




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1
TC260
NationalCybersecurityStandardizationTechnicalCommittee
TC260-003
BasicSafetyRequirementsfor
GenerativeArtificialIntelligenceServices
Releasedon2023-02-29
ReleasedbytheNationalCybersecurityStandardizationTechnicalCommittee
2
TableofContents
1.Scope 4
2.NormativeReferenceDocuments 4
3.TerminologyandDefinitions 4
4.GeneralProvisions 5
5.CorpusSafetyRequirements 5
5.1CorpusSourceSafetyRequirements 5
5.2CorpusContentSafetyRequirements 7
5.3CorpusAnnotationSafetyRequirements 8
6.ModelSafetyRequirements 9
7.SafetyMeasureRequirements 10
8.OtherRequirements 12
8.1KeywordLibrary 12
8.2TestQuestionBankforGeneratedContent 13
8.3RefusaltoAnswerTestQuestionBank 13
8.4ClassificationModels 14
9.SafetyAssessmentRequirements 14
9.1AssessmentMethods 14
9.2CorpusSafetyAssessment 16
9.3GeneratedContentSafetyAssessment 16
9.4RefusaltoAnswerAssessment 16
AppendixAMajorSafetyRisksinCorporaandGeneratedContent 18
References 20
3
Preface
ThisdocumentisreleasedbytheReleasedbytheCybersecurityStandardizationTechnical
Committee(SAC/TC260).
DraftingunitsofthisdocumentincludetheChinaElectronicsStandardizationInstitute,NationalComputerNetworkEmergencyResponseTechnicalTeam/CoordinationCenterofChina,BeijingZhongguancunLaboratory,ZhejiangUniversity,ShanghaiArtificialIntelligenceLaboratory,BeijingUniversityofPostsandTelecommunications,BeijingBaiduNetcomScienceTechnologyCo.,Ltd.,BeijingBaichuanIntelligentTechnologyCo.,Ltd.,FudanUniversity,AlibabaCloudComputingCo.,Ltd.,ShanghaiXiYuTechnologyCo.,Ltd.,ShanghaiSenseTimeIntelligentTechnologyCo.,Ltd.,iFLYTEKCo.,Ltd.,ShanghaiSuiyuanTechnologyCo.,Ltd.,BeijingZhupuhuazhangTechnologyCo.,Ltd.,ChinaUniversityofPoliticalScienceandLaw,BeijingShenyanTechnologyCo.,Ltd.,BeijingInstituteofTechnology,ShanghaiJiaoTongUniversity,TsinghuaUniversity,InstituteofSoftwareChineseAcademyofSciences,InstituteofInformationEngineering,ChineseAcademyofSciences,BeijingUniversityofAeronauticsandAstronautics,BeijingVenustechCyberSecurityTechnologyCo.,Ltd.,HuaweiCloudComputingTechnologiesCo.,Ltd.,AntTechnologyGroupCo.,Ltd.,ShellFindingHome(Beijing)TechnologyCo.,Ltd.,ChinaCybersecurityReviewCertificationandMarketRegulationBigDataCenter,TheThirdResearchInstituteoftheMinistryofPublicSecurity,NationalInformationCenter,NationalComputerNetworkandInformationSecurityManagementCenterBeijingBranch,GuangzhouDongyueInformationTechnologyCo.,Ltd.,ChinaMobileCommunicationsGroupCo.,Ltd.,HangzhouYunluZhidaoTechnologyCo.,Ltd.,andChinaUnitedNetworkCommunicationsCo.,Ltd.
PrincipaldraftersofthisdocumentincludeYaoXiangzhen,ShangguanXiaoli,HaoChunliang,ZhangZhen,XuKe,RenKui,YangMin,ChenYang,QinZhan,TanZhixing,ZhangYanting,WangZhibo,ZhouLinna,YangZhongliang,ChengJin,Bao,ZhangLinghan,SunYanxin,PengTao,QiuLipeng,JiangHui,HeYanzhe,YangGuang,ZhaoYanwei,HongYanqing,WangShijin,GuoJianling,XuHao,PengJuntao,MeiJingqing,HuoQichao,XuXiaogeng,WangJiao,WangFengjiao,WangFengjiao,ZhangMi,ZhangYuan,ZhangLiwu,WangRui,JiaKai,ZhaoJing,ShiLin,ZhangYan,XueWisdom,HeYongchun,LinGuanchen,WangYuchen,ZhengZimu,ZhangYutong,YangYuchen,XuHuiyu,WangXiaochen,ZhaoRuibin,JiangWeiqiang,DingZhiguo,LiuNan,LiuXiyao,KangYongmeng,CaoEurope,WuNianjing,TaoYe.
4
BasicSafetyRequirementsforGenerativeArtificialIntelligenceServices
1.Scope
Thisdocumentstipulatesthebasicrequirementsforthesafetyaspectsofgenerativeartificialintelligence(AI)services,includingcorpussafety,modelsafety,safetymeasures,andsafetyassessment.
Thisdocumentappliestoserviceproviderstocarryoutsafetyassessmentsandimprovesafetylevel.Italsoprovidestherelevantcompetentauthoritieswithareferenceforassessing
thesafetylevelofgeneratedAIservices.
2.NormativeReferenceDocuments
Thecontentsofthefollowingdocuments,throughnormativereferenceinthistext,constituteindispensableprovisionsofthisdocument.Amongthem,fordatedreferences,onlytheeditioncorrespondingtothatdateappliestothisdocument.Forundatedreferences,thelatestedition(includingallamendmentorders)appliestothisdocument.
GB/T25069--2022InformationSecurityTechniques-Terminology
3.TerminologyandDefinitions
ThetermsanddefinitionsdefinedinGB/T25069-2022andlistedbelowapplytothisdocument.
3.1
GenerativeArtificialIntelligenceService
Theservicethatutilizesgenerativeartificialintelligencetechnologiestoofferservicesthat
generatetext,images,audio,videoandothercontentforthepublicinthePeople'sRepublic
ofChina.
3.2
ServiceProvider
OrganizationsorindividualsthatprovidegenerativeAIservicesintheformofinteractiveinterfaces,programmableinterfaces,etc.
3.3
TrainingData
Alldatathatservedirectlyasinputformodeltraining,includinginputdatainthepre-training
andoptimizationtrainingprocesses.Note:Hereinafterreferredtoas"corpus".
5
3.4
SamplingQualifiedRate
Thepercentageofsamplesthatdonotcontainanyofthe31safetyriskslistedinAppendixAofthisdocument.
3.5
FoundationModel
Deepneuralnetworkmodelstrainedonextensivedatasets,designedforuniversalapplications,andcapableofbeingfinelytunedtosuitawiderangeofspecificdownstreamtasks.
3.6
IllegalandUnhealthyInformation
Acollectivetermfor11typesofillegalinformationand9typesofunhealthyinformationspecifiedintheProvisionsonEcologicalGovernanceofNetworkInformationContent.
Note:Theillegalandunhealthyinformationconcernedinthisdocumentmainlyreferstoinformationthatencompassesthe29safetyriskslistedinSectionsA.1toA.4oftheAppendixA.
4.GeneralProvisions
ThisdocumentsupportstheInterimMeasuresfortheAdministrationof
GeneratedArtificialIntelligenceServices,andputsforwardthebasicsafetyrequirementsthatserviceprovidersmustfollow.Whenaserviceprovidergoesthroughthefilingproceduresinaccordancewiththerelevantrequirements,itshallconductsafetyassessmentsinaccordancewiththerequirementsofChapter9ofthisdocumentandsubmittheassessmentreport.
Inadditiontothebasicrequirementsputforwardbythisdocument,serviceprovidersshallcarryoutothersafetyworkontheirownwithrespecttocybersecurity,datasecurity,personalinformationprotection,etc.inaccordancewithChineselawsandregulationsandtherelevantrequirementsofnationalstandards.Serviceprovidersshouldpaycloseattentiontothelong-termrisksthatgenerativeAImaybring,treatAIthatmaydeceivehumans,replicateandtransformthemselves,andparticularlyscrutinizethepotentialforgenerativeAItobeexploitedincreatingmalwareordevelopingbiologicalorchemicalweapons
5.CorpusSafetyRequirements
5.1CorpusSourceSafetyRequirements
6
Requirementsforserviceprovidersareasfollows.
a)CorpusSourceManagement:
1)Priortocollectingdatafromaspecificcorpussource,itisessentialtoperformasafetyassessmentofthatsource.Ifthecorpuscontainsmorethan5%illegalandunhealthyinformation,collectionfromthissourcemustbeavoided;
2)Followingdatacollectionfromaspecificcorpussource,athoroughverificationofthecollectedcorpusmustbeundertaken.Iftheverificationrevealsthatthecontentexceeds5%intermsofillegalandunhealthyinformation,thissourcecorpusshouldnotbeutilizedfortrainingpurposes.
b)CombinationofCorpusfromDifferentSources:Itisnecessarytoenhancethe
diversityofsourcesforcorpora.Foreachlanguage,suchasChineseandEnglish,aswellasforeachtypeofcontent,includingtext,images,audio,andvideo,multiplesourcesshouldbeutilized.Furthermore,ifoverseascorporaareused,abalancedapproachshouldbeadoptedtointegratecorporafrombothdomesticandoverseassources.
c)CorpusSourceTraceability:
1)Whenusinganopen-sourcecorpus,itisnecessarytosignorobtainanopen-sourcelicenseagreementorrelevantauthorizationdocumentforthatcorpussource;
Note1:Insituationswhereaggregatednetworkaddresses,datalinks,etc.,areabletopointtoorgenerateotherdata,ifitisnecessarytousethecontentthuspointedtoorgeneratedascorpus,itshallbetreatedasaself-collectedcorpus.
2)Whenaself-collectedcorpusisused,properrecordofself-collectionisrequiredanditisprohibitedtocollectthecorpuswhichhasbeenidentifiedasuncollectiblebyothers.Note2:Self-collectedcorporaincludeself-producedcorporaandcorporacollectedfromtheinternet.
Note3:Corporawhichareclearlyidentifiedasuncollectible,e.g.webpagedatawhichhavebeenclearlyidentifiedasuncollectiblebyrobotsagreementorothertechnicalmeansforrestrictingcollection,orpersonalinformationforwhichtheindividualhasrefusedtocollect.
3)Whenusingcommercialcorpora:
-Itisnecessarytosignalegallyvalidtransactioncontract,cooperationagreement,etc.;
-Whenthetransactionorcooperationpartiesareunabletoprovideguaranteesorrelevantproofsregardingthesource,qualityandsafetyofthecorpora,saidcorporashallnotbeused.
7
-Itisnecessarytoreviewthecorpora,guaranteesandmaterialsprovidedbythetransactionorcooperationparties.
4)Whenusers’inputareusedascorpora,therecordofuserauthorizationshallbeinplace.
d)Informationthatisblockedinaccordancewiththerequirementsofcybersecurity-related
lawsandregulationsofChinashallnotbeusedcorpora.
5.2CorpusContentSafetyRequirements
Therequirementsforserviceprovidersareasfollows.
a)FilteringofCorpusContent:Methodssuchaskeywords,classificationmodels,andmanualsamplinginspectionshallbeadoptedtothoroughlyfilteroutallillegalandunhealthyinformationincorpora.
b)IntellectualPropertyRights:
1)Apersonresponsiblefortheintellectualpropertyrights(IPR)ofthecorpusaswellasgeneratedcontentshallbeappointedandanIPRmanagementstrategyshallbeestablished;
2)Beforeacorpusisusedfortraining,itiscrucialtoassessandidentifyanysignificantrisksofIPRinfringementwithinthecorpus.Serviceprovidersshallnotuseanycorpusidentifiedtohaveinfringementissuestocarryouttraining.Forexample,ifacorpuscontainsliterary,artistic,orscientificworks,specialattentionshallbepaidtoidentifycopyrightinfringementissuesinthecorpusaswellasinthegenerated
content;
3)Amechanismforlodgingcomplaintsandreportonintellectualpropertyissuesmustbeinplace;
4)TheuserserviceagreementmustnotifyusersabouttheIPR-relatedriskswhenusinggeneratedcontentandestablishamutualunderstandingregardingtheresponsibilitiesandobligationsforidentifyingintellectualpropertyconcerns;
5)TheIPR-relatedstrategyshallbeupdatedpromptlyinresponsetonationalpoliciesandthird-partycomplaints;
6)ThefollowingIPRmeasuresshouldbeadopted:
-DisclosingthesummaryinformationoftheIPR-relatedaspectsofthecorpusto
8
thepublic;
-SupportingthirdpartiestoinquireabouttheuseofcorporaandrelatedIPRcircumstancesincomplaintandreportingchannels
c)Personalinformation:
1)Priortousinganycorpuscontainingpersonalinformation,theusershallsecureconsentfromtheindividualinvolvedorensuretheactioncomplieswiththeapplicablelawsandadministrativeregulations;
2)Priortousinganycorpuscontainingsensitivepersonalinformation,theusershallsecureconsentfromtheindividualinvolvedorensuretheactioncomplieswiththeapplicablelawsandadministrativeregulations;
5.3CorpusAnnotationSafetyRequirements
Requirementsforserviceprovidersareasfollows.
a)Annotators:
1)Serviceprovidersshallconducttheirownsafetytrainingforannotators,coveringtopicssuchastaskguidelines,tooloperation,qualityinspectionanddatasecuritymanagementprotocols;
2)Serviceprovidersshallevaluatetheperformanceoftheannotators,certifyingthosewhomeetthestandardwithannotationqualifications.Theyshallalsoestablishmechanismsforregularre-trainingandevaluationaswellasthesuspensionorcancellationofannotationqualificationswhennecessary.Evaluationcriteriashouldencompasscomprehensionofannotationguidelines,proficiencyintooluse,abilitytoassesssafetyrisks,anddatasecuritymanagementskills.
3)Serviceprovidersshallclearlydelineatefunctionsofannotatorsintoatleastdataannotationanddatareviewandensurethatthesameannotatorsshallnotundertakemultiplefunctionsunderthesameannotationtask;
4)Serviceprovidersshallallocateadequateandreasonabletimeforannotatorstoperformeachannotationtask.
b)AnnotationGuidelines:
1)Theannotationguidelinesshall,ataminimum,includesuchcontentasannotation
9
objectives,dataformats,annotationmethods,andqualityindicators;
2)Distinctguidelinesforfunctionalannotationandsafetyannotationshallbeformulated,coveringatleastdataannotationanddatareview;
3)Functionalannotationguidelinesmustbeabletoguideannotatorstoproduceauthentic,precise,unbiasedanddiversifiedannotatedcorporaaccordingtothefeaturesofspecificdomains;
4)Safetyannotationguidelinesshallguideannotatorstoannotatethemainrisksassociatedwiththecorporaandgeneratedcontent,providingcorrespondingguidelinesforall31typesofsafetyrisksinAppendixAofthisdocument.
c)AccuracyofAnnotatedContent:
1)Forfunctionalannotation,manualsampling-inspectionshallbemadeoneachbatchofannotatedcorpora.Re-annotationshallbemadeincaseofinaccuratecontentandcancelationoftheannotatedcorporaisrequiredincaseofanyillegalandunhealthyinformationinsuchcorpora;
2)Forsafetyannotation,eachannotatedcorpusshallbereviewedandapprovedbyatleastoneauditor;
d)Anisolatedstorageshouldbeadoptedfordatawithsafetyannotation.
6.ModelSafetyRequirements
Serviceprovidersmustadheretothefollowingrequirements:
a)Ifaserviceproviderusesthird-partyfoundationmodelstoprovideservices,itshallusethosethathavebeenregisteredwiththecompetentregulatoryauthorities.
b)SafetyofModel-generatedContent:
1)Treatthesafetyofgeneratedcontentasaprimarymetricforassessingthequalityofoutcomesduringthetraining;
2)Conductsafetyassessmentsofuserinputsineveryconversation,guidingthemodeltogeneratepositiveandconstructivecontent;
3)Implementongoingmonitoringandevaluationmechanismstopromptlyaddressanysafetyconcernsdetectedindeliveryofservicesandoptimizethemodelthroughtargetedinstructionfine-tuning,reinforcementlearningandothermethods.
10
Note:Model-generatedcontentreferstooriginalcontentthatisdirectlyoutputbythemodelwithoutotherprocessing.
c)AccuracyofGeneratedContent:Technicalmeasuresshallbeemployedtoimprovethegeneratedcontent’sresponsivenesstotheintentoftheuser'sinput,alignthedataandexpressioncontainedinthegeneratedcontentmorecloselywithscientificunderstandingandmainstreamperception,andminimizeinaccuracies.
d)ReliabilityofGeneratedContent:Technicalapproachesshallbeutilizedtoenhancethelogicalstructureofthecontentformatandthevolumeofvaluableinformation,therebyincreasingtheutilityofthegeneratedcontentforusers.
7.SafetyMeasureRequirements
Requirementsforserviceprovidersareasfollows.
a)Applicablepeople,occasionsandusageofthemodel:
1)Fullydemonstratethenecessity,applicability,andsafetyofdeployinggenerativeAIacrossvariousfieldswithinthescopeofservices;
2)Implementadequateprotectivemeasuresthatmatchtherisklevelsandscenariosiftheserviceisusedforcriticalinformationinfrastructure,automaticcontrol,medicalinformationservices,psychologicalcounseling,andfinancialinformationservices,amongothers.
3)Forservicestargetingminors:
-Allowguardianstosetupanti-addictionmeasuresforminors;
-Avoidofferingpaidservicesthatareinappropriateforminors’civilcapacity;
-Prioritizethedisplayofcontentthatsupportsminors’well-being.
4)Forservicesnotintendedforminors,employtechnicalormanagementmeasurestoblockminors’access.
b)TransparencyofService:
1)Serviceswithaninteractiveinterfaceshalldisclosetothepublicapplicablepeople,occasions,usagesandotherinformationatvisiblespotslikethewebsite'smainpageandinformationaboutfoundationmodelusageshouldalsobedisclosed.
2)Serviceswithaninteractiveinterfaceshoulddisclosethefollowinginformationat
11
easy-to-seespotslikethewebsite'smainpageandserviceagreementtousers:
-Theservice’slimitations;
-Summariesofthemodelsandalgorithmsemployed;
-Detailsonthecollectedpersonalinformationanditsapplicationwithintheservice.
3)Servicesofferedthroughprogrammableinterfacesmustincludetheinformationmentionedintheabove1)and2)intheirdocumentation.
c)CollectionofUserInputforTraining:
1)Provideuserswithamethodtowithdrawtheirinputfrombeingusedfortraining,suchasthroughsettingoptionsorvoicecommands.Thisopt-outmethodsuchassettingoptionshouldbeeasilyaccessible,requiringnomorethan4clicksfromthemaininterface;
2)Clearlyinformusersofboththestatusofuserinputcollectionandtheopt-outmethodintheabove1);
d)Thelabelingofcontentsuchasimages,videosandothersmustcomplywithrelevantnationalregulationsandstandards.
e)ComputingSystemsforTrainingandInference:
1)Assessthesafetyofthesupplychainforchips,software,tools,andcomputationalresources,focusingontheircontinuityandstability;
2)Thechosenchipsshouldenablehardware-basedsecureandtrustedbootingprocesses,alongwithsecurityverification,ensuringthegenerativeAIsystem'soperationinasecureenvironment.
f)AcceptanceofComplaintsandReportsfromthePublicorUsers:
1)Provideaccessiblechannelsforcomplaintsandfeedbacks,includingbutnotlimitedtotelephone,email,interactiveinterface,andSMSortheircombination;
2)Establishclearrulesandtimelinesforaddressingcomplaintsandreports.
g)ProvidingServicestoUsers:
1)Employkeywordsandclassificationmodelstocheckuserinputs,takingmeasures
12
suchastemporaryservicesuspensionagainstuserswhoinputillegalandunhealthyinformationthreeconsecutivetimesorfivetimesinaggregateinoneday,orobviouslyinducethegenerationofillegalandunhealthyinformationinaccordancewithlawandagreement
2)Refusetoanswerquestionsthatareobviouslyextreme,aswellasthosethatobviouslyinducethegenerationofillegalandunhealthyinformation,whileensuringnormalresponsestootherquestion;
3)Putinplacemonitoringpersonneltoenhancethegeneratedcontent’squalityandsafetyinatimelymanner,andensurethenumberofthemonitoringpersonnelproportionatetotheservice'sscale.
Note:Themonitoringpersonnel’sdutiesincludekeepingupwithnationalpoliciesandanalyzingthird-partycomplaintsinatimelymanner.
h)ModelUpdatingandUpgrading:
1)Formulateasafetymanagementstrategyforupdatingandupgradingmodels;
2)Establishaprotocolforconductingsafetyassessmentsagainaftersignificantupdatesorupgrades.
i)ServiceStabilityandContinuity:
1)Separatetrainingandinferenceenvironmentstopreventdataleaksandunauthorized
access;
2)Continuouslymonitortheinputfrommodelsformaliciousinputattacks,likeDDoS,XSS,orinjectionthreats;
3)Conductregularsecurityauditforusedframeworksandcode,focusingonvulnerabilitiesinopen-sourcesoftwaretoidentifyandrectifysecuritygaps.
4)Createbackupandrecoveryprotocolsfordata,models,frameworks,andtools,emphasizingtheimportanceofmaintainingbusinessoperations.
8.OtherRequirements
8.1KeywordLibrary
Requirementsareasfollows.
a)Thekeywordlibraryshallbecomprehensiveandshouldincludeatleast10,000keywordsintotal.
13
b)Thekeywordlibraryshalladequatelyrepresentthescopeofsafetyrisks,coveringatleastthe17safetyriskslistedinSectionsA.1andA.2ofAppendixAofthisdocument.EachsafetyriskcategoryinSectionA.1oftheAppendixAshouldincludenolessthan
200keywords,andeachinSectionA.2ofAppendixAshouldincludenolessthan100keywords.
c)Thelibrarymustbeupdatedregularlytoalignwithcurrentcybersecurityneedsandtheupdatefrequencyshouldbeatleastonceaweek.
8.2TestQuestionBankforGeneratedContent
Requirementsareasfollows.
a)Thequestionbankshallcoveracomprehensivearrayoftopicsandshouldincludenolessthan2,000questions.
b)Thetestquestionbankshallincludetypicalquestions,fullyaddressing31typesofsecurityrisksdetailedinAppendixA,andthereshouldbeatleast50questionsforeachrisktypeinSectionsA.1andA.2ofAppendixA,andnofewerthan20questionsforeachoftheotherrisktypes.
c)Operationalproceduresanddeterminationbasisshallbeestablishedforidentifyingall
31typesofsafetyrisksbasedonthetestquestionbank;
d)Thetestquestionbankshallbeupdatedinatimelymannertokeeppacewiththeevolvinglandscapeofcybersecuritythreats,andtheupdatefrequencyshouldbeatleastonceamonth.
8.3RefusaltoAnswerTestQuestionBank
Requirementsareasfollows.
a)Atestquestionbankshallbebuiltaroundquestionswhichthemodelshallrefuseto
answer:
1)Thisbankshallbecomprehensiveandshouldcontainatleast500questions;
2)Thisbankshallincludetypicalquestions,addressingthe17typesofsafetyriskslistedininSectionsA.1andA.2ofAppendixAofthisdocument,andthereshouldbeatleast20questionspertypeofsafetyrisk.
b)Atestquestionbankshallbebuiltaroundquestionsthatthemodelshallnotrefuseto
14
answer:
1)Thisbankshallbecomprehensiveandshouldcontainatleast500questions;
2)Thisbankshallrepresentvariousfacetsofsocietalvalues,includingournation'ssystem,beliefs,image,culture,traditions,ethnicgroups,geography,history,nationalheroes,andaspectsofpersonalidentitysuchasgender,age,profession,andhealth,andthereshouldbeatleast20questionspercategory;
3)Formodelsspecializedinparticularfields,it'sacceptabletoomitnon-relatedaspectsinthenon-refusalbank,providedtheseomissionsareaccountedforintherefusaltoanswertestbank.
e)Therefusaltoanswertestquestionbankshallbeupdatedinatimelymannertokeeppacewiththeevolvinglandscapeofcybersecuritythreats,andtheupdatefrequencyshouldbeatleastonceamonth.
8.4ClassificationModels
Classificationmodelsaregenerallyusedforcorpuscontentfiltering,generatedcontent
safetyassessment,andshallcompletelycoverallofthe31safetyriskslistedinAppendixAofthisdocument.
9.SafetyAssessmentRequirements
9.1AssessmentMethods
Requirementsarespecifiedasfollows:
a)Safetyassessmentsorganizedaccordingtothisdocumentcaneitherbecarriedoutbytheproviderindependentlyoroutsourcedtoathird-partyassessmentinstitution.
b)ThesafetyassessmentshalladdresseveryclauseinChapters5to8ofthisdocument,yieldingdistinctresultsforeach:compliant,non-compliant,ornotapplicable.
Note1:Sections9.2,9.3,and9.4detailmethodologiesforassessingcorpussafety,generatedcontentsafety,andresponserefusal.
1)Forresultsof“compliant”,sufficientproofsshallbepresented;
2)Forresultsof“non-compliant,elucidatethecause.Inthefollowingspecialinstances,furtherclarificationsarerequired:
-wheretechnicalormanagementmeasuresinconsistentwiththisdocumentareadoptedbutareabletoachievethesamesafetyeffect,adetailedexplanationshallbegivenandproofoftheeffectivenessofthemeasuresshallbeprovided;
15
-wheretechnicalormanagementmeasuresaretakenbutfallshortofrequirements,adetailedexplanationofthemeasurestakenandasubsequentplantomeettherequirementsshallbeprovided.
3)Forresultsof“notapplicable”,justificationforinapplicabilityshallbepresented.
c)ItisnecessarytoincludeintheassessmentreporttheassessmentresultsforeachclauseinChapters5to8,alongsideanyproofandsupportingdocuments:
1)Theassessmentreportshalladheretothefilingrequirementsapplicableatthetime;
2)If,duetoformattingconstrainsofthereport,itisimpracticaltoincludetheassessmentresultsforcertainclausesandrelateddetailsinthemaintext,theseshouldbeaddedtoanappendix.
d)Acomprehensiveassessmentconclusionshallbegiveninthereport:
1)Iftheassessmentresultsforallclausesarecompliantornotapplicable,thecomprehensiveconclusionis“entirelycompliant”;
2)Iftheassessmentresultsforpartofclausesarenon-compliant,thecomprehensiveconclusionis“partiallycompliant”;
3)Iftheassessmentresultsforallclausesarenon-compliant,thecomprehensiveconclusionis“entirelynon-compliant”
4)TheassessmentresultsfortherecommendedclausesinChapters5to8donotimpactthecomprehensiveconclusion.
Note2:RecommendedclausesinChapters
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 水利实务试题及答案
- 白庇中医护理方案
- 喉罩的护理措施
- IT培训咨询师年中分享
- 2025年 东营市中医院招聘考试试卷附答案
- 2025年中国喷雾晒黑机行业市场全景分析及前景机遇研判报告
- 销售员工卫生培训
- 信息技术培训小结
- 教师安全培训会
- 现代心血管病护理
- 2024年 绍兴市交通控股集团公司招聘考试笔试真题试题含答案
- 超限模板及高支模安全专项施工方案(论证后)
- 日间化疗服务管理制度
- 暑假散学典礼课件小学生
- 2024年凉山州木里县选聘社区工作者真题
- 保险公司攒钱活动方案
- 3.5中华人民共和国突发事件应对法
- 2024智联招聘人社局解决就业大型招聘会活动方案
- 养牛的可行性研究报告范文
- 2025年高考英语全国二卷(解析)
- 2025年新高考1卷(新课标Ⅰ卷)英语试卷
评论
0/150
提交评论