版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
TABLEOFCONTENTS
1.INTRODUCTION7
1.1BACKGROUND7
1.2OBJECTIVES8
1.3OUTLINE9
2.PSEUDONYMISATIONBASICS10
2.1PSEUDONYMISATIONSCENARIOS10
2.2PSEUDONYMISATIONTECHNIQUESANDPOLICIES12
3.ADVANCEDPSEUDONYMISATIONTECHNIQUES14
3.1ASYMMETRICENCRYPTION14
3.2RINGSIGNATURESANDGROUPPSEUDONYMS16
3.3CHAININGMODE18
3.4PSEUDONYMSBASEDONMULTIPLEIDENTIFIERSORATTRIBUTES19
3.5PSEUDONYMSWITHPROOFOFOWNERSHIP21
35.1Zero-KnowledgeProof22
3.6SECUREMULTIPARTYCOMPUTATION23
3.7SECRETSHARINGSCHEMES25
3.8CONCLUSION26
4.PSEUDONYMISATIONUSECASESINHEALTHCARE27
4.1EXAMPLESCENARIO27
4.2PSEUDONYMISATIONUSECASES28
42.1Patientrecordcomparisonuse-case28
422Medicalresearchinstitutionuse-case30
423Distributedstorageuse-case31
4.3ADVANCEDPSEUDONYMISATIONSCENARIO:THEDATACUSTODIANSHIP32
43.1Notionofdatacustodianship32
432PersonalInformationManagementSystem(PIMS)asdatacustodian34
43.3Datacustodianasapartofthehospital34
43.4Datacustodianasanindependentorganisation35
43.5Interconnecteddatacustodiannetwork36
5.PSEUDONYMISATIONUSECASESINCYBERSECURITY38
5.1THEROLEANDSCOPEOFSECURITYTELEMETRY38
5.2AUSECASEONREPUTATIONSYSTEMTRAININGANDUSER-TAILOREDPROTECTION39
521Entitiesandroles39
522FileReputation40
523URLReputation42
5.3USECASESONSECURITYOPERATIONSANDCUSTOMERSUPPORTCENTRES43
53.1SecurityOperationsCenters43
532Consumercustomersupport44
53.3Protectiongapandreal-timeprotection46
5.4ADDITIONALCYBERSECURITYUSECASES46
6.CONCLUSIONSANDRECOMMENDATIONS47
7.REFERENCES50
EXECUTIVESUMMARY
Pseudonymisationisanestablishedandaccepteddataprotectionmeasurethathasgained
additionalattentionfollowingtheadoptionoftheGeneralDataProtectionRegulation(GDPR)1
whereitisbothspecificallydefinedandmanytimesreferencedasasafeguard.
ENISA,initspriorworkonthisfield,hasexploredthenotionandscopeofdata
pseudonymisation,whilepresentingsomebasictechnicalmethodsandexamplestoachieve
pseudonymisationinpractice.Inthisnewreport,ENISAcomplementsitspastworkby
discussingadvancedpseudonymisationtechniques,aswellasspecificusecasesfromthe
specificsectorsofhealthcareandcybersecurity.Inparticular,thereport,buildingonthebasic
pseudonymisationtechniques,examinesadvancedsolutionsformorecomplexscenariosthat
canbebasedonasymmetricencryption,ringsignaturesandgrouppseudonyms,chaining
mode,pseudonymsbasedonmultipleidentifiers,pseudonymswithproofofknowledgeand
securemulti-partycomputation.Itthenappliessomeofthesetechniquesintheareaof
healthcaretodiscusspossiblepseudonymisationoptionsindifferentexamplecases,whilealso
exploringthepossibleapplicationofthedatacustodianshipmodel.Lastly,itexaminesthe
applicationofbasicpseudonymisationtechniquesincommoncybersecurityusecases,suchas
theuseoftelemetryandreputationsystems.
Basedontheanalysisprovidedinthereport,thefollowingbasicconclusionsand
recommendationsforallrelevantstakeholdersareprovided.
Definingthebestpossibletechnique
AsithasbeenstressedalsoinpastENISA'sreports,thereisnofit-for-allpseudonymisation
techniqueandadetailedanalysisofthecaseinquestionisnecessaryinordertodefinethebest
possibleoption.Todoso,itisessentialtotakeacriticaltolookintothesemantics(the"full
picture”)beforeconductingdatapseudonymisation.Inaddition,pseudonymisationisonlyone
possibletechniqueandmustbecombinedwithathoroughsecurityriskassessmentforthe
protectionofpersonaldata.
Datacontrollersandprocessorsshouldengageindatapseudonymisation,basedonasecurity
anddataprotectionriskassessmentandtakingdueaccountoftheoverallcontextand
characteristicsofpersonaldataprocessing.Thismayalsocomprisemethodsfordatasubjectsto
pseudonymisepersonaldataontheirside(e.g.beforedeliveringdatatothecontroller/processor)
toincreasecontroloftheirownpersonaldata.
Regulators(e.g.DataProtectionAuthoritiesandtheEuropeanDataProtectionBoard)should
promoterisk-baseddatapseudonymisationthroughtheprovisionofrelevantguidanceand
examples.
1Regulation(EU)2016/679oftheEuropeanParliamentandoftheCouncilof27April2016ontheprotectionofnaturalpersons
withregardtotheprocessingofpersonaldataandonthefreemovementofsuchdata,andrepealingDirective95/46/EC(General
DataProtectionRegulation)https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679&from=EN
Advancedtechniquesforadvancedscenarios
Whilethetechnicalsolutionisacriticalelementforachievingproperpseudonymisation,one
mustnotforgetthattheorganisationalmodelanditsunderlyingstructuralarchitecturearealso
veryimportantparametersofsuccess.Advancedtechniquesgotogetherwithadvanced
scenarios,suchasthecaseofthedatacustodianshipmodel.
Datacontrollersandprocessorsshouldconsiderpossiblescenariosthatcansupportadvanced
pseudonymisationtechniques,based-amongother-ontheprincipleofdataminimisation.
Theresearchcommunityshouldsupportdatacontrollersandprocessorsinidentifyingthe
necessarytrustelementsandguaranteesfortheadvancedscenarios(e.g.datacustodianship)
tobefunctionalinpractice.
Regulators(e.g.DataProtectionAuthoritiesandtheEuropeanDataProtectionBoard)should
ensurethatregulatoryapproaches,e.g.asregardsnewtechnologiesandapplicationsectors,
takeintoaccountallpossibleentitiesandrolesfromthestandpointofdataprotection,while
remainingtechnologicallyneutral.
Establishingthestate-of-the-art
Althoughalotofworkisalreadyinplace,thereiscertainlymoretobedoneindefiningthestate-
of-the-artindatapseudonymisation.Tothisend,researchandapplicationscenariosmustgo
hand-in-hand,involvingallrelevantparties(researchers,industry,andregulators)todiscuss
joinedapproaches.
TheEuropeanCommission,therelevantEUinstitutions,aswellasRegulators(e.g.Data
ProtectionAuthoritiesandtheEuropeanDataProtectionBoard)shouldsupporttheestablishment
andmaintenanceofthestate-of-the-artinpseudonymisation,bringingtogetherallrelevant
stakeholdersinthefield(regulators,researchcommunity,andindustry).
Theresearchcommunityshouldcontinueitseffortsonadvancingtheexistingworkondata
pseudonymisation,addressingspecialchallengesappearingfromemergingtechnologies,such
asArtificialIntelligence.TheEuropeanCommissionandtherelevantEUinstitutionsshould
supportanddisseminatetheseefforts.
Towardsthebroaderadoptionofdatapseudonymisation
Recentdevelopments,e.g.ininternationalpersonaldatatransfers,showclearlytheneedto
furtheradvanceappropriatesafeguardsforpersonaldataprotection.Thiswillonlybeintensified
inthefuturebytheuseofemergingtechnologiesandtheneedforopendataaccess.Itis,thus,
importanttostarttodaythediscussiononthebroaderadoptionofpseudonymisationindifferent
applicationscenarios.
Regulators(e.g.DataProtectionAuthoritiesandtheEuropeanDataProtectionBoard),the
EuropeanCommissionandtherelevantEUinstitutionsshoulddisseminatethebenefitsofdata
pseudonymisationandprovideforbestpracticesinthefield.
1.INTRODUCTION
Pseudonymisationisanestablishedandaccepteddataprotectionmeasurethathasgained
additionalattentionfollowingtheadoptionoftheGeneralDataProtectionRegulation(GDPR),
whereitisbothspecificallydefined(Article4(5)GDPR)2andmanytimesreferencedasa
safeguard.Technicalandorganisationalmeasures,inparticularforsecurityanddataprotection
bydesign,comprisepseudonymisation.Theapplicationofpseudonymisationtopersonaldata
canreducetheriskstothedatasubjectsconcernedandhelpcontrollersandprocessorsmeet
theirdataprotectionobligations.Nevertheless,noteveryso-calledpseudonymisation
mechanismfulfilsthedefinitionoftheGDPR,andpseudonymisationtechniquesthatmaywork
inonespecificcasetoachievedataprotection,maynotbesufficientinothercases3.Still,the
basicconceptofsubstitutingidentifyingdatawithpseudonymscancontributetoreducingdata
protectionrisks.
1.1BACKGROUND
Giventhegrowingimportanceofpseudonymisationforbothdatacontrollersanddatasubjects,
ENISAhasbeenworkingoverthepastyearsonthistopic,inco-operationwithexpertsand
nationalregulatoryauthorities.Indeed,ENISAissueditsfirstrelevantreportinJanuary2019
(ENISA,2019-1)presentinganoverviewofthenotionandmaintechniquesof
pseudonymisationincorrelationwithitsnewroleundertheGDPR.AsecondENISAreport
followedinNovember2019(ENISA,2019-2)withamoredetailedanalysisofthetechnical
methodsandspecificexamplesandbestpracticesforparticulardatasets,i.e.emailaddresses,
IPaddressesandmorecomplexdatasets.Inaddition,adedicatedworkshopon
pseudonymisation4wasco-organisedbyENISAandtheDataProtectionAuthorityofthe
GermanFederalStateofSchleswig-Holstein(ULD)inNovember2019inordertoexchange
informationandexperienceamongkeystakeholders5.
Whileworkandregulatoryguidanceinthefieldisgrowing6,itisapparentthatfurthereffortis
needed,especiallyaddressingspecificapplicationscenariosanddifferenttypesofdatasets.
BothENISA'sreportsandtheconclusionsoftheULD-ENISAworkshopleadtowardsthis
direction,whichcouldeventuallysupportthedevelopmentofMacatalogueoftechniques"ora
,,cookbookntowardsapplyingpseudonymisationinpracticeindifferentapplicationscenarios.
2IIhastobenotedthatpersonaldatathathasbeenpseudonymisedisstillregardedas"personaldata"pursuanttoArticle4(1)
GDPRandmustnotbeconfusedwith"anonymiseddata"whereitisnolongerpossibleforanyonetoreferbacktoindividualdata
subjects,seeRecital28GDPR.
3Inordertofullyunderstandtheroleofpseudonymisationfortheprocessingofpersonaldata,afullanalysisofthelegalsituation
inthespecificcasewouldalsoberequired.
Fortheassessmentofconcreteprocessingoperations,controllersandprocessorsmusttakeaccountofallfactorsplayingarole
fortherisktothefundamentalrightsofindividualsinducedbytheprocessingassuchandbypotentialbreachesofsecurity,also
goingbeyondtechnicalandorganisationalmeasuresconsideredinthisstudy.
https://www.enisa.europa.eu/events/uld-enisa-workshop/uld-enisa-workshop-pseudonymization-and-relevant-security-
technologies
https://www.enisa.europa.eu/events/uld-enisa-workshop/uld-enisa-workshop-notes/view
6SeealsoEDPSandSpanishDPAjointpaperontheintroductionofhashaspseudonymisationtechnique,
https://edps.europa.eu/data-protection/our-workypublications/papers/introduction-hash-function-personal-data.en
Shouldthisbeachieved,itwouldbeasignificantsteptowardsthedefinitionofthestate-of-the-
artforpseudonymisationtechniques.
AgainstthisbackgroundandfollowingpreviousrelevantENISA'swork7,theAgencydecided
underits2020work-programmetoelaboratefurtheronthepracticalapplicationofdata
pseudonymisationtechniques.
1.2OBJECTIVES
TheoverallscopeofthisreportistocontinuepastENISA'sworkbyproviding(onthebasisof
thepreviousanalysis)specificusecasesforpseudonymisation,alongwithmoreadvanced
techniquesandscenariosthatcansupportitspracticalimplementationbydatacontrollersor
processors.
Morespecifically,theobjectivesofthereportareasfollows:
?Explorefurtheradvancedpseudonymisationtechniqueswhichwerenotcoveredin
priorENISA*swork,basedoncryptographicalgorithmsandprivacyenhancing
technologies.
?Discussspecificapplicationusecaseswherepseudonymisationcanbeapplied,
analysingtheparticularscenarios,rolesandtechniquesthatcouldbeofinterestineach
case.Inparticular,forthescopeofthereport,usecasesarepresentedintwodifferent
sectors:(a)healthcareinformationexchange;(b)cybersecurityinformationexchange
withtheuseofinnovativetechnologies(e.g.machinelearningtechnologies).
Itshouldbenotedthattheselectionoftheusecaseswasbasedonthefactthatthespecific
sectors(healthcare,cybersecurity)representquitecommoncasesfortheapplicationof
pseudonymisationinseveralreal-lifesituations.Atthesametime,theselectedusecasesalso
reflectdiverserequirementswithregardtopseudonymisation,e.g.intermsofthe
scenarios/rolesinvolved,aswellasintermsofthetechniquesthatcouldbeappliedinpractice.
Thetargetaudienceofthereportconsistsofdatacontrollers,dataprocessorsand
manufacturers/producersofproducts,servicesandapplications,DataProtectionAuthorities
(DPAs),aswellasanyotherinterestedpartyindatapseudonymisation.
Thedocumentassumesabasiclevelofunderstandingofpersonaldataprotectionprinciplesand
therole/processofpseudonymisation.ForanoverviewofdatapseudonymisationunderGDPR,
pleasealsorefertorelevantENISA'sworkinthefield(ENISA,2019-1)&(ENISA,2019
-2).
Thediscussionandexamplespresentedinthereportareonlyfocusedontechnicalsolutions
thatcouldpromoteprivacyanddataprotection;theyshouldbynomeansbeinterpretedasa
legalopinionontherelevantcases.
https://www.enisa.europa.eu/topics/data-protection/privacy-by-design
1.3OUTLINE
Theoutlineoftheremainingpartofthereportisasfollows:
?Chapter2providesanoverviewofthebasicscenarios,pseudonymisationtechniques
andpoliciesdiscussedunder(ENISA,2019-2).
?Chapter3presentsanumberofadvancedpseudonymisationtechniques,including
asymmetricencryption,ringsignatures,chainingmode,Merkletrees,pseudonymswith
prooforownership,securemultipartycomputationandsecretsharingschemes.
?Chapter4analysespseudonymisationtechniquesandapplicationscenariosinthe
areaofhealthcare.Itparticularlyfocusesontheuseofthetree-basedpseudonyms
approachandthedatacustodianshipmodel.
?Chapter5discussestheapplicationofpseudonymisationinthebroaderareaof
cybersecuritytechnologies.
?Chapter6summarisesthepreviousdiscussionsandprovidesthemainconclusions
andrecommendationsforallrelatedstakeholders.
ThisreportispartoftheworkofENISAintheareaofprivacyanddataprotection8,which
focusesonanalysingtechnicalsolutionsfortheimplementationofGDPR,privacybydesignand
securityofpersonaldataprocessing.
https://www.enisa.europa.eu/topics/data-protection
2.PSEUDONYMISATIONBASICS
Asmentionedin(ENISA,2019-2),themostobviousbenefitofpseudonymisationistohidethe
identityofthedatasubjectsfromanythirdparty(otherthanthePseudonymisationEntity,i.e.the
entityresponsibleforpseudonymisation).Still,pseudonymisationcangobeyondhidingreal
identitiesanddataminimisationintosupportingthedataprotectiongoalofunlinkabilityand
contributingtowardsdataaccuracy.
Whenimplementingpseudonymisation,itisimportanttoclarifyasafirststeptheapplication
scenarioandthedifferentrolesinvolved,inparticulartheroleofthePseudonymisationEntity
(PE),whichcanbeattributedtodifferententities(e.g.adatacontroller,adataprocessor,a
TrustedThirdPartyorthedatasubject),dependingonthecase.Underaspecificscenario,itis
thenrequiredtoconsiderthebestpossiblepseudonymisationtechniqueandpolicythatcanbe
applied,giventhebenefitsandpitfallsthateachoneofthosetechniquesorpoliciesentails.
Obviously,thereisnotaone-size-fits-allapproachandriskanalysisshouldinallcasesbe
involved,consideringprivacyprotection,utility,scalability,etc.
Inthatregard,thisChapterprovidesabriefoverviewofthebasicpseudonymisationscenarios
andtechniques,astheseareoutlinedin(ENISA,2019-2),whichw川bethenfurther
complementedandanalysedinthenextChaptersofthereport.
2.1PSEUDONYMISATIONSCENARIOS
Sixdifferentpseudonynimisationscenariosarediscussedin(ENISA,2019-2)andare
presentedinFigure1below.Thedefiningdifferencebetweenthescenariosisfirstlytheactor
whotakestheroleofthePseudonymisationEntity(PE)andsecondlytheotherpotentialactors
thatmaybeinvolved(andtheirroles).
Clearly,inallthreefirstscenariosinFigure1,thedatacontrolleristhePE,eitheractingalone
(scenario1)orinvolvingaprocessorbeforepseudonymisation(scenario2)orafter
pseudonymisation(scenario3).Inscenario4,thePEistheprocessorthatperforms
pseudonymisationonbehalfofthecontroller(thus,controllermaintainingstillcontroloverthe
originaldata).Scenario5setsaTrustedThirdPartyentity,outsidethecontrolofthedata
controller,asPE,thereforeinvolvinganintermediarytosafeguardthepseudonymisation
process.Lastly,scenario6providesfordatasubjectstobethePEand,thus,controlan
importantpartofthepseudonymisationprocess.
Laterinthisreportwewillexplorethepracticalapplicationofthesescenariosinspecificcases,
especiallyscenarios1and3undercybersecurityusecases(Chapter5)andscenarios5and6
underhealthcareusecases(Chapter4).Forthescenario5particularlywewillfurtherdetailthe
notionoftheTrustedThirdParty(datacustodian)andtheformsthatitcouldtakeinthe
healthcaresector.
Figure1:Basicpseudonymisationscenarios
PseudonymlsatlonScenario1
DATACONTROLLER&DATACONTROLLER&
DATADATAPSEUDONYMISATIONDATAPSEUDONYMISATIONDATA
SUBJECTSPROCESSORENTITYSUBJECTSENTITYCONTROLLER
BetaInc.AlphaCorp.AlphaCorp.BetaInc.
PseudonymisationSecretPseudonymisationSecret
IdentifierPseudonymIdentifierPseudonym
Alice15Alice15
Bob28Bob28
Charly3Charly3
PscudonymiMtlonScenario2PseudonymisationScenario3
DATADATA
CONTROLLERCONTROLLER
AlphaCorp.AlphaCorp.
PseudonyvniMtionScvnario4PieudonyniisationScenario5
taeudon^vrikMtlonSecret
Alice15
IdtnclfltrPMiid?nyni
Hob28
Charly3
PseudonymlMtlonScenario6
2.2PSEUDONYMISATIONTECHNIQUESANDPOLICIES
Thebasicpseudonymisationtechniquesthatcanbeappliedinpractice,asalsodiscussedin
(ENISA,2019-2)areasfollows:
?Counter:thesimplestpseudonymisationfunction,wheretheidentifiersaresubstituted
byanumberchosenbyamonotoniccounter.Itsadvantagesrestwithitssimplicity,
whichmakeitagoodcandidateforsmallandnotcomplexdatasets.Itprovidesfor
pseudonymswithnoconnectiontotheinitialidentifiers(althoughthesequential
characterofthecountercanstillprovideinformationontheorderofthedatawithina
dataset).However,thesolutionmayhaveimplementationandscalabilityissuesin
casesoflargeandmoresophisticateddatasets.
?RandomNumberGenerator(RNG):asimilarapproachtothecounterwiththe
differencethatarandomnumberisassignedtotheidentifier.Itprovidesstrongdata
protection(as,contrarytothecounter,arandomnumberisusedtocreateeach
pseudonym,thusitisdifficulttoextractinformationregardingtheinitialidentifier,
unlessthemappingtableiscompromised).Collisions,however,maybeanissue9,as
wellasscalability,dependingontheimplementationscenario.
?Cryptographichashfunction:directlyappliedtoanidentifiertoobtainthe
correspondingpseudonymwiththepropertiesofbeinga)one-wayandb)collision
free10.Whileahashfunctioncansignificantlycontributetowardsdataintegrity,itis
generallyconsideredweakasapseudonymisationtechnique,asitispronetobrute
forceanddictionaryattacks(ENISA,2019-2).
?Messageauthenticationcode(MAC):similartoacryptographichashfunctionexcept
thatasecretkeyisintroducedtogeneratethepseudonym.Withouttheknowledgeof
thiskey,itisnotpossibletomaptheidentifiersandthepseudonyms.MACisgenerally
consideredasarobustpseudonymisationtechniquefromadataprotectionpointof
view.Recoverymightbeanissueinsomecases(i.e.iftheoriginalidentifiersarenot
beingstored).Differentvariationsofthemethodmayapplywithdifferentutilityand
scalabilityrequirements.HMAC(Bellare,Canetti,&Krawczyk,1996)isbyfarthemost
populardesignofmessageauthenticationcodeusedinInternetprotocols.
?Symmetricencryption:theblockcipherisusedtoencryptanidentifierusingasecret
key,whichisboththepseudonymisationsecretandtherecoverysecret.Usingblock
ciphersforpseudonymisationrequirestodealwiththeblocksize.Symmetricencryption
isarobustpseudonymisationtechnique,withseveralpropertiesbeingsimilartoMAC
(i.e.theaforementionedpropertiesofthesecretkey).Onepossibleissueintermsof
dataminimisationisthatthePEcanalwaysreversethepseudonyms,evenifthereis
noneedtostoretheinitialindividuals'identifiers.
9Still,itshouldbenotedthatcryptography-basedconstructionsofpseudo-randomnumbergeneratorsareavailable,whichcan
avoidcollisionsiftheyareproperlyconfiguredandcouldbepossiblysimilarlyusedtoprovidepseudonyms(e.g.discretelogarithm
basedconstructions(Blum,Feldman,&Micali,1984).
10Thisholdsundertheassumptionthatacryptographicallystronghashfunctionisused.Moreover,itisessentialthathashing
shouldbeappliedtoappropriateindividual'sidentifiers(e.g.hashingthefirstnameandlastnamemaynotavoidcollisions,ifthis
combinationdoesnotconstituteanidentifierinaspecificcontext-i.e.theremaybetwoindividualswiththesamefistnameand
lastname).Moredetailsaregivenin(ENISA,2019-1)(ENISA,2019-2).
Independentlyofthechoiceofthetechnique,thepseudonymisationpolicy(i.e.thepractical
implementationofthetechnique)isalsocriticaltotheimplementationinpractice.Threedifferent
pseudonymisationpolicieshavebeenconsideredtothatend:
?Deterministicpseudonymisation:inallthedatabasesandeachtimeitappears,Idis
alwaysreplacedbythesamepseudonympseudo.
?Documentrandomisedpseudonymisation:eachtimeIdappearsinadatabase,itis
substitutedwithadifferentpseudonym(pseudoi,pseudo2i...)-,however,Idisalways
mappedtothesamecollectionof(pseudoi,pseudo^inthedatasetAandB.
?Fullyrandomisedpseudonymisation:foranyoccurrencesofIdwithinada
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 居間合同2025年度版:定義、屬性與服務(wù)質(zhì)量評(píng)估體系3篇
- 二零二五年度能源項(xiàng)目權(quán)益轉(zhuǎn)讓與投資合同3篇
- 二零二五年軟件開發(fā)服務(wù)合同4篇
- 二零二五版智能LED戶外廣告平臺(tái)合作項(xiàng)目合同3篇
- 影視器材租賃與技術(shù)服務(wù)2025年度合同3篇
- 二零二五年度房地產(chǎn)開發(fā)項(xiàng)目造價(jià)咨詢合同6篇
- 二零二五版搬家運(yùn)輸合同:搬家運(yùn)輸途中物品丟失賠償3篇
- 二零二五版海鮮加盟店日常運(yùn)營管理與維護(hù)服務(wù)合同范本2篇
- 二零二五年度車輛轉(zhuǎn)讓附帶綠色出行獎(jiǎng)勵(lì)政策合同3篇
- 二零二五年度智能辦公桌椅研發(fā)合作合同2篇
- 一年級(jí)語文雨點(diǎn)兒-教學(xué)課件【希沃白板初階培訓(xùn)結(jié)營大作業(yè)】
- 替格瑞洛藥物作用機(jī)制、不良反應(yīng)機(jī)制、與氯吡格雷區(qū)別和合理使用
- 河北省大學(xué)生調(diào)研河北社會(huì)調(diào)查活動(dòng)項(xiàng)目申請(qǐng)書
- GB/T 20920-2007電子水平儀
- 如何提高教師的課程領(lǐng)導(dǎo)力
- 企業(yè)人員組織結(jié)構(gòu)圖
- 日本疾病診斷分組(DPC)定額支付方式課件
- 兩段焙燒除砷技術(shù)簡介 - 文字版(1)(2)課件
- 實(shí)習(xí)證明模板免費(fèi)下載【8篇】
- 復(fù)旦大學(xué)用經(jīng)濟(jì)學(xué)智慧解讀中國課件03用大歷史觀看中國社會(huì)轉(zhuǎn)型
- 案件受理登記表模版
評(píng)論
0/150
提交評(píng)論