2020 February 22 - People's Republic of China Law Network Security

Basic information
Reference number People's Republic of China Presidential Decree No. 53
effect level legal
timeliness in force
Date 2016-11-07
implementation date 2017-06-01
publication organ of the NPC Standing
Law Amendment

November 7, 2016 Standing Committee of the 12th National People's Congress 24th meeting of the
body of the
General Provisions
Article
to ensure network security, safeguard cyberspace sovereignty and national security, public interest, the protection of citizens , legal persons and other organizations of the legitimate rights and interests, and promote the healthy development of economic and social information, this law is enacted.
Article
in the territory of People's Republic of China construction, operation, maintenance and use of the network, as well as supervision and management of network security by this Law.
Third
countries adhere to both network security and information technology development, follow the active use, scientific development, according to management, to ensure the safety policy, promote the network infrastructure and interoperability, to encourage innovation and application of network technology, to support the development of network security personnel, establish and improve network security system, improve network security protection.
Article IV
countries have developed and continue to improve network security strategy explicitly protect the basic requirements of network security and the main objective proposed network security policy in key areas, tasks and measures.
Article
State shall take measures, monitoring, prevention, disposal network security risks and threats from inside and outside the People's Republic of China, the protection of critical information infrastructure from attack, intrusion, interference and sabotage, network punish illegal and criminal activities in accordance with law, maintain the network space security and order.
Article
national advocacy honest and trustworthy, healthy and civilized network behavior, promote the spread of socialist core values, to take measures to improve network security awareness and the level of the whole society, the whole society to participate in the promotion of network security environment as well.
Article VII
countries active in cyberspace governance, network technology research and standards development, the fight against international exchanges and cooperation in criminal and other networks to promote the building of peace, security, openness, cooperation cyberspace, multilateral, democratic and transparent network governance system.
eighth
National net letter network security department is responsible for co-ordination of work and related supervision and management. State Council department in charge of telecommunications, public security departments and other relevant authorities in accordance with provisions of this Law and other relevant laws and administrative regulations, responsible for network security and supervision and administration within their respective areas of responsibility. Local people's governments above the county level of network security and regulatory functions, determined in accordance with relevant state regulations.
Article IX
network and service operators to carry out business activities, must abide by laws, administrative regulations, respect social ethics, abide by business ethics, honesty, fulfillment network security obligations, and accept the supervision of government and society, social responsibility.
Article X of
construction, operation or provide network services through a network, it should be in accordance with laws, regulations and national standards and administrative regulations of mandatory requirements, technical measures and other necessary measures to ensure network security and stable operation, to effectively deal with network security incidents, prevent network illegal and criminal activities, to maintain the integrity, confidentiality and availability of network data.
Article XI
network-related industry organizations accordance with the constitution, strengthen self-discipline, to develop guidelines for network security behavior, guide members to strengthen network security, increase network security levels, and promote healthy development of the industry.
Article XII of
the State to protect citizens, legal persons and other organizations according to law the right to use the Internet to promote universal access to the network, improve network service levels, and provide safe, convenient network services, network information according to the law to protect the orderly flow freely. No individual or organization using the network should abide by constitutional law, public order and respect social ethics and shall not endanger network security, should not be used in the national network of endangering national security, honor and interests, inciting to subvert state power and overthrow the socialist system, inciting the split, undermining national unity, promote terrorism, extremism and promote ethnic hatred or ethnic discrimination, the spread of violent, pornographic information, fabricating, spreading false information to disturb the economic order and social order, as well as against the reputation of others, privacy, intellectual property and other legitimate rights and interests and other activities.
Article XIII
State support for research network product and service development is conducive to healthy growth of minors and punish the use of networks to engage in activities harmful physical and mental health of minors, to provide a safe and healthy network environment for minors according to the law.
Article XIV
No individual or organization has the right to report any acts endangering the security of the network to the net in the letter, telecommunications and public security departments. The department received a report shall be made promptly in accordance with law; do not belong to the department duties, shall transfer the right to deal with the department. Relevant information should be kept confidential informants to protect the legitimate rights and interests of informants.
The second chapter network security support and promote
Article XV
countries to establish and improve network security standards. Standardization of administrative departments and other relevant departments in accordance with their respective responsibilities, organizational development and timely revision of national standards for network management and network security products, services and operational safety, industry standards by the State Council of the State Council. State support enterprises, research institutions, universities, industry organizations involved in the development of network-related network of national standards, industry-standard security.
Article XVI
of the State Council and provincial, autonomous regions and municipalities directly under the Central Government shall co-ordinate planning, increase investment, to support key network security technology industries and projects to support research and development and application of network security technology, to promote the safe and reliable networking products and services, intellectual property protection network technology, support enterprises, research institutes and institutions of higher learning and other countries involved in network security technology innovation projects.
Article XVII
national development of the social service system network security, encourage the relevant enterprises, institutions network security certification, testing and risk assessment and other security services.
Article XVIII
The state encourages the development of network and data security using technology to promote open public data resources, promote technological innovation and economic and social development. State support innovative network security management, the new Internet technologies to enhance network security level.
Article XIX
governments at all levels and relevant departments should organize regular network security education and to guide, urge the relevant units to do security network publicity and education work. The mass media should be targeted for the community network security education.
Article XX
state-sponsored enterprises and colleges, vocational schools and other educational and training institutions to develop Internet safety-related education and training, take various measures to cultivate talent network security, promote network security personnel exchanges.
Chapter III network operation security
Article XXI
national implementation of network security protection system. Network operators should be in accordance with the requirements of the network security level protection system, perform the following security duty to protect the network from interference, destruction or unauthorized access to the network to prevent data leakage or stolen, tampered :( a) development of internal security management systems and procedures to determine the person in charge of network security, implementing network security protection responsibilities; (b) technical measures taken to prevent acts of harm network security computer viruses and network attacks, network intrusions and other; (c) take monitoring, recording network running, technical measures of network security incidents, and retained in accordance with the provisions of the relevant web logs at least six months; (d) take data classification, data backup and encryption and other important measures; other obligations under (e) laws and administrative regulations.
Article 22
networking products, services shall comply with the mandatory requirements of the relevant national standards. Networking products, service providers may not set the malicious programs; found its networking products, there is a risk security flaws, bugs and other services, should take immediate remedial measures, in accordance with the provisions promptly inform the user to the relevant competent authorities report. Networking products, service providers should their products, services continue to provide security maintenance; within the period specified or agreed by the parties, shall not terminate the provision of security maintenance. Networking products, services have to collect user information function, the provider shall express to users and obtain consent; involve users' personal information, should also abide by this Law and other relevant laws and administrative regulations on protection of personal information.
Article 23 The
network of key equipment and network security specific products should be in accordance with national standards of mandatory requirements, qualified by the safety certification agencies qualified to meet the requirements or safety testing only after the sale or offer. National Grid letter department in conjunction with relevant departments under the State Council, announced the key network equipment and network security special catalog, and promote safety certification and safety testing results of mutual recognition to avoid duplication of certification, testing.
Article 24
Network operators to users for network access, domain name registration services, network access procedures apply for fixed telephone, mobile phone, etc., or to provide users with information publishing, instant messaging and other services, the signing of the agreement with the user to confirm or provide the service, users should be required to provide real identity information. The user does not provide true identity information, network operators are not allowed to provide related services. National implementation trusted identity network strategy to support research and development of safe and convenient electronic authentication technology, to promote mutual recognition between different electronic authentication.
Article 25
network operators shall develop network security emergency response plan, timely disposal system vulnerabilities, security risks computer viruses, network attacks, network intrusion, etc.; in the event endanger network security, immediately launched the emergency plan, take the appropriate remedial measures and to report to the relevant authorities as required.
Article 26
to carry out network security certification, testing, risk assessment and other activities, to social publishing system vulnerabilities, computer viruses, network attacks, network intrusions and other network information security, should comply with the relevant provisions of the State.
Article 27
No individual or organization may not engage in activities illegal intrusion into networks of others, interfere with the normal function of the network of others, steal network data and other hazards network security; not provide specifically for the network in the invasion, and interfere with the normal function of network protection measures, theft network data and other hazards network security activities, tools; knowingly engaged in activities prejudicial to the security of the network, and may not provide technical support, advertising, payment and settlement help.
Article 28
network operators should be the public security organs, state security organs to maintain law provides technical support and assistance to national security and criminal investigation activities.
Article 29 The
State supports between network operators to collect information on network security, analysis, reporting and emergency response and other aspects of cooperation, to improve the security capabilities of network operators. Relevant industry organizations to establish and improve network security norms and mechanisms for cooperation in this sector, to strengthen the analysis and evaluation of network security risks, regularly risk warning to members, support and assist members to deal with network security risks.
Article 30
Network Information Department and relevant information acquired in the performance of network security protection responsibilities, only for the need to maintain network security, and not for other purposes.
Article 31 The
state public communication and information services, energy, transportation, water conservancy, finance, public services, e-government and other important industries and fields, as well as other once destroyed, the loss of functionality or data leakage, could seriously endanger national security , people's livelihood, the critical information infrastructure of public interest, on the basis of network security protection system, based on special protection. Specific scope and safety measures to protect critical information infrastructures by the State Council. The state encourages network operators outside of the critical information infrastructure of voluntary participation in critical information infrastructure protection system.
Article 32
in accordance with the division of duties prescribed by the State Council, responsible for the protection of critical information infrastructure security departments are working to formulate and implement the industry, the art of critical information infrastructure security plan, direct and supervise the safe operation of critical information infrastructure protection jobs.
Article 33 The
construction of the critical information infrastructure to support business should ensure it has a stable, continuous operation performance, safety and technical measures to ensure synchronized planning, construction, simultaneous use.
Article 34
In addition to the provisions of Article 21 of this Law, critical information infrastructure operators shall perform the following security obligations :( a) set up a special security administration and security management person in charge, and the charge of personnel and the key positions of security background checks; (b) regular practitioners of network security education, technical training and skills assessment; (iii) for critical systems and databases disaster recovery; (iv) develop network security incident response plans and regular exercises; other obligations under (e) laws and administrative regulations.
Article 35
critical information infrastructure of network operators purchasing products and services, may affect national security, it should be through the national network in the letter department in conjunction with relevant departments of the State Council, the national security review.
Article 36 of
the critical information infrastructure of network operators purchasing products and services, shall sign a confidentiality agreement with the security provider in accordance with the regulations, clear security and confidentiality obligations and responsibilities.
Article 37
critical information infrastructure operators collect and generated operating in the territory of People's Republic of China in personal information and important data should be stored in the territory. Due to business needs, and where to overseas provided, it shall be in accordance with national network in the letter department in conjunction with relevant State Council departments to develop ways to assess safety; otherwise prescribed by laws and administrative regulations, in accordance with its provisions.
Article 38
critical information infrastructure operator shall himself or entrust their network security services and the possible risk of network security test and evaluation carried out at least once a year, to assess the situation and improve the detection measures submitted to the responsible critical information infrastructure security affairs.
Article 39
National Grid and Information Department to coordinate the departments concerned should take the following measures to secure the protection of critical information infrastructures :( a) the security risk of critical information infrastructure will be random testing, suggest improvements, if necessary, can be entrusted network security services for network security risk assessment to detect the presence of; (b) regularly organizes the critical information infrastructure of the network operator safety emergency drills to improve the level of response to network security events and synergy capabilities; (iii) promote the relevant departments, cybersecurity information sharing critical information between infrastructure operators and related research institutions, and other network security services; (iv) emergency response network security incidents and recovery network functions, to provide technical support and assistance.
Chapter IV of network information security
Article 40
network operators should collect information on its users strictly confidential, and establish and improve the user information protection system.
Article 41
network operators to collect, use of personal information, should follow the legal, proper and necessary principle, public collection, usage rules, express the collection, the purpose of the use of information, methods and scope, and the consent of the collectors. Services unrelated to the personal information of the network operator shall not collect its offer, shall not violate laws, administrative regulations and bilateral agreements to collect, use of personal information, and shall be in accordance with laws, administrative regulations and the agreement with the user, the process save it personal information.
Article 42
Network operators may not disclosure, alteration, destruction of personal information it collects; without the consent of the collectors may not provide personal information to others. However, after processing can not identify a specific individual exception and can not be restored. Network operators should take technical measures and other necessary measures to ensure the security of personal information it collects, prevent information leakage, damage, lost. Or may occur in the event of leakage of personal information, damage, lost the case, it should take immediate remedial measures, in accordance with the provisions promptly inform the user to the relevant competent authorities report.
Article 43
individuals found that network operators violate laws, administrative regulations or the two sides agreed to the collection, use their personal information, the right to require network operators to delete their personal information; find network operators to collect, store their personal information is wrong, the right to require network operators to be corrected. Network operators should take measures to delete or correct.
Article 44
Any individual or organization may obtain personal information stolen or otherwise unlawfully, or illegally sold or illegally providing personal information to others.
Article 45 The
departments and their staff members with network security supervision and administration according to law, must be aware of personal information in carrying out their duties, privacy and trade secrets strictly confidential and shall not disclose, sell or illegally available to others.
Article 46
No individual or organization shall be responsible for the use of network behavior, may not establish for the implementation of fraud, criminal methods to teach, production or sale of contraband, illegal and criminal activities of the site and other controlled goods, communications group, should not be used WebCast involving fraud, making or selling contraband goods, information, and other controlled substances illegal and criminal activities.
Article 47
network operators should strengthen the management of information published by its users and found that laws and administrative regulations prohibit the release or transfer of information, should immediately stop the transmission of the information, to take measures to eliminate the disposal, etc., to prevent the diffusion of information, save relevant records, and report to the relevant authorities.
Article 48
Electronic information sent by any individual and organization, application software shall not be used malicious programs shall not contain laws and administrative regulations prohibit the release or transfer of information. Send electronic information service providers and application software download service provider shall perform security management obligations, the user has to know that the behavior of the preceding paragraph, it shall cease to provide services, to take measures to eliminate the disposal, etc., keep the relevant records, and the relevant authorities report.
Article 49
network operators should establish a network of information security complaints reporting system, information published complaints, reporting methods, timely processing and handling complaints and reports on network information security. Supervision and inspection network operators to network and Information Department and relevant departments according to law, shall cooperate.
Article 50
National Grid and other departments concerned to fulfill the letter of network information security supervision and administration according to law, find information laws, administrative regulations prohibit the release or transfer, network operators should be required to stop transmitting, to take measures to eliminate the disposal, etc., keep the relevant records ; the above information comes from outside the People's Republic of China, it shall notify the relevant bodies to take technical measures and other necessary measures to interrupt transmission.
Chapter V monitoring and early warning and emergency response
Article 51
established national network security monitoring and early warning and communications systems. National Grid and Information Department should coordinate the relevant departments to enhance network security information collection, analysis and reporting work, in accordance with the provisions of the uniform distribution network security monitoring and early warning information.
Article 52
is responsible for critical information infrastructure protection security departments should establish and improve the industry, network security monitoring and early warning and communications systems in the field, and network security monitoring and early warning information submitted in accordance with regulations.
Article 53
National Grid and Information Department to coordinate relevant departments to establish and improve network security risk assessment and emergency response mechanisms, the development of network security emergency response plan and regular exercise. Responsible for critical information infrastructure security affairs shall develop the industry, network security emergency response plan in the art, and regular exercise. Network security emergency response plan for network security incidents should be graded according to the degree of harm after the incident, and other factors affecting the scope of, and provides the appropriate emergency measures.
Article 54
of network security incidents occur when risk increases, the provincial people's governments shall, in accordance with statutory authorities and procedures and in accordance with the characteristics of the network security risks and possible harm, take the following measures :( a) asked relevant departments, agencies and the timely collection, reporting information, strengthening the monitoring of network security risks; (2) to organize the relevant departments, agencies and professionals, network security risk analysis and evaluation of information, the possibility to predict events, the scope and extent of harm; (c) the release to the public network security risk warning, issued avoided, mitigation measures harm.
Article 55
of network security incidents, network security incidents should immediately start contingency plans, network security incident investigation and assessment, require network operators to take technical measures and other necessary measures to eliminate safety hazards, prevent harm to expand, and in a timely manner warning release information to the public relating to the community.
Article 56
above the provincial level people's governments in the implementation of network security supervision and management responsibilities, we found there is a big security risk or network security incidents, in accordance with the provisions of the statutory authority and procedures on behalf of the network operator's person or the person responsible for the interviews. Network operators should take measures in accordance with the requirements, rectification, eliminate hidden dangers.
Article 57
because of network security incidents, the occurrence of unexpected events or production safety accident, it should be disposed of in accordance with relevant laws and administrative regulations "Emergency Response Law of People's Republic of China", "Production Safety Law of People's Republic of China", etc. .
Article 58
for the maintenance of national security and public order, social security needs major emergency incidents disposal, decision or approval by the State Council, may take temporary measures to limit and other network traffic in a particular area.
Chapter VI Legal Liability
Article 59
The network operator does not fulfill the provisions of Article one, network security protection obligations specified in Article 25, by the competent authorities shall order correction, given a warning; refuse to correct or cause harm network security consequences, ten thousand more than yuan to 100,000 yuan fine, the person directly responsible for the 50,000 yuan fine of $ 5,000 or more. Critical information infrastructure operator does not fulfill Article 33 of this Law, Article 34, the obligation to protect the network security of Article 36, Article 38 stipulated by the relevant competent departments shall order correction, given a warning ; refuse to correct or cause harm to network security and other consequences, a fine of one million yuan more than 100,000 yuan, the person directly responsible for at 100,000 yuan fine of $ 10,000 or more.
Article 60
in violation of the first paragraph of Article 22 of this Law, the provisions of paragraph (2) and Article 48, any of the following acts shall be ordered by the competent department of corrections, give a warning; refuse to correct or cause harm network security consequences, 50,000 yuan more than 500,000 yuan fine, the person directly responsible for at 100,000 yuan fine of $ 10,000 or more :( a) set up a malicious program; (b) to risks of their products, services security flaws, vulnerabilities and other remedial measures are not taken immediately, or failing to promptly inform the user of the report to the relevant authorities; (iii) unauthorized termination of its products and services to provide safe maintenance.
Article 61
network operators who violate the provisions of Article 24 first paragraph, did not require users to provide real identity information, or provide related services for the user does not provide real identity information by the relevant competent departments shall order rectification; or refuse to correct the circumstances are serious, five hundred thousand fine of $ 50,000 or more, and may be ordered by the competent authorities to suspend the relevant business, ordered to stop, to close the site, revoke the relevant business license or business license revoked, directly responsible for the charge and other directly responsible personnel at 100,000 yuan fine of $ 10,000 or more.
Article 62
In violation of Article 26 of this Law, conduct network security certification, testing, risk assessment and other activities, or publishing system vulnerabilities, computer viruses, network attacks, network intrusions and other network security information to the community, ordered by the competent department of corrections, given a warning; refuse to correct or circumstances are serious, at 100,000 yuan fine of $ 10,000 or more, and may be ordered by the competent authorities to suspend the relevant business, ordered to stop, to close the site, revoke the relevant business license or business license revoked, for directly in charge and other directly responsible personnel 50,000 yuan fine of $ 5,000 or more.
Article 63
violation of Article 27 of this Law, engaged in activities that endanger network security, or to provide specialized technical support programs to endanger network security activities, tools, or to endanger the security of network activity for others, advertising, payment settlement and other help, do not constitute a crime, the public security authorities confiscate the illegal income, 5 days detention, can fine of over 50,000 yuan to 500,000 yuan fine; the circumstances are serious, at least five days the following custody for 15 days, more than 100,000 yuan and may impose a fine of one million yuan. Units with the conduct by the public security organ shall confiscate the illegal income, a fine of one million yuan more than 100,000 yuan, and directly in charge and other directly responsible personnel shall be punished in accordance with the preceding paragraph. Violation of Article 27 of this Law, subject to administrative penalties for public security personnel shall not engage in network security management and network operators work in key positions within five years; people subject to criminal punishment, he may not engage in key positions in operations and network security management network jobs.
Article 64
Network operators, providers of network products or services in violation of the provisions of Article 22 (3), Article 63 of this Law Article 41 to the fourth, infringement of the right to personal information is protected by law, by the competent authorities ordered to correct, depending on the seriousness simply or concurrently a warning, confiscate the illegal income, times the illegal income more than doubled fine, no illegal gains, a fine of one million yuan, the person directly responsible and other directly responsible personnel and one million yuan to 100,000 yuan fine; the circumstances are serious, and can be ordered to suspend the relevant business, ordered to stop, to close the site, revoke the relevant business license or business license revoked. Violation of Article 44 of this Law, steal or otherwise illegally acquired, or illegally sold illegally providing personal information to others, does not constitute a crime, the public security authorities confiscate the illegal income, impose illegal income more than doubled ten times fine, no illegal gains, a fine of one million yuan.
Article 65 of the
critical information infrastructure of operators in violation of the provisions of Article 35 of this Law, without the use of safety review or not to review the security of the network through a product or service, by the competent authorities ordered to stop using, the amount of the purchase ten times more than double the fine; in charge and other directly responsible personnel directly responsible at 100,000 yuan fine of $ 10,000 or more.
Article 66
critical information infrastructure operators in violation of the provisions of Article 37 of this Law, outside the store network data, network or provide data to the outside, ordered to make corrections by the competent authorities, be given a warning, confiscate the illegal income, of fifty yuan fine of $ 50,000 or more, and may be ordered to suspend the business, ordered to stop, to close the site, revoke the relevant business license or revoke the business license; in charge and other directly responsible personnel directly responsible yuan and not more than 100,000 yuan fine.
Article 67
In violation of the provisions of Article 46 of this Law, setting up websites for the implementation of criminal activities, distribution group, or the use of information web publishing involves performing illegal and criminal activities, does not constitute a crime, detained by the public security organ 5 days , may impose a fine of 100,000 yuan; the circumstances are serious, at least five days custody for 15 days or less, you can fine of over 50,000 yuan to 500,000 yuan fine. Closed criminal activities for the implementation of the website, newsletter group. Units with the conduct by the public security organs of fifty yuan fine of $ 100,000 or more, and directly in charge and other directly responsible personnel shall be punished in accordance with the preceding paragraph.
Article 68
network operators in violation of the provisions of Article 47 of this Law, laws, administrative regulations prohibit the release or transfer of information transmission is not stopped, to take measures to eliminate the disposal, etc., keep the relevant records, ordered by the competent department of corrections be given a warning, confiscation of illegal gains; refuse to correct or circumstances are serious, a fine of five hundred thousand yuan or more, and may be ordered to suspend the business, ordered to stop, to close the site, revoke the relevant business license or business license revoked , in charge and other directly responsible personnel directly responsible for at one million yuan to 100,000 yuan fine. Electronic messaging services provider, application software download service providers, non-compliance and safety management obligations specified in the second paragraph of Article 48 of this Law, in accordance with the preceding paragraph shall be punished.
Article 69
network operators in violation of the provisions of this Act, any of the following acts by the relevant competent departments shall order rectification; refuse to correct or circumstances are serious, a fine of five hundred thousand yuan, directly responsible for executives and other directly responsible personnel at a 100,000 yuan fine :( a) not in accordance with the requirements of the relevant departments prohibit publication or transmission of information on laws and administrative regulations, taken to stop transmission, elimination of disposal measures ; (b) to prevent or obstruct the supervision and inspection of the implementation of the relevant departments in accordance with law; (3) refusing to provide technical support and assistance to the public security organs, state security organs.
Article 70
issued or transmitted in Article 12 (2) and other laws and administrative regulations prohibit the release or transfer of information, and punished in accordance with relevant laws and administrative regulations.
Article 71
There are violations of the provisions of this Law, in accordance with relevant laws and administrative regulations credited to the credit files, and be publicized.
Article 72
State organs government network operator fails to perform network security obligations under this law, its superior organ or the relevant authority shall order rectification; in charge and other directly responsible personnel directly responsible shall be punished.
Article 73
Network and Information Department and relevant departments in violation of the provisions of Article 30 of this Law, the information acquired in the performance of network security protection responsibilities for other purposes, to give the persons in charge and other directly responsible personnel directly responsible according to law punishment. Network Information Department and other relevant departments who neglect their duties, abuse their powers, do not constitute a crime, shall be punished according to law.
Article 74
violation of this Law, causes damage to others shall bear civil liability. Violation of this provision constitutes a violation of public security administration, public security administration punishment; constitute a crime, be held criminally responsible.
Article 75
overseas institutions, organizations and individuals engaged in the attack, intrusion, interference, damage and other hazards People's Republic of China of activities critical information infrastructure, causing serious consequences, shall be held liable; public security departments under the State Council and relevant departments and It may decide to freeze property or other necessary sanctions for the institutions, organizations and individuals.
Chapter VII Supplementary Provisions
Article 76
Law, the following terms used in :( a) network, the system refers to the information according to certain rules and procedures for the collection, storage, transmission, exchange, or other processing information by the computer terminal and related equipment thereof. (B) network security, integrity means that by taking the necessary measures to prevent attacks on the network, intrusion, interference, destruction and illegal use and accidents, the network is in a state of stable and reliable operation and to protect network data, confidentiality availability of capacity. (C) network operators, is the owner of the network, network managers and service providers. (D) a data network, the network refers to the collection, storage, transmission, processing, and produce a variety of electronic data. (E) personal information, refer to various identification information can be used alone or in combination with other natural personal identity information electronically recorded or otherwise, including but not limited to natural name, date of birth, ID number, personal biometric information , address, phone number and so on.
Article 77 The
storage, processing network information involving state secrets operational security, in addition shall comply with this Act, shall also comply with privacy laws and administrative regulations.
Article 78
security military network shall be formulated by the Central Military Commission.
Article 79
of this Law since June 1, 2017 into effect.

Guess you like

Origin www.cnblogs.com/HelloWesley/p/12343896.html