laitimes

Knock on the blackboard! Interpret the four highlights of the Cybersecurity Law

author:The rule of law wild goose pagoda

Ministry of State Security

National security is the foundation of national rejuvenation. Adhere to the overall concept of national security, and resolutely safeguard national sovereignty, security and development interests.

The Cybersecurity Law of the People's Republic of China, promulgated on November 7, 2016 and effective as of June 1, 2017, is the first basic law in mainland China to comprehensively regulate cyberspace security management. This law was formulated to ensure network security, safeguard cyberspace sovereignty and national security, and social and public interests, protect the legitimate rights and interests of citizens, legal persons, and other organizations, and promote the healthy development of economic and social informatization.

Let's take a look at the four highlights of the Cybersecurity Law.

Knock on the blackboard! Interpret the four highlights of the Cybersecurity Law
Highlight 1: Clarify the principle of sovereignty in cyberspace

Article 1 of the Cybersecurity Law clearly states that the mainland's sovereignty over cyberspace must be safeguarded. At the same time, Article 2 stipulates that this Law shall apply to the construction, operation, maintenance and use of networks within the territory of the mainland, as well as the supervision and management of network security.

Knock on the blackboard! Interpret the four highlights of the Cybersecurity Law

Cyberspace sovereignty refers to the natural extension of national sovereignty in cyberspace, and is the supreme internal power and external independence enjoyed by a country over network facilities, network subjects, network behaviors, and related network data and information within its own territory based on national sovereignty.

Highlight 2: Clearly implement the online real-name system

Article 24 of the Cybersecurity Law stipulates that when a network operator goes through the formalities for users to access the network or provides services to users, it shall require users to provide real identity information. Where users do not provide real identity information, network operators must not provide them with relevant services.

Knock on the blackboard! Interpret the four highlights of the Cybersecurity Law

The implementation of the network real-name system is conducive to building a good network order. A secure, stable, and prosperous cyberspace is of great significance to economic development and social stability. Cyberspace is virtual, but the people who participate in online activities are real, and some people with ulterior motives wear "vests" and fabricate and distort facts, maliciously guide public opinion, and wantonly spread rumors and smears under virtual identities.

Highlight 3: Clarify the implementation of key protection for critical information infrastructure

Articles 5 and 75 of the Cybersecurity Law stipulate that if a foreign individual or organization engages in activities that endanger the mainland's critical information infrastructure, such as attacking, intruding, interfering with, or sabotaging, and causing serious consequences, the cybersecurity law shall be investigated in accordance with law, and the relevant departments may also decide to freeze the assets of the institution, organization, or individual or take other necessary sanctions.

At the same time, Article 37 of the Cybersecurity Law stipulates that personal information and important data collected and generated by operators of critical information infrastructure in the course of their operations within the territory of the People's Republic of China shall be stored within the territory of the People's Republic of China. Where it is truly necessary to provide it overseas due to operational needs, a security assessment shall be conducted in accordance with the measures formulated by the State Internet Information Department in conjunction with the relevant departments of the State Council.

Knock on the blackboard! Interpret the four highlights of the Cybersecurity Law

Critical information infrastructure refers to important industries and fields such as public communication and information services, energy, transportation, water conservancy, finance, public services, and e-government, as well as other important network facilities, information systems, and other infrastructure that may seriously endanger national security, the national economy, people's livelihood, and the public interest once damaged, lost, or leaked. In recent years, foreign forces have intensified their efforts to spy on and collect data on China's critical information infrastructure, posing a real threat to the mainland's national security. Only by clarifying the rules for the cross-border transmission of relevant important data can we provide an effective guarantee for the security of the mainland's critical information infrastructure.

Highlight 4: Clarify the principle of shared governance

Article 14 of the Cybersecurity Law gives individuals and organizations the right to report acts endangering network security to relevant authorities, while Articles 28 and 69 stipulate that individuals and organizations have the responsibility and obligation to safeguard national security. Network operators shall provide technical support and assistance to public security organs and state security organs in lawfully preserving national security and investigating criminal activities, and where they refuse to provide it, the relevant competent departments are to order corrections;

Knock on the blackboard! Interpret the four highlights of the Cybersecurity Law

The Cybersecurity Law encourages government departments, network builders, network operators, network service providers, network industry organizations, and citizens to participate in cyberspace security governance according to their respective roles.

Reminder from the state security organs

Cyber security is for the people, and cyber security depends on the people. When using the network, all individuals and organizations shall abide by the Constitution and laws, and must not endanger network security, and must not use the network to engage in activities that endanger national security, honor, and interests. Citizens and organizations shall assist and cooperate with state security organs in preserving national security and investigating criminal activities in accordance with law.

Let us work together to comply with cybersecurity laws, enhance cyber security awareness, and work together to build a strong national cyber security barrier.

Please indicate the source of the WeChat public account of the Ministry of State Security

Knock on the blackboard! Interpret the four highlights of the Cybersecurity Law
Knock on the blackboard! Interpret the four highlights of the Cybersecurity Law
Knock on the blackboard! Interpret the four highlights of the Cybersecurity Law
Knock on the blackboard! Interpret the four highlights of the Cybersecurity Law
Knock on the blackboard! Interpret the four highlights of the Cybersecurity Law

Source: National Security Mission

Read on