplaintsandreports.
g)ProvidingServicestoUsers:
1)Employkeywordsandclassificationmodelstocheckuserinputs,takingmeasures
12
suchastemporaryservicesuspensionagainstuserswhoinputillegalandunhealthyinformationthreeconsecutivetimesorfivetimesinaggregateinoneday,orobviouslyinducethegenerationofillegalandunhealthyinformationinaccordancewithlawandagreement
2)Refusetoanswerquestionsthatareobviouslyextreme,aswellasthosethatobviouslyinducethegenerationofillegalandunhealthyinformation,whileensuringnormalresponsestootherquestion;
3)Putinplacemonitoringpersonneltoenhancethegeneratedcontent’squalityandsafetyinatimelymanner,andensurethenumberofthemonitoringpersonnelproportionatetotheservice'sscale.
Note:Themonitoringpersonnel’sdutiesincludekeepingupwithnationalpoliciesandanalyzingthird-partycomplaintsinatimelymanner.
h)ModelUpdatingandUpgrading:
1)Formulateasafetymanagementstrategyforupdatingandupgradingmodels;
2)Establishaprotocolforconductingsafetyassessmentsagainaftersignificantupdatesorupgrades.
i)ServiceStabilityandContinuity:
1)Separatetrainingandinferenceenvironmentstopreventdataleaksandunauthorized
access;
2)Continuouslymonitortheinputfrommodelsformaliciousinputattacks,likeDDoS,XSS,orinjectionthreats;
3)Conductregularsecurityauditforusedframeworksandcode,focusingonvulnerabilitiesinopen-sourcesoftwaretoidentifyandrectifysecuritygaps.
4)Createbackupandrecoveryprotocolsfordata,models,frameworks,andtools,emphasizingtheimportanceofmaintainingbusinessoperations.
8.OtherRequirements
8.1KeywordLibrary
Requirementsareasfollows.
a)Thekeywordlibraryshallbecomprehensiveandshouldincludeatleast10,000keywordsintotal.
13
b)Thekeywordlibraryshalladequatelyrepresentthescopeofsafetyrisks,coveringatleastthe17safetyriskslistedinSectionsA.1andA.2ofAppendixAofthisdocument.EachsafetyriskcategoryinSectionA.1oftheAppendixAshouldincludenolessthan
200keywords,andeachinSectionA.2ofAppendixAshouldincludenolessthan100keywords.
c)Thelibrarymustbeupdatedregularlytoalignwithcurrentcybersecurityneedsandtheupdatefrequencyshouldbeatleastonceaweek.
8.2TestQuestionBankforGeneratedContent
Requirementsareasfollows.
a)Thequestionbankshallcoveracomprehensivearrayoftopicsandshouldincludenolessthan2,000questions.
b)Thetestquestionbankshallincludetypicalquestions,fullyaddressing31typesofsecurityrisksdetailedinAppendixA,andthereshouldbeatleast50questionsforeachrisktypeinSectionsA.1andA.2ofAppendixA,andnofewerthan20questionsforeachoftheotherrisktypes.
c)Operationalproceduresanddeterminationbasisshallbeestablishedforidentifyingall
31typesofsafetyrisksbasedonthetestquestionbank;
d)Thetestquestionbankshallbeupdatedinatimelymannertokeeppacewiththeevolvinglandscapeofcybersecuritythreats,andtheupdatefrequencyshouldbeatleastonceamonth.
8.3RefusaltoAnswerTestQuestionBank
Requirementsareasfollows.
a)Atestquestionbankshallbebuiltaroundquestionswhichthemodelshallrefuseto
answer:
1)Thisbankshallbecomprehensiveandshouldcontainatleast500questions;
2)Thisbankshallincludetypicalquestions,addressingthe17typesofsafetyriskslistedininSectionsA.1andA.2ofAppendixAofthisdocument,andthereshouldbeatleast20questionspertypeofsafetyrisk.
b)Atestquestionbankshallbebuiltaroundquestionsthatthemodelshallnotrefuseto
14
answer:
1)Thisbankshallbecomprehensiveandshouldcontainatleast500questions;
2)Thisbankshallrepresentvariousfacetsofsocietalvalues,includingournation'ssystem,beliefs,image,culture,traditions,ethnicgroups,geography,history,nationalheroes,andaspectsofpersonalidentitysuchasgender,age,profession,andhealth,andthereshouldbeatleast20questionspercategory;
3)Formodelsspecializedinparticularfields,it'sacceptabletoomitnon-relatedaspectsinthenon-refusalbank,providedtheseomissionsareaccountedforintherefusaltoanswertestbank.
e)Therefusaltoanswertestquestionbankshallbeupdatedinatimelymannertokeeppacewiththeevolvinglandscapeofcybersecuritythreats,andtheupdatefrequencyshouldbeatleastonceamonth.
8.4ClassificationModels
Classificationmodelsaregenerallyusedforcorpuscontentfiltering,generatedcontent
safetyassessment,andshallcompletelycoverallofthe31safetyriskslistedinAppendixAofthisdocument.
9.SafetyAssessmentRequirements
9.1AssessmentMethods
Requirementsarespecifiedasfollows:
a)Safetyassessmentsorganizedaccordingtothisdocumentcaneitherbecarriedoutbytheproviderindependentlyoroutsourcedtoathird-partyassessmentinstitution.
b)ThesafetyassessmentshalladdresseveryclauseinChapters5to8ofthisdocument,yieldingdistinctresultsforeach:compliant,non-compliant,ornotapplicable.
Note1:Sections9.2,9.3,and9.4detailmethodologiesforassessingcorpussafety,generatedcontentsafety,andresponserefusal.
1)Forresultsof“compliant”,sufficientproofsshallbepresented;
2)Forresultsof“non-compliant,elucidatethecause.Inthefollowingspecialinstances,furtherclarificationsarerequired:
-wheretechnicalormanagementmeasuresinconsistentwiththisdocumentareadoptedbutareabletoachievethesamesafetyeffect,adetailedexplanationshallbegivenandproofoftheeffectivenessofthemeasuresshallbeprovided;
15
-wheretechnicalormanagementmeasuresaretakenbutfallshortofrequirements,adetailedexplanationofthemeasurestakenandasubsequentplantomeettherequirementsshallbeprovided.
3)Forresultsof“notapplicable”,justificationforinapplicabilityshallbepresented.
c)ItisnecessarytoincludeintheassessmentreporttheassessmentresultsforeachclauseinChapters5to8,alongsideanyproofandsupportingdocuments:
1)Theassessmentreportshalladheretothefilingrequirementsapplicableatthetime;
2)If,duetoformattingconstrainsofthereport,itisimpracticaltoincludetheassessmentresultsforcertainclausesandrelateddetailsinthemaintext,theseshouldbeaddedtoanappendix.
d)Acomprehensiveassessmentconclusionshallbegiveninthereport:
1)Iftheassessmentresultsforallclausesarecompliantornotapplicable,thecomprehensiveconclusionis“entirelycompliant”;
2)Iftheassessmentresultsforpartofclausesarenon-compliant,thecomprehensiveconclusionis“partiallycompliant”;
3)Iftheassessmentresultsforallclausesarenon-compliant,thecomprehensiveconclusionis“entirelynon-compliant”
4)TheassessmentresultsfortherecommendedclausesinChapters5to8donotimpactthecomprehensiveconclusion.
Note2:RecommendedclausesinChapters
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2024-2030年中國大數(shù)據(jù)行業(yè)應用趨勢調查及投資規(guī)劃分析報告
- 2024-2030年中國固廢處理行業(yè)發(fā)展趨勢規(guī)劃研究報告
- 2024-2030年中國嘟米融資商業(yè)計劃書
- 2024年度環(huán)保產業(yè)融資合同書a正規(guī)范文本2篇
- 眉山藥科職業(yè)學院《蒙臺梭利教育與實踐》2023-2024學年第一學期期末試卷
- 2024年度乒乓球國家隊教練團隊聘請合同3篇
- 2024年新編小額短期借款協(xié)議電子版一
- 2024年版樁基工程承包標準協(xié)議模板版B版
- 2024年度家政服務標準協(xié)議版A版
- 2024年小學三年級數(shù)學(北京版)-連乘問題第二課時-3學習任務單
- GB/T 21010-2017土地利用現(xiàn)狀分類
- GB 10963.2-2003家用及類似場所用過電流保護斷路器第2部分:用于交流和直流的斷路器
- 全套教學課件《管理學基礎》
- 綜合醫(yī)院結核病院感防控課件
- 跨文化交際(課件)
- 郎肯循環(huán)-公開課課件
- 數(shù)字文化館建設方案
- 班組學習與創(chuàng)新培訓試題
- 【PRD】安全生產動態(tài)積分管理系統(tǒng)需求說明文檔
- 大學考試命題計劃表(范例及說明)
- 婦科病史采集及查體共84張課件
評論
0/150
提交評論