Advanced Search

Internet Security Protection Technology Measures

Original Language Title: 互联网安全保护技术措施规定

Subscribe to a Global-Regulation Premium Membership Today!

Key Benefits:

Subscribe Now for only USD$40 per month.
(December 13, 2005, the Ministry of public security promulgated as of March 1, 2006, 82nd), first for strengthening and regulating the Internet security technology, ensuring Internet security and information security, and promote the healthy and orderly development of the Internet, safeguarding national security, social order and the public interest, under the management of computer information network and Internet security, these provisions are formulated.
    Internet safety technical measures referred to in the provisions of article refers to Internet network security and information security, technical facilities and techniques to prevent crime.
    The third Internet service provider use units responsible for the implementation of technical measures for Internet security, networking, and technical measures to safeguard Internet security features properly. The fourth Internet service providers, networks using units shall establish appropriate management systems.
    Open, disclose user registration information without the user's consent, except as otherwise provided by laws and regulations.
    Internet service providers, networking units shall use Internet security measures, security measures violate the user shall not use the Internet freedom and privacy of correspondence.
    Fifth public security organs of public information network security supervision Department is responsible for the implementation of the security measures on the Internet according to law, supervision and management. Sixth Internet security measures should be in line with national standards.
    The absence of national standards, should be consistent with public safety industry technical standards. Seventh article Internet service provides who and networking using units should implementation following Internet security technology measures: (a) prevention computer viruses, and network invasion and attack damage, against network security matters or behavior of technology measures; (ii) important database and system main equipment of redundant disaster backup measures; (three) records and retained user login and exit time, and main called number, and account, and Internet address or domain name, and system maintenance log of technology measures; (four) legal, and
    Laws and regulations should implement other security measures. Eighth article provides Internet access service of units except implementation this provides seventh article provides of Internet security technology measures outside, also should implementation has following function of security protection technology measures: (a) records and retained user registered information; (ii) using internal network address and Internet network address conversion way for user provides access service of, can records and retained user using of Internet network address and internal network address corresponds to relationship; (three) records, and track network run State, monitoring, and
    Security auditing features such as network security event is logged. Nineth article provides Internet information service of units except implementation this provides seventh article provides of Internet security technology measures outside, also should implementation has following function of security protection technology measures: (a) in public information service in the found, and stop transmission illegal information, and retained related records; (ii) provides news, and published and electronic announcement, service of, can records and retained released of information content and the released time; (three) opened portal website, and news website, and e-commerce website of, can prevention website, and
    Web page tampering, tampered with and you can automatically recover; (d) to set up electronic bulletin board service, user registration information, and post audit function; (v) offer e-mail and SMS services online, can prevent, clear to indiscriminately send forged, concealing information to the sender marked emails or text messages. Tenth article provides Internet Data Center service of units and networking using units except implementation this provides seventh article provides of Internet security technology measures outside, also should implementation has following function of security protection technology measures: (a) records and retained user registered information; (ii) in public information service in the found, and stop transmission illegal information, and retained related records; (three) networking using units using internal network address and Internet network address conversion way to user provides access service of,
    Capable of recording and retention of Internet users use the network address and the internal network address of correspondence.
    11th provides Internet service unit, in addition to the implementation of the provisions of the seventh Internet safety technical measures provided for in article, you should install and run Internet public Internet service site safety management system.
    12th Internet service provider Internet security measures taken pursuant to these provisions shall have the public safety industry standard networking interfaces.
    13th Internet service providers and networking using technical measures for implementation in accordance with the records retention, records backup functionality should have at least 60 days.
    14th article Internet service provides who and networking using units shall not implementation following damage Internet security technology measures of behavior: (a) unauthorized stop or part stop security technology facilities, and technology means run; (ii) deliberately damage security technology facilities; (three) unauthorized delete, and tampered with security technology facilities, and technology means run program and records; (four) unauthorized change security technology measures of uses and range;
    (V) security measures or other vandalism acts hindering their function properly.
    15th article in violation of the provisions set forth in seventh to 14th, by the public security organs in accordance with the international networking of computer information network security management approach of the article 21st of the regulations will be punished.
    16th section public security organ shall be within the jurisdiction of the Internet service providers and networking and use security measures implementation of guidance, supervision and inspection. Public security organs shall exercise supervision and inspection, Internet service providers, Internet users should be represented in it.
    Public security organs for the supervision and inspection found problems, suggest improvements, inform Internet service providers, Internet users timely rectification.
    When the public security authorities in the supervision and inspection, supervisory and inspective personnel shall be at least two people and should produce their identity documents.
    The 17th public security organs and their staff in violation of the provisions of article, abuse, acts of favoritism, the managers directly responsible and other persons directly responsible shall be given administrative sanctions constitutes a crime, criminal responsibility shall be investigated according to law.
    Internet service providers in 18th article of the rules refers to users with Internet access services, Internet data centre services, Internet information services and Internet services unit.
    Networked units in these rules refers to the application requires Internet connection and use of the unit.
    Provision of Internet data centre services mentioned in these regulations refers to providing hosting, rental and lease of virtual space and other service units.
                                                                                                      The 19th article of the regulations come into force on March 1, 2006.