Advanced Search

Computer Information System Security Management Approach In Shandong Province (Amended 2004)

Original Language Title: 山东省计算机信息系统安全管理办法(2004年修正本)

Subscribe to a Global-Regulation Premium Membership Today!

Key Benefits:

Subscribe Now for only USD$40 per month.

(Act No. 88 of the People's Government Order No. 88 of 20 April 1998 on the revision of 10 provincial government regulations, such as the adoption of the Decision No. 175 of 31 October 2004 by the People's Government Order No. 175 of 31 October 2004)

Chapter I General
Article I, in order to strengthen the security management of computer information systems, sets this approach in line with the relevant provisions of the National People's Republic of China's Computer Information System Safety Protection Regulations.
Article 2
Article 3
The relevant sectors, such as national security authorities and confidentiality, are well placed in the management of computer information systems in accordance with the State's mandate.
No units and individuals may be used to use computer information systems for activities that endanger national interests, collective interests and the legitimate interests of citizens without endangering the safety of computer information systems.
Chapter II Security management
Article 5
Article 6. The statutory representatives or heads of computer information systems use units are fully responsible for the security management of the computer information system in this unit, with the implementation of the CNDP or the specialized and/or functional defence organization.
Article 7
(i) The security management responsibility system, specifying the security management responsibilities of each and every staff member;
(ii) The security protection system, the security of information, the security of computer information systems equipment, facilities (net-based) and the operation of environmental safety, and the proper functioning of computer functions;
(iii) Safety operation systems that provide for the operational and security operation of computer information systems;
(iv) The security inspection system, which regularly checks the security situation of computer information systems and found problems to be addressed in a timely manner;
(v) Other security management systems.
Article 8. The use of computer information systems for accessing, processing and transmission of information that is secret in the country must be accompanied by appropriate confidentiality measures to ensure the security of State secrets.
Article 9.
Article 10 computer information systems used by units and individuals are subject to international networking and must be made available through access to the network and subject to registration procedures. Any units and individuals shall not be established or used directly to carry out international networking.
Article 11. The computer information system conducts international networking and should receive safety monitoring and inspection by the public security authorities as required.
Article 12. The computer information system conducts international networking and should comply with legal, regulatory and related provisions, establish a sound security management system and enhance information security management.
The use of international networking for criminal activities that endanger national security, the disclosure of State secrets and the obstruction of social security is prohibited; no organization or individual shall interfere with, destroy and limit the normal application of the network without disrupting the international online management order of the computer information system.
Article 13
Article XIV conducts technical training in the prevention and control of computer-based data, which is monitored by public security authorities at the district level.
Article 15.
Article 16 reported cases in the computer information system, and the relevant user units should report to the public security authorities at the local district level over 24 hours.
Chapter III Safety oversight
Article 17
(i) Organizing safety inspections to promote the security of the victims;
(ii) The investigation of offences against the safety of computer information systems;
(iii) Defining the level of security protection and identifying computer information systems to be harmful;
(iv) Security oversight of the International Network of Computer Information Systems;
(v) Management of prevention studies on the development, sale and computer-based harmful data for products dedicated to the safety of computer information systems;
(vi) Other responsibilities under laws, regulations and regulations.
When security inspections by public security authorities of computer information systems are conducted, the relevant units should be actively coordinated and provided.
Article 19 Public security authorities have found a hidden impact on the safety of computer information systems, and a letter of credit for the safety of computer information systems should be issued to the relevant units in a timely manner.
Article 20 of the computer information system cases, in addition to the provision of checks, the public security authorities should conduct prompt security inspections and to ensure that the security implications of the refurbishment occur.
Article 21, Public security authorities may take oversight measures, such as verification inspections and sampling tests, for the sale of units dedicated to the safety of computer information systems.
Chapter IV Legal responsibility
In violation of this approach, there is one of the following acts, a warning or antenuation:
(i) In violation of the provisions of the computer information system's safety hierarchy protection system and the approach relating to security management, endanger the safety of computer information systems;
(ii) A violation of the computer information system's international networking system;
(iii) Not to report on cases in computer information systems in accordance with prescribed time;
(iv) After a notice from the public security authorities to improve the security situation, the time limit was not improved;
(v) Other acts that endanger the safety of computer information systems.
Article 23, in violation of this approach, provides for the intentional importation of computer-based harmful data or the unauthorized sale of specialized computer information systems security-related products, with a warning or a fine of up to 1000 dollars for personal services, with severe fines of up to 5,000 dollars for personal service and a fine of up to 5,000 million dollars for units; proceeds of the offence may be fined between 1 and 3 times the proceeds of the offence except forfeiture.
Article 24, in violation of article 10 of this approach, is responsible for halting international networking, warnings that a fine of up to 1.5 million dollars may be imposed, and forfeiture of proceeds of conflict with the law.
Article 25, in violation of this approach, provides that the use of computer information systems for access, processing, transmission of information has resulted in a secret breakdown of the State and is addressed in accordance with the relevant provisions of the conservative National Secret Act of the People's Republic of China.
Article 26, in violation of this approach, constitutes a breach of the law and punishes the penalties in accordance with the regulations governing the administration of justice; constitutes an offence punishable by law.
Article 27, in accordance with this approach, imposes administrative penalties for violations of the safety of computer information systems and is determined by the public security authorities at the district level. However, the closure of airfields and the closure of the network are determined by the public security authorities in the area.
Article 28 imposes a fine and forfeiture penalty on the public security authorities, which shall be collected by a uniform system of fiscal departments in the province, and the penalties are not paid at the same level.
Article 29 does not correspond to the specific administrative acts of the public security authority and may apply to administrative review or administrative proceedings in accordance with the law.
Article 33 Public security authorities and their staff performing the responsibility for the safety and management of computer information systems should be strictly in accordance with the law and be subject to administrative disposition of offenders in conflict with the law, which constitutes a criminal offence.
Chapter V
Article 31 of this approach is implemented effective 1 June 1998.