Joke Collection Website - Bulletin headlines - Legal basis of Wang 'an Brigade

Legal basis of Wang 'an Brigade

Network security has always been the focus of netizens' attention, because for us who live in the Internet age, we will never be associated with the network. In order to ensure the safety of our own property, we must understand these things, so the relevant units are bound by the network security law. Next, let's look at Bian Xiao.

Network security

It refers to the normal operation of the network system by adopting various technologies and management measures, thus ensuring the availability, integrity and confidentiality of network data. The specific meaning of network security will change with the change of "angle". For example, from the perspective of users (individuals, enterprises, etc.). ), they hope that information related to personal privacy or business interests will be protected by confidentiality, integrity and authenticity when transmitted on the network. From the enterprise's point of view, the most important thing is the security encryption and protection of internal information.

Legal basis of network security law

I. On ensuring the safety of network products and services

To maintain network security, we must first ensure the security of network products and services. The exposure draft mainly makes the following provisions: First, it clarifies the security obligations of network products and service providers, including: not publishing malicious programs, promptly informing users of risks such as security defects and loopholes, and continuously providing security maintenance services (Article 18 of the exposure draft). The second is to sum up practical experience, and raise the safety certification and safety detection system of network key equipment and network security special products to law and make necessary norms. The third is to establish a security review system for key information infrastructure operators to purchase network products and services, stipulating that key information infrastructure operators should pass the security review organized by the national network information department in conjunction with relevant departments in the State Council when purchasing network products or services that may affect national security.

Second, about ensuring the security of network operation.

To ensure the safety of network operation, we must implement the responsibility of the first responsible person of the network operator. Accordingly, the draft promotes the current network security level protection system into law, requiring network operators to take corresponding management measures and technical preventive measures in accordance with the requirements of the network security level protection system to fulfill their corresponding network security protection obligations.

In order to ensure the safety of key information infrastructure and safeguard national security, economic security and people's livelihood, the draft has a special section to stipulate the operational safety of key information infrastructure and implement key protection. The scope includes basic information networks, important information systems in important industries and fields, military networks, important government networks and commercial networks with large users. It also stipulates the formulation of security protection measures for key information infrastructure, the security protection obligations of the departments responsible for security protection and operators, and the supervision and support of relevant departments.

Third, about ensuring the security of network data.

With the development and application of cloud computing, big data and other technologies, network data security is very important for maintaining national and economic security, protecting citizens' legitimate rights and interests, and promoting data utilization. To this end, the "Draft for Comment" has made the following provisions: First, network operators are required to take measures such as data classification, important data backup and encryption to prevent network data from being stolen and tampered with. The second is to strengthen the protection of citizens' personal information and prevent citizens' personal information data from being illegally obtained, leaked or illegally used. Third, operators of key information infrastructure are required to store important data such as citizens' personal information in China; If it is really necessary to store or provide it overseas, a safety assessment shall be conducted in accordance with the regulations.

The above is the relevant information about the legal basis and current laws of the Cyber Security Law. To sum up, we can know that the network security law generally protects network products and should also protect network data. If you have any other questions, please consult online.