Advanced Search

Administrative Provisions On Computer Security In Shanxi Province

Original Language Title: 山西省计算机安全管理规定

Subscribe to a Global-Regulation Premium Membership Today!

Key Benefits:

Subscribe Now for only USD$40 per month.

(Adopted at the 118th ordinary meeting of the People's Government of San Sussi Province on 8 January 2008, No. 218 of the People's Government Order No. 218 of 29 February 2008)

Article 1 promotes computer applications and development and guarantees the smooth conduct of socialist modernization, in line with the National People's Republic of China Computer Information System Safety Protection Regulations, which incorporates the reality of the province.
Article 2 applies to units or individuals that study, teaching, operation, use of computers and work in computer systems within the territorial administration.
Article III refers to a computer code of instruction or procedure that has been developed or inserted in computer procedures to destroy computer functions or destroy data, affect computer use and enables self-renewable reproduction.
Article IV Local, municipal and district public security authorities are responsible for the management of computer security within the current administrative area within their responsibilities. The computer safety inspection body at all levels of public security agencies is responsible for the specific implementation of this provision. The primary responsibility is:
(i) Oversight, inspection and guidance on computer security;
(ii) Profile and provide technical services;
(iii) A review and clearance of computer security management;
(iv) Security management of computer information networks and international networking computer networks in the province;
(v) Examination cases where computers are used to commit offences and criminal activities.
Article 5
(i) Develop specific safety management programmes and regulations;
(ii) The procedures for the processing of a request to the public security authorities;
(iii) Assistance to public security authorities in carrying out computer safety management and investigation accidents.
Article 6.
(i) Theft, sale, disclosing, privately modifying critical information on computers;
(ii) Damage and disrupt the normal work of the computer system;
(iii) Develop, collect and disseminate computer viruses;
(iv) Production, trafficking, dissemination of pornographic and anti-moval computer software;
(v) Use computer information networks (including international networking) to endanger national security, disclose State secrets or access, reproduction, production of information that impede social security and its harmful information;
(vi) Other criminal activities using computer technology.
Article 7.
Article 8. The introduction and acquisition of larger computer information systems by computer users should be accompanied by plans, scientific and technical authorities' consent and seek the views of public security authorities.
Newly acquired computers and initial software, data, delivery, should be tested by the computer security manager of the unit, recognizing that non-virus and harmful data are available for use.
No unit or individual may engage in the following activities without the approval of the public security authority:
(i) The transfer of computerized machines and procedures;
(ii) The publication, sale, rental of computer-based air conditioning, books and media.
Article 10 Computer information systems that operate should be regularly tested.
Article 11. When public security agencies find a hidden impact on computer security, a letter of credit for computer security should be issued, the use of units should be informed in a timely manner, and security protection measures.
Article 12. Computer users have found computer infection and should immediately adopt segregation measures and be eliminated in a timely manner.
Article 13. Cases in computer information systems, new types of virus and major computer safety accidents are required to report to the public security authorities at the local district level within 24 hours.
Article 14.
(i) The intentional concealment of cases in computer information systems, new types of virus or major computer safety accidents;
(ii) Units and individuals on the International Network, which are overdue by the public security authorities.
Article 15 is one of the following acts, which is fined by public security authorities for individuals up to €200 million and imposes a fine of up to 1000 units.
(i) The use of new acquisition computers and initial-use software, data and loads without virtual testing and the threat to States or others;
(ii) The discovery of computerized infections and the absence of security measures to cause harm to others;
(iii) After receipt of a letter of credit for computer security, the delay has not been changed;
(iv) Privately modify computer-critical information, disrupt the normal work of the computer system or develop, collect and disseminate the computer virus.
Article 16 provides for the manufacture, sale of soft, hardware and loads with computers and harmful data, with a fine of up to 150,000 dollars for public security authorities.
Article 17, which is not implemented in the context of computer safety prevention measures, has resulted in the consequences of harm, is fined by the public security authorities for the use of units of up to 1000, and recommends that the unit be given administrative treatment to the head and the person directly responsible.
Article 18
(i) Production, access, replication of information that impedes social security and its harmful information;
(ii) To endanger computer information systems and cyber safety;
(iii) endanger national security, leakage of State secrets.
Article 19 steals, sells, discloses important computer information that undermines the normal work of the computer system by imposing a fine of more than 150,000 dollars in the public security sector, which constitutes an offence punishable by law.
Article 20 uses computer technology production, trafficking, dissemination of pornographic, anti-moval content software, the media, in addition to the collection of harmful media, forfeiture the production of communications tools, which is fined by public security authorities to individuals by €5,000 and imposes a fine of up to 150,000 units, constituting criminal liability under the law.
Article 21 violates this provision as a violation of the management of the law and punishes it in accordance with the relevant provisions of the Law on the Safety and Security of the People's Republic of China.
Article 2 does not correspond to the specific administrative acts made by the public security authorities in accordance with this provision and may apply to administrative review or administrative proceedings in accordance with the law.
Article 23 of this provision is interpreted by the Ministry of Public Security of the Province of San Sussi.
Article 24 On 15 February 1995, the Ministry of Public Security issued a computer security management approach in the provinces, which was approved by the Government of the Provincial People.