August 2017

Regulations on the Security for Critical Information Infrastructure (Draft for Comments)(Mainland China)

2017.7.10
Zoe Qiao

On July 10, 2017, the State Internet Information Office promulgated the Regulations on the Security for Critical Information Infrastructure (Draft for Comments) (the "Security Regulations") to kick off a one-month period to solicit opinions. Although the Security Regulations are still at the public opinion solicitation stage, as they are the implementation regulations of the critical information infrastructure protection introduced under the Cybersecurity Law, they are key accompanying provisions of the Cybersecurity Law and play a vital role in the cybersecurity of key domains in this country. Therefore, this article highlights the Security Regulations as follows:
First, the Security Protection Regulations further clarify the scope of protection of critical information infrastructure.
Although the Cybersecurity Law and the Security Regulations both contain enumerated and comprehensive definitions, the newly promulgated Security Regulations have enumerated additional items under the scope of critical information infrastructure on top of the industries and domains named as part of the critical information infrastructure under Article 31 of the original Cybersecurity Law, such as public communications, information services, energy, water conservation, finance, public services, and electronic government, with information networks such as telecommunications networks and the Internet, as well as entities that provide cloud computing, big data and other large-scale public information network services, and scientific research and production units for national defense, large equipment, chemical engineering and food and drugs, as well as news units such as radio stations, television stations and news agencies.
In addition, the Security Protection Regulations improve the security assessment and inspection mechanisms of competent authorities.
Article 39 of the Cybersecurity Law only requires relevant agencies to test for security risks in critical information infrastructure. The Security Regulations, however, set up comprehensive inspections and assessment mechanisms for competent authorities. For instance, the entity in charge of security inspections is the competent authority or regulatory authority for the specified industry. Security inspections and assessments should be conducted under the principles of fairness, efficiency and transparency. Relevant personnel may also be requested to provide explanations, as well as examine, retrieve and copy relevant files. It is insisted that information obtained from security inspections and assessments may only be used for safeguarding cybersecurity and should not be used for other purposes.
The Security Regulations further require that, in addition to the security assessment requirement for offshore access to information stored onshore per the Cybersecurity Law, operation and maintenance of critical information infrastructure shall now be conducted onshore. If offshore and remote maintenance is required due to business needs, notification shall be made in advance to the state authority of the specific business, or the regulatory authority and national security authority. Such requirement will more effectively safeguard the security of information in this country.

本网站上所有资料内容(「内容」)均属理慈国际科技法律事务所所有。本所保留所有权利,除非获得本所事前许可外,均不得以任何形式或以任何方式重制、下载、散布、发行或移转本网站上之内容。

所有内容仅供作参考且非为特定议题或具体个案之法律或专业建议。所有内容未必为最新法律及法规之发展,本所及其编辑群不保证内容之正确性,并明示声明不须对任何人就信赖使用本网站上全部或部分之内容,而据此所为或经许可而为或略而未为之结果负担任何及全部之责任。撰稿作者之观点不代表本所之立场。如有任何建议或疑义,请与本所联系。

作者

Katty
Katty