1. Legislation history of cybersecurity law
2. Competent authorities involved in cybersecurity law
3. Network and network operators
4. Security risk identification for key industries and key businesses
5. Protection of sensitive personal information
Definition of personal sensitive information:
6. Compliance countermeasures-how to judge whether it is personal data
7. Protection of Business Sensitive Information