cancel
Clear records
history record
Clear records
history record
With the end of the Spring Festival holiday, everyone has returned to work and officially started work in 2020. The following is a review and summary of the policies and regulations related to cybersecurity issued by China in 2019.
1. On January 10, 2019, the network information office issued
In order to regulate blockchain information service activities, safeguard national security and social public interests, protect the legitimate rights and interests of citizens, legal persons and other organizations, and promote the healthy development of blockchain technology and related services, according to
2. On April 10, 2019, the three departments jointly issued
In order to further implement
3. On May 13, 2019, the standard of network security level protection system 2.0 was officially released and implemented on December 1, 2019.
The General Administration of market supervision and administration of the people's Republic of China and the Standardization Administration of the people's Republic of China held a press conference, and other relevant national standards such as
4. On May 23, 2019, the network information office issued
In order to improve the safety and controllable level of key information infrastructure and maintain national security, in accordance with
5. On May 28, 2019, the network information office issued
In order to safeguard national security and social public interests, protect the legitimate rights and interests of citizens, legal persons and other organizations in cyberspace, and ensure the security of personal information and important data, according to
6. On June 12, 2019, the network information office issued
In order to ensure the security of personal information, safeguard the sovereignty of cyberspace, national security, social and public interests, and protect the legitimate rights and interests of citizens and legal persons, according to
7. On June 18, 2019, the Ministry of industry and information technology issued
In order to implement
8. On July 22, 2019, the four departments jointly issued
In order to improve the security and controllable level of cloud computing services purchased and used by Party and government organs and key information infrastructure operators, the state Internet Information Office, the national development and Reform Commission, the Ministry of industry and information technology and the Ministry of finance have formulated
9. On August 23, 2019, the network information office issued
In order to protect the safety of children's personal information and promote the healthy growth of children, according to laws and regulations such as
10. On August 28, 2019, ten departments jointly issued
In order to speed up the construction of the industrial Internet security system, improve the security capacity of the industrial Internet, promote the high-quality development of the industrial Internet, promote the construction of the modern economic system, escort the implementation of the strategy of manufacturing power and network power, and issue
11. On October 26, 2019,
As a comprehensive and basic law in the field of cryptography, the act will effectively regulate the application and management of cryptography, promote the development of cryptography, ensure the security of network and information, and improve the scientific, standardized and legal level of cryptography management. The promulgation of the law will have positive significance for accelerating the scientific development of China's code industry
1. We should further strengthen the party's absolute leadership over password work and ensure that the party's proposition becomes the will of the state through the legislative process;
2. To realize the management according to law, lay a foundation for the legal construction of the password work in an all-round way;
3. We will effectively safeguard the security of national networks and information, and effectively prevent and crack down on criminal activities involving password violations;
4. We should standardize the order of the password market, attach equal importance to development and security, and provide legal guarantee for the scientific development of China's password industry.
12. On November 20, 2019, the network information office issued
In order to standardize the behavior of releasing the information of network security threat, effectively respond to the threats and risks of network security, and ensure the safety of network operation, according to
13. On November 29, 2019, the three departments jointly issued
In order to promote the healthy and orderly development of online audio and video information services, protect the legitimate rights and interests of citizens, legal persons and other organizations, and safeguard national security and public interests, the state Internet Information Office, the Ministry of culture and tourism, and the State Administration of radio and television have formulated
14. On December 17, 2019, the Ministry of industry and information technology issued
In order to implement
15. On December 20, 2019, the network information office issued
In order to create a good network ecology, protect the legitimate rights and interests of citizens, legal persons and other organizations, and safeguard national security and public interests, in accordance with the "National Security Law of the People's Republic of China", "Cyber Security Law of the People's Republic of China", "Internet Information Service Management Measures" and other laws and administrative regulations, the State Internet Information Office office meeting deliberated and passed the "Regulations on the Ecological Governance of Network Information Content".
In order to create a good network ecology, protect the legitimate rights and interests of citizens, legal persons and other organizations, and safeguard national security and public interests, according to
16. On December 30, 2019, the four departments jointly printed and distributed < Identification method for illegal collection and use of personal information by app>
According to < Announcement on special treatment of illegal collection and use of personal information by app>, in order to provide reference for identifying illegal collection and use of personal information by app, and to implement laws and regulations such as the
We can see that a large part of these policies and regulations are carried out through consultation. Some of these documents already have formal release terms and will be released and implemented successively from March 2020. The following 28 network and information security codes and standards.
1、《Regulations on Ecological Governance of network information content》
2、《GB/T 25058-2019 Implementation guide for classified protection of cybersecurity》
3、《GB/T 20272-2019Security technical requirements for operating system》
4、《GB/T 37962-2019Common criteria for industrial control system products security》
5、《GB/T 21050-2019Security requirements for network switch》
6、《GB/T 20009-2019Security evaluation criteria for database management system》
7、《GB/T 18018-2019Technical requirement for router security》
8、《GB/T 20979-2019Technical requirements for iris recognition system》
9、《GB/T 37971-2019Framework of smart city security system》
10、《GB/T 37973-2019Big data security management guide》
11、《GB/T 20273-2019Security technical requirements for database management system》
12、《GB/T 37980-2019Guide for security inspection of industrial control systems》
13、《GB/T 37931-2019 Security technology requirements and testing and evaluation approaches for Web application security detection system》
14、《GB/T 37934-2019Security technical requirements of industrial control system security isolation and information ferry system》
15、《GB/T 37932-2019 Security requirements for data transaction service》
16、《GB/T 37933-2019 Information security technology—Technical requirements of industrial control system dedicated firewall》
17、《GB/T 37988-2019 Information security technology—Data security capability maturity model》
18、《GB/T 37972-2019Operation supervision framework of cloud computing service》
19、《GB/T 37935-2019Trusted computing specification—Trusted software base》
20、《GB/T 37941-2019Security technical requirements of industrial control system network audit products》
21、《GB/T 37939-2019Security techniques requirement for network storage》
22、《GB/T 37964-2019Guide for de-identifying personal information》
23、《GB/T 37950-2019Security technical requirements for desktop cloud》
24、《GB/T 37954-2019Technique requirements and testing and evaluation approaches for industrial control system vulnerability detection products》
25、《GB/T 37952-2019Technical requirements of mobile terminal security management platform》
26、《GB/T 37953-2019 Security requirements and evaluation approaches》
27、《GB/T 37955-2019Security technique requirements for numerical control network》
28、《GB/T 37956-2019Technology requirement for website security cloud protection platform》
Of course, the personal information protection law, data security law and other laws and regulations are also in preparation. I believe that they will be issued in the near future, making the regulatory system of network and information security more perfect.
Related News