Joke Collection Website - Public benefit messages - China's first cyber security law

China's first cyber security law

Legal Analysis: On the morning of the 7th, the 24th meeting of the 12th the National People's Congress Standing Committee (NPCSC) passed the Cyber Security Law of the People's Republic of China, which came into effect on June 1 2065438.

This is China's first cyber security law, which clarifies the principle of cyberspace sovereignty, the security obligations of network products and services providers and operators for the first time, further improves the rules for personal information protection, establishes the security protection system for key information infrastructure, increases the punishment for overseas organizations and individuals who damage China's key information infrastructure, and establishes the rules for cross-border transmission of important data in key information infrastructure.

Legal basis: Cyber Security Law of the People's Republic of China

Article 1 This Law is formulated for the purpose of ensuring network security, safeguarding cyberspace sovereignty, national security and social public interests, protecting the legitimate rights and interests of citizens, legal persons and other organizations, and promoting the healthy development of economic and social informatization.

Article 2 This Law is applicable to the construction, operation, maintenance and use of networks and the supervision and administration of network security in People's Republic of China (PRC).

Article 3 The State adheres to the principle of paying equal attention to network security and informatization development, and follows the principles of active utilization, scientific development, management according to law and ensuring security, promoting the construction and interconnection of network infrastructure, encouraging the innovation and application of network technology, supporting the training of network security personnel, establishing and improving the network security guarantee system and improving the network security protection capability.