Advanced Search

Heilongjiang Provincial People's Government On The Amendment Of The Decision Of The Regulations On The Safety Management Of Computer Information System In Heilongjiang Province

Original Language Title: 黑龙江省人民政府关于修改《黑龙江省计算机信息系统安全管理规定》的决定

Subscribe to a Global-Regulation Premium Membership Today!

Key Benefits:

Subscribe Now for only USD$40 per month.

(Consideration of the 42th ordinary meeting of the Government of the Blackonang on 20 October 2006 of the adoption of the Decree No. 18 of 20 October 2006 on the date of publication of the People's Government Order No. 18 of 20 October 2006)

The Government of the people of the Blackang Province decided to amend the Safety of Computer Information Systems in the Blackang Province as follows:
I. Delete Article 11: “The staff of the computer information system shall be trained in computer security and the examination of the eligible party may take the floor.”
Delete article 22: “Services for the safety of computer information systems and licensing systems.
The sales sector of specialized computer information systems safety products should apply to the district-level public security authorities, subject to review by the public security authorities of the city (the Agency), to the approval of the provincial public security authorities and to the issuance of a licence for sale.”
Article 23 was deleted: “The computer information systems security-specific product distribution sector should sell qualified products detected by public security agencies.
Where computer information systems are to be sold in the administrative regions of the province, they must be certified by provincial public security authorities and sold.”
Delete article 33, “serious circumstances are authorized by provincial public security authorities to complete the airport”.
Delete subparagraph (iii): “Operators of computer information systems, without security accreditation”.
V. Reclassification of article 32 into article 29, in which it “shall suspend the network by the provincial public security authorities, provide warnings that could be fined by more than 150,000 dollars in the year 2000; have the proceeds of the violation and the proceeds of confiscation” as “the warnings granted by the provincial public security authorities and may be fined up to 150,000 dollars”.
Article 33 was replaced with article 33, which reads as follows: “The confiscation of unlawful goods by the public security organs at the district level and a fine of up to 150,000 dollars in the 2000 yen; the proceeds of the violation, except for the confiscation of proceeds of the conflict and the fine of between 1 and 3 times the proceeds of the violation”, as follows:
Delete subparagraph (i): “Un licensee of the sale of specialized products for the safety of computer information systems”.
Delete subparagraph (ii) “Sale of specialized computer information systems that are not certified by public security authorities”.
Delete article 37: “This provision shall be interpreted by the Ministry of Public Security”.
In addition, the order of provisions has been adjusted accordingly.
This decision is implemented from the date of publication.
Following the consequential changes in the Safety of Computer Information Systems in the Blackang Province, this decision was renewed.

Annex: Safety of computer information systems in the Blackang Province (Amendments in 2006)
Article 1 promotes the application and development of computers, preserves national and social public interests, and establishes this provision in line with relevant national laws, regulations and regulations.
The computer information system referred to in Article 2, which refers to the personal machine system for the collection, processing, storage, retrieval, retrieval, and processing of information in accordance with certain application objectives and rules.
Article 3. This provision applies to units and individuals that establish and use computer information systems within the territorial administration.
The security management of the computer information system of the military within the province is carried out in accordance with the relevant legislation of the military system.
Article IV. Public security authorities at all levels are responsible for the safety management of computer information systems. The primary responsibility is:
(i) Oversight, inspection and guidance on the safe protection of computer information systems;
(ii) The investigation of offences against the safety of computer information systems;
(iii) Processing of computer information systems safety reviews, registrations and filings;
(iv) The security clearance of the computer air fleet design programme and the pre-receipation of airfare delivery;
(v) Organizing computer information systems safety promotion education;
(vi) Other functions for the safe management of computer information systems.
Article 5. Computer information systems are protected at a level of safety, and the level of safety of computer information systems is divided into information security and system reliability levels.
Article 6
(i) Level A, high-sensitive information and absolute mandatory protection;
(ii) B, sensitive information and mandatory protection;
(iii) Level C, internal management information and autonomous security protection;
(iv) Level D, public information and general security protection.
Article 7.
Article 8 establishes units and individuals of the computer information system to be declared to local (zone) public security authorities, which are accredited by the public security authorities of the city (the executive branch) and are reported to the provincial public security authorities, which are eligible for security inspections, determine the security hierarchy, process registration procedures and be used by the party receiving a qualified certificate of safety. Units and individuals that have established computer information systems should be added within the deadline.
Security monitoring and inspection of computer information systems is carried out regularly by public security authorities.
Article 9. The competent authorities and user units of the computer information system should establish safety management organizations, establish a sound security management system to ensure the implementation of security measures.
(i) Functioning the approval system;
(ii) The day management system;
(iii) Security audit system;
(iv) Disaster recovery plans;
(v) Computer airfields and access systems in other important regions;
(vi) hardware, software, networks, use and maintenance systems;
(vii) Account, password management system;
(viii) Harmful data and computer-related prevention, detection, reporting and clearance management systems.
Article 10 Use units of computer information systems must be equipped with specialized computer information systems safety-related products detected by public security authorities.
Article 11. The development, production, development, distribution and use of computer information systems shall be subject to national computer information systems safety standards and safety norms.
Article 12 Computers should be consistent with national standards and national provisions.
Construction near the computer-based premises shall not endanger the safety of computer information systems.
Article 13. The computer air fleet design programme, which is requested by the user unit to the above-mentioned public security authorities, shall provide security clearances within 5 days.
Article 14. New construction, alteration, expansion (including in-house renovations, subsidiaries) of computers must be carried out in accordance with the relevant national provisions and technical norms.
The construction units for the construction, alteration and expansion of computer air fleets should be strictly constructed in accordance with the computer air fleet design programme approved by the public security authorities.
The new construction, alteration and expansion of computer air fleets should be tested by public security authorities in accordance with the relevant provisions of the State. No computer-based buildings without experience or incompatible with the relevant provisions of the State, technical norms require may be used.
Article 16 Use units and individuals of the computer information system on the international network should be reviewed by public security authorities in the city (the Agency) within 30 days of formal interconnection to the provincial public security authorities.
Article 17 and the International Networking Unit must have sound security confidential management systems and security technical protection measures.
Article 18
Article 19 provides units, intermodal units, access units, user units and user-friendly security for international Internet connections.
Article 20 establishes an open-door facility to provide an operating unit for the value added operation of the computer network, subject to security clearance and clearance by provincial public security authorities.
Article 21, the media of transport, carrying, mailing of computer information, should be declared to the customs, and customs should be reported in a timely manner to the local public security authorities and to the provincial public security authorities, if they find information that endangers the safety of computer information systems.
Sections or individuals producing, selling, renting, maintenance of computers and software must be assured of computers and software non-virus and other harmful data after the departure, sale, rent and maintenance.
No units and individuals shall engage in the following activities without review by local public security authorities, approval by provincial public security authorities:
(i) To collect and study computer viruses;
(ii) Production, sale, rental of computer testing, clearance and protection tools.
Article 24 shall not engage in any form in activities of the media that produces, disseminates, sells, transports, carrys, mails containing harmful data, such as anti-moval political content and obscene content.
No unit or individual shall engage in the following activities:
(i) Creation, dissemination of computers and other harmful data;
(ii) The publication, publication, distribution, sale, rental of books and other media relating to the computerized source process;
(iii) Activities related to computerized air conditioning;
(iv) Public launch of activities such as computer sanitary conditions.
Any unit and individual found using computer information systems for criminal activities and computer information systems with computer virus or other harmful data should pay attention to the protection of sites and relevant information and report promptly to the state-level public security authorities at the location.
Article 27, in violation of this provision, is one of the following acts, which is modified by an order of responsibility by a public security authority over the district level, with a warning and a fine of more than 1000 dollars:
(i) Units and individuals that have established or have established computer information systems that have not been declared to public security authorities;
(ii) The use of computer information systems units does not provide for the establishment of safety management organizations and security management systems, resulting in loss of computer information systems equipment or facilities;
(iii) The detection of computer sanitary conditions and the use of computer crime cases, which are not reported to the public security authorities in a timely manner;
(iv) The use unit of computer information systems is not equipped with the testing of qualified computer security-specific products by public security authorities;
(v) Other acts that endanger the safety of computer information systems.
Article 28 violates one of the following acts, which has been modified by the responsibilities of the public security organs at the district level, with a fine of more than 100,000 dollars:
(i) The construction, alteration and expansion of computer air fleets is incompatible with national standards and relevant provisions;
(ii) The new construction, alteration and expansion of the computer air fleet design programme has not been declared to the public security authorities;
(iii) Construction, alteration and expansion of computer air conditioning units are not carried out by the security-reviewed computer air fleet design programme;
(iv) The acquisition or incompatibility of computer-based premises that are not experienced or are not in accordance with the relevant provisions of the State, technical norms requirements, i.e. inputs;
(v) Construction that endangers the safety of computer information systems.
In violation of this provision, there are one of the following acts, warnings by provincial public security authorities and a fine of up to 150,000 dollars in the year 2000:
(i) Inactive units engaged in international networking activities and non-operational activities without security clearance and clearance by provincial public security authorities;
(ii) Use units and individuals for international networking, which are not provided for by public security authorities;
(iii) No security confidentiality management and technical protection measures have been taken by the International Networking Unit;
(iv) There are no reports of security clearances, clearances by provincial public security authorities, the opening of open-ended airfields and the provision of operational units for computer network value added operational services.
In violation of this provision, there are one of the following acts, which are fined by more than 150,000 dollars of the Public Security Service at the district level:
(i) The intentional import of computer viruses and other harmful data to the safety of computer information systems;
(ii) Dissemination, manufacture, sale, transport, carrying, mail containing computers and other harmful data media that endanger social public safety.
Article 31 does not impose administrative penalties on public security authorities in accordance with this provision and may apply for review or administrative proceedings in accordance with the law.
Article 32 implements the mandate of public security personnel under this article, receive bribery or other violations, omissions, constitutes criminal responsibility under the law, and does not constitute a crime and provide administrative disposal.
Article 33
1, Harmful data refer to the existence and occurrence of computer information systems and their storage media, expressed in a variety of forms, such as computer procedures, images, language, voices, etc., containing information on attacks on the democratic exclusive political, socialist system, attacking party and national leaders, undermining national security content, such as national unity; information containing information on the content of social security order that promotes the content of envelopes, pornography, homicide, instigation, and the operation and functioning of computer information systems, the application of software, reliability, integrity and confidentiality, and the use of computer-related activities (virus).
The computer virus refers to a series of directives or procedural codes designed or inserted in computer procedures that affect computer use and which are self-renewable.
The computer information system security-specific products refer to specialized hardware and software products for the protection of computer information systems (including networks).
Article 34, paragraph 1, of the present article is implemented effective 1 September 1997. The provisional provision for the safe management of computer information systems in the provinces of Bangon, adopted on 3 September 1990, was also repealed.