PSB

Guiding Opinions on Implementing the Cybersecurity Multi-Level Protection System and Critical Information Infrastructure Security Protection System

Posted on Updated on

Gong Wang An No. (2020)1960

All Centre and State bodies’ ministries and commissions, all bodies, office bodies and undertaking work units directly subordinate to the State Council, all Centre enterprises:

In order to implement the spirit of relevant Party Centre documents and the “Cybersecurity Law”, guide focus sectors and departments in comprehensively implementing the cybersecurity multi-level protection system and critical information infrastructure security protection system, complete and perfect the national comprehensive cybersecurity defence system, effectively prevent cybersecurity threats, forcefully deal with major cybersecurity incidents, coordinate public security bodies’ strengthening of cybersecurity supervision and management, strictly attack unlawful and criminal activities harming cybersecurity, realistically ensure the security of critical information infrastructure, important networks and data, the Ministry of Public Security has researched and formulated the “Guiding Opinions on Implementing the Cybersecurity Multi-Level Protection System and Critical Information Infrastructure Security Protection System”. These are hereby issued to you, please earnestly consult and implement them in combination with the work reality in your sectors and your departments. 

Ministry of Public Security

22 July 2020

Guiding Opinions on Implementing the Cybersecurity Multi-Level Protection System and Critical Information Infrastructure Security Protection System

The cybersecurity multi-level protection system and critical information infrastructure security protection system are basic systems laid down in relevant Party Centre documents and the “Cybersecurity Law”. In recent years, all work units and all departments have comprehensively strengthened cybersecurity work according to the requirements of Central cybersecurity policies and the provisions of the “Cybersecurity Law” and other such laws and regulations, powerfully ensuring the security of national critical information infrastructure, important networks and data. Even though information technology develops at flying speed, cybersecurity work still faces several new situations, new tasks and new challenges. In order to implement the cybersecurity multi-level protection system and critical information infrastructure security protection system, complete and perfect the national cybersecurity defence system, effectively prevent cybersecurity threats, forcefully deal with cybersecurity incidents, strictly attack unlawful and criminal activities harming cybersecurity, realistically safeguard national cybersecurity, the following Guiding Opinions are hereby formulated.

I, Guiding ideology, basic principles and work objectives.

(1) Guiding ideology

With Xi Jinping Thought on Socialism with Chinese Characteristics in a New Era as guidance, according to the policy arrangements of the Party Centre and the State Council, with the overall national security view as  the lead, earnestly implement the cyber power strategy, comprehensively strengthen overall cybersecurity work planning, with implementing the cybersecurity multi-level protection system and critical information infrastructure security protection system as basis, with protecting the security of critical information infrastructure, important networks and data as focus points, comprehensively strengthen work in areas such as cybersecurity prevention and management, monitoring and early warning, emergency response, investigation and attack, intelligence and information, etc., timely monitor and deal with cybersecurity risks, threats and sudden cybersecurity incidents, protect critical information infrastructure, important networks and data from attacks, intrusions, interference and destruction, punish online unlawful and criminal activities according to the law, substantially raise cybersecurity protection capabilities, vigorously build a comprehensive cybersecurity defence system, substantially safeguard national cyberspace sovereignty, national security and the social and public interest, protect the lawful rights and interests of the popular masses, ensure and stimulate the healthy development of economic and social informatization.

(2) Basic principles

– Persist in tiered protection, focus on prominent issues. On the basis of the degree of importance of networks (including network infrastructure, information systems, data resources, etc.) for national security, economic construction and social life, as well as factors such as the degree of harm after they should be destroyed, scientifically determine the security protection tier of networks, implement tiered protection and tiered supervision and management, focus on ensuring the security of critical information infrastructure and third-tier (including third-tier, hereafter similar) and higher networks.

-Persisting in active defence and comprehensive protection. According to laws, regulations and relevant State standards and norms, fully use artificial intelligence, big data analysis and other such technologies to vigorously implement cybersecurity management and technical protection measures, strengthen cybersecurity mentoring, state sensing, reporting and early warning, emergency response and other such major work matters, comprehensively adopt cybersecurity protection, defence and safeguard measures, prevent and curb the occurrence of major cybersecurity risks and incidents, protect the security of new technology applications and new business models such as cloud computing , the Internet of Things, the New Internet, big data, smart manufacturing, etc.

-Persisting in protection according to the law and creating joint forces. On the basis of the provisions of the “Cybersecurity Law” and other such laws and regulations, public security bodies fulfil cybersecurity protection, supervision and management duties and responsibilities according to the law, sectoral competent departments for cybersecurity (including supervision and management departments, hereafter similar) fulfil cybersecurity supervision and management responsibilities within their sectors according to the law, strengthen and implement the dominant protection responsibility of network operators, give full rein and muster forces from all parts of society, coordinate and cooperate, decide and work as  team, and create cybersecurity protection work joint forces.

(3) Work objectives

– Deeply implementing the cybersecurity multi-level protection system. Cybersecurity multi-level protection tier determination and filing, tier monitoring and assessment, security construction, inspections and other such basic work matters are to be profoundly advanced. The “three izations and six defences” measures of “actualization, systematization and regularization” of cybersecurity protection and “dynamic defence, active defence, defence in depth, accurate protection, overall protection, joint defence and joint control” to be effectively implemented, a beneficial ecology for cybersecurity protection to be basically established, critical information infrastructure security protection capabilities to clearly strengthen.

– The critical information infrastructure security protection system to be established and implemented. Critical information infrastructure base numbers to be made clear, security protection bodies to be completed, responsibilities to be clarified, protection to be powerful. On the basis of implementing the cybersecurity multi-level protection system, critical information infrastructure-related critical position personnel management, supply chain security, data security, emergency response and other such focus protection measures to be effectively implemented, clearly strengthening critical information infrastructure security protection capabilities.

– Cybersecurity monitoring, early warning and emergency response capabilities to clearly increase. A cross-sector, cross-departmental and cross-regional three-dimensional cybersecurity monitoring system and cybersecurity protection platform to be basically completed, clearly raising cybersecurity state sensing, reporting, early warning and incident discovery and handling capabilities. Cybersecurity advance plans to be scientifically readied, emergency response and handling mechanisms to be perfected, emergency drills to be conducted in a regularized manner, major cybersecurity incidents to be effectively prevented, restrained and dealt with.

– A comprehensive cybersecurity prevention system to be basically created. Cybersecurity protection work mechanisms to be completed and perfected, a cybersecurity work structure with Party Committees in overall leadership, all departments taking responsibility according to the division of work, and social forces from many sides participating to be further perfected. The cybersecurity responsibility system to be effectively implemented, cybersecurity management, prevention, supervision, guidance, investigation and attack capabilities to clearly rise, and a comprehensive cybersecurity protection system integrating “attack, defence, management and control” to be basically created.

II, Deeply implementing the national cybersecurity multi-level protection system

According to the requirements oof the national cybersecurity multi-level protection system, all work units and all departments will, under the guidance and supervision of public security bodies, earnestly organize and deeply launch cybersecurity multi-level protection work, establish a beneficial cybersecurity protection ecology, substantially implement their dominant responsibilities, and completely enhance cybersecurity protection capabilities.

(1) Deepening network tier determination and filing work. Network operators shall comprehensively comb through all kinds of networks in their work unit, and especially the basic situation of cloud computing, Internet of Things, the New Internet, big data, smart manufacturing and other such new technological applications, and on the basis of the function of the network, its service scope, service counterparts, the data it handles and other such matters, scientifically determine the security protection tier of networks, second-level and higher networks will be filed according to the law with public security bodies, and filed with the sectoral competent department. Newly built networks shall be assigned a security protection tier in the planning and design phase. Public security bodies conduct examination and verification of the filing materials and network security protection tier submitted by network operators, where the tier determination result is reasonable and filing materials comply with requirements, they will timely issue cybersecurity multi-level protection filing certification. Sectoral competent departments may, on the basis of the national standard “Cybersecurity Multi-Level Protection Tier Determination Guidelines”, formulate guiding opinions for cybersecurity multi-level protection tier determination in integration with the characteristics of their sector.

(2) Regularly conducting cybersecurity tier assessments. Network operators shall, on the basis of relevant standards and norms, conduct monitoring and assessment of the security of networks with determined and filed tiers, and search for possibly existing cybersecurity problems and vulnerabilities. Third-tier and higher network operators shall entrust tier assessment bodies compliant with relevant State regulations to annually conduct a cybersecurity tier assessment, and timely submit the tier assessment report to the public security body and administrative competent department who received the filing. Newly-built third-tier and higher networks shall be put into operation after undergoing tier assessment. Network operators must, in the process of conducting assessment services, conclude a security and secrecy protection agreement with the assessment body, and conduct supervision and management of the assessment process. Public security bodies must strengthen supervision and management over tier assessment bodies in their localities, establish structures for the background inspection of assessment personnel and the examination and verification of personnel, and ensure that the tier assessment process is objective, fair and secure.

(3) Scientifically conducting security construction and improvements. Network operators shall, in the process of network construction and operation, simultaneously plan, simultaneously build and simultaneously use relevant cybersecurity protection measures. They shall, on the basis of the “Cybersecurity Multi-Level Protection Basic Requirements”, the “Cybersecurity Multi-Level Protection Security Design Technology Requirements” and other such national standards, and on the basis of existing security protection measures, completely comb through and analyse security protection requirements, and in integration with the problems and vulnerabilities discovered during the process of tier assessment, according to the requirements of “once centre” (security management centre), “three protects” (secure telecommunications networks, secure regional boundaries, secure computing environments”, earnestly conduct network security construction, improvement and consolidation, and comprehensively implement security protection technology measures. Network operators may move networks into the cloud, or outsource security services, fully using the capabilities and levels of cloud service companies and cybersecurity service companies to enhance cybersecurity protection. They shall comprehensively strengthen cybersecurity management, establish and perfect personnel management, education and training, system security construction and operational maintenance and other such management structures, strengthen management of computer rooms, facilities and medium security, strengthen the protection of important data and personal information, formulate operational norms and workflows, strengthen daily supervision and verification, and ensure the effective implementation of all management measures.

(4) Strengthening the implementation of security responsibility. Sectoral competent departments and network operators shall, on the basis of the requirements of the “Cybersecurity Law” and other such laws and regulations as well as relevant policies, and according to the principle of “who manages is responsible, who operates is responsible”, draw clear cybersecurity protection borders, clarify security protection work responsibilities, establish cybersecurity multi-level protection work responsibility systems, implement responsibility investigation structures, and ensure that “everyone has the responsibility to protect their land, and everyone does their utmost to protect their land”. Network operators must regularly organize dedicates forces to conduct cybersecurity inspections monitoring and assessment, sectoral competent departments must organize risk assessments, timely discover cybersecurity vulnerabilities and weak segments, and correct them, and incessantly raise cybersecurity protection capabilities and levels.

(5) Strengthening supply chain security management. Network operators shall strengthen the security management of critical network personnel, third-tier and higher network operators shall strengthen management over the bodies and personnel providing them with design, construction, operational maintenance and technical services, assess security risks that may exist in the process of services, and adopt corresponding management and control measures. Network operators shall strengthen network operations and maintenance management, where it is truly necessary to conduct Internet remote operational maintenance because of business needs, they shall provide an explanation of their assessment, and adopt corresponding management and control measures. Network operators shall purchase and use network products and services compliant with the requirements of State laws and regulations as well as relevant standards and norms, third-tier and higher network operators shall vigorously use secure and trustworthy network products and services.

(6) Implementing encryption security protection requirements. Network operators shall implement the provisions of the “Encryption Law” and other such laws and regulations as well as encryption us-related standards and norms. Third-tier and higher networks shall correctly and effectively adopt encryption technology for protection, and use encryption products and services compliant with related requirements. Third-tier and higher network operators shall, in the network planning, construction and operations stages, simultaneously conduct encryption use security assessment wat the same time as conducting cybersecurity tier assessment according to encryption use security assessment management rules and related standards.

III, Building and implementing the critical information infrastructure security protection system

Public security bodies guide and supervise critical information infrastructure security protection work. All work units and all departments shall strengthen the construction of legal systems, policy systems standards systems, protection systems, defence systems and safeguard systems for critical information infrastructure security, establish and implement critical information infrastructure security protection systems, and on the basis of implementing the cybersecurity multi-level protection system, give prominence to its protection focus, strengthen protection measures, and realistically ensure the security of critical information infrastructure.

(1) Organising the identification of critical information infrastructure. On the basis of relevant provisions of the Party Centre and the Ministry of Public Security, the competent and supervision and management departments (hereafter jointly named protection work departments) of important sectors and domains such as public telecommunications and information services, energy, transportation, waterworks, finance, public services, e-government, national defence science and technology and industry, etc., shall formulate critical information infrastructure identification norms for their sectors or domains and report them to the Ministry of Public Security for filing. Protection work departments are, on the basis of the identification norms, responsible for organizing the identification of critical information infrastructure in their sectors and domains, and to timely report the identification results to the related critical information infrastructure operators and to the Ministry of Public Security. They shall include focus protection counterparts such as basic networks meeting determination conditions, large-scale special networks, core business systems, cloud platforms, big data platforms, the Internet of Things, industrial control systems, smart manufacturing systems, the New Internet, novel telecommunications, etc., in critical information infrastructure. Critical information infrastructure lists will be subject to dynamic adjustment mechanisms, where relatively major changes occur in relevant network infrastructures and information systems, operators shall timely report the relevant circumstances to the protection work department, the protection work department shall organize re-identification, notify the operator about the identification result, and report the matter to the Ministry of Public Security.

(2) Clarifying the division of labour in critical information infrastructure security protection work functions. The Ministry of Public Security is responsible for the top-level design, planning and arrangement of critical information infrastructure security protection work, and completes and perfects the critical information infrastructure security protection structures and systems together with relevant departments. Protection work departments are responsible for organizational leadership over critical information infrastructure security protection work in their sectors and their areas, as well as formulating and implementing general plans and security protection tactics for critical information infrastructure security in their sectors and their areas, and implementing critical information infrastructure security guidance and supervision responsibilities within their own sectors and areas. Critical information infrastructure operators are responsible for the establishment of a specialized security management body, organizing and conducting critical information infrastructure security and protection work, whose main responsible person bears overall responsibility for the work unit’s critical information infrastructure security protection. 

(3) Implementing focus protection measures for critical information infrastructure. Critical information infrastructure operators shall, on the basis of the cybersecurity multi-level protection standards, conduct security construction and conduct tiered monitoring, and must timely correct problems, risks and vulnerabilities they find; on the basis of critical information infrastructure security protection standards, strengthen security protection measures and conduct security monitoring and assessment. We must comb through network assets, establish asset files, strengthen the management of personnel in core positions, integrate protection with monitoring and early warning, emergency response and handling, data protection and other such focus protection measures, reasonably differentiate fields and areas, reduce the Internet’s disclosure surface, strengthen cyberattack threat control, strengthen defence-in-depth, vigorously use technologies to conduct cybersecurity protection, build a cybersecurity protection system with encryption technology, trusted computing, artificial intelligence, big data analysis etc. at the core, incessantly enhance the inherent security of critical information infrastructure, and capabilities for active immunity and active defence. Operators meeting conditions shall establish their own security services body, undertaking critical information infrastructure security protection tasks, they may also raise cybersecurity specialized and intensified protection capabilities through migrating to the cloud or purchasing security services and other such measures.

(4) Strengthening the protection of important data and personal information. Operators shall establish and implement a protection structure for important data and personal information security, conduct disaster-proof backups of important networks and important databases in critical information infrastructure, adopt critical technological measures such as identity differentiation, access control, encrypted protection, security audits, security isolation, trusted verification, etc. to substantially protect the security of important data in its entire lifecycle. Operators shall store personal information and important data collected and produced during their domestic operations inside the territory, where they need to provide it abroad because of business requirements, they shall abide by relevant regulations and conduct a security assessment. 

(5) Strengthening the security management of personnel in core positions as well as products and services. We must conduct a background security inspection of responsible persons in specialized security management bodies and personnel in critical positions, and strengthen management. We must implement security management over critical information infrastructure design, construction, operations, maintenance and other such services, purchase secure and trustworthy network products and services, and ensure supply chain security. Where the purchase of products and services may influence national security, a security review shall be undergone according to relevant state regulations. Public security bodies strengthen security management over critical information infrastructure security service bodies, and provide support for operators conducting security protection work.

IV, Strengthening cooperation and coordination in cybersecurity protection work

Sectoral competent departments and network operators must closely cooperate with public security bodies, forcefully conduct security monitoring, reporting, early warning, emergency response, threat intelligence and other such work, implement regularized measures, enhance their capabilities to respond to and deal with sudden cybersecurity incidents and major risk prevention and control. 

(1) Strengthening the construction of a three-dimensional cybersecurity monitoring system. All work units and all departments must comprehensively strengthen cybersecurity monitoring, conduct real-time monitoring of critical information infrastructure, important networks, etc., and when they discover cyberattacks and security threats, immediately report them to public security bodies and relevant departments, and adopt effective measures to deal with them. They must strengthen the research and applications of new network technologies, research and draw up cyberspace topography information maps (network maps), and ensure map-based battle. Sectoral competent departments and network operators must construct cybersecurity protection operations platforms for their sector and their work unit, build smart platform brains, , and rely on the platform and big data to conduct real-time monitoring, reporting, early warning, emergency response, security protection, command and control and other such work, and link up with public security bodies’ relevant security protection platform, creating a comprehensive defence and control structure integrating hierarchical and local links, connecting vertical and horizontal links, in a coordinated and jointly acting manner. Focus sectors, network operators and public security bodies must establish cybersecurity supervision and control command centres, implement a 24-7 duty staffing system, and create regularized and actualized cybersecurity work mechanisms.

(2) Strengthening cybersecurity information sharing reporting and early warning. Sectoral competent departments and network operators must, with the support of the national cyber and information security information notification mechanism, strengthen the construction of cyber and information security notification and early warning capabilities, timely collect, pool and analyse all sides’ cybersecurity information, strengthen threat intelligence work, organize the conduct of cybersecurity threat analysis and state research and argumentation, and timely notify early warnings and responses. Third-level and higher network operators and critical information infrastructure operators must conduct cybersecurity monitoring, early warning and information notification work, timely receive and deal with cybersecurity early warning notifications and information coming from the national level, sectoral level and local level, and notify cybersecurity monitoring and early warning information as well as cybersecurity incidents to sectoral competent departments, filing public security bodies. Public security bodies must strengthen the construction of cyber and information security information circulation and early warning mechanisms and forces, and incessantly raise cybersecurity notification and early warning capabilities.

(3) Strengthen the construction of cybersecurity emergency response mechanisms. Sectoral competent departments and network operators must, according to relevant State requirements, formulate cybersecurity emergency response plans, strengthen cybersecurity emergency response force construction and emergency response resource stockage, closely cooperate with public security bodies to establish a cybersecurity incident reporting structure and emergency response mechanisms. Critical information infrastructure operators and third-tier and higher network operators shall regularly conduct emergency response drills, effectively respond to cybersecurity incidents, and timely correct and consolidate prominent problems, leaks and vulnerabilities discovered during emergency response drills, and perfect protection measures. Sectoral competent departments and network operators shall coordinate with public security bodies’ annual organization and conduct of cybersecurity supervision and inspections, tournaments, exercises and other such work, and incessantly enhance security protection capabilities and resistance capabilities.

(4) Strengthening cybersecurity incident handling and case investigation When major cybersecurity threats and incidents occur in critical information infrastructure or third-tier and higher networks, sectoral competent departments, network operators and public security bodies shall jointly launch a response. Telecommunications operators and network service providers shall provide technical support and assistance. Network operators shall cooperate with public security bodies in attacking unlawful and criminal online activities; when indications of unlawful or criminal acts, major cybersecurity threats and incidents are discovered, they shall timely report the matter to public security bodies and relevant departments, and provide the necessary assistance.

(5) Strengthening cybersecurity problem and threat correction supervision and management. Public security bodies establish and appoint a supervision and management structure, to be appointed to supervise and manage, or schedule talks with relevant responsible persons where network operators persistently procrastinate and do not correct weak cybersecurity work or major security problems and vulnerabilities, or where relatively large cybersecurity risks exist, major cybersecurity incidents, occur, etc., according to regulatory powers and procedures,  together with sectoral competent departments, and to strengthen supervision, inspection and administrative law enforcement, as well as conduct administrative punishment according to laws and regulations. Network operators shall, according to relevant requirements, adopt measures to timely conduct corrections, and eliminate major risks and vulnerabilities. Where major cybersecurity incidents occur, sectoral competent departments shall organize the entire sector to conduct correction and reorganization.

V, Strengthening all guarantees in cybersecurity work

(1) Strengthening organizational leadership. All work units and all departments must give high regard to multi-level cybersecurity protection and critical information infrastructure security protection work, enter it onto the important matters agenda, strengthen comprehensive leadership, planning and design, earnestly research and resolve major problems such as the establishment of cybersecurity bodies, personnel allocation, financial input, security protection measure construction, etc. Sectoral competent departments and network operators must clarify that the main responsible persons in those work units are the first responsible persons for cybersecurity, and determine a leading cadre management to be separately responsible for cybersecurity work, establish dedicated cybersecurity bodies, clarify tasks and divisions of labour, grasping matters level by level, and implementing matters level by level.

(2) Strengthening financial policy guarantees. All work units and all departments must, through existing funding channels, ensure funding input for critical information infrastructure, third-tier and higher networks, etc., to conduct tiered monitoring, risk assessment, encryption use security monitoring, drills and competitions, security construction and reorganization, security protection platform construction, encryption protection system construction, operational maintenance, supervision and inspection, education and training, etc. Critical information infrastructure operators shall ensure sufficient amounts of cybersecurity input, and when making cybersecurity and informatization-related policy decisions, shall have members from the cybersecurity management body participate. Relevant departments must support focus cybersecurity technology industries and projects, support cybersecurity technology research, development, innovation and application, and promote the healthy development of the cybersecurity industry. Public security bodies must, together with relevant departments, organize and implement “Belt-Road” cybersecurity strategies, and support cybersecurity enterprises “marching out”, and share China’s cybersecurity protection experience with relevant countries. 

(3) Strengthening testing and evaluation All work units and all departments must further complete and perfect cybersecurity testing and evaluation structures, clarify testing standards, and organize the conduct of testing. Public security bodies will enter cybersecurity work into the comprehensive social management and governance testing and evaluation system, annually organize testing and evaluation to be conducted for all localities’ cybersecurity work, annually chose advance work unit in cybersecurity multi-level protection and critical information infrastructure security protection work, and report the results to Party Committees and governments, and notify cybersecurity and informatization departments.

(4) Strengthening technical breakthroughs. All work units and all departments must fully muster social forces from cybersecurity enterprises, scientific research bodies, experts, etc., to vigorously participate in making core breakthroughs in cybersecurity technology, strengthen cybersecurity coordination and cooperation, interaction and mutual support, joint governance and sharing, and collective defence and collective governance.  Public security bodies must, together with relevant departments, strengthen cybersecurity multi-level protection and critical information infrastructure security protection standards formulation work, publish standards and application guidelines, strengthen the dissemination, application and implementation of standards build pilot demonstration bases, and enhance the healthy development of our country’s cybersecurity industries and enterprises.

(5) Strengthening talent training. All work units and all departments must strengthen cybersecurity multi-level protection and critical information infrastructure security protection professional exchanges, and discover and select high-grade, precise and advanced talents through organizing and conducting tournaments, competitions and other such forms, build talent databases, establish and complete talent discovery training, selection and use mechanisms, and provide talent guarantees to do cybersecurity work well.

《公安部关于印送〈贯彻落实网络安全等级保护制度和关键信息基础设施安全保护制度的指导意见〉的函》

公网安〔2020〕1960号

中央和国家机关各部委,国务院各直属机构、办事机构、事业单位,各中央企业:

为深入贯彻党中央有关文件精神和《网络安全法》,指导重点行业、部门全面落实网络安全等级保护制度和关键信息基础设施安全保护制度,健全完善国家网络安全综合防控体系,有效防范网络安全威胁,有力处置重大网络安全事件,配合公安机关加强网络安全监管,严厉打击危害网络安全的违法犯罪活动,切实保障关键信息基础设施、重要网络和数据安全,公安部研究制定了《贯彻落实网络安全等级保护制度和关键信息基础设施安全保护制度的指导意见》。现印送给你们,请结合本行业、本部门工作实际,认真参照执行。

公安部

2020年7月22日

贯彻落实网络安全等级保护制度和关键信息基础设施安全保护制度的指导意见

网络安全等级保护制度和关键信息基础设施安全保护制度是党中央有关文件和《中华人民共和国网络安全法》确定的基本制度。近年来,各单位、各部门按照中央网络安全政策要求和《网络安全法》等法律法规规定,全面加强网络安全工作,有力保障了国家关键信息基础设施、重要网络和数据安全。但随着信息技术飞速发展,网络安全工作仍面临一些新形势、新任务和新挑战。为深入贯彻落实网络安全等级保护制度和关键信息基础设施安全保护制度,健全完善国家网络安全综合防控体系,有效防范网络安全威胁,有力处置网络安全事件,严厉打击危害网络安全的违法犯罪活动,切实保障国家网络安全,特制定以下指导意见。

一、指导思想、基本原则和工作目标

(一)指导思想

以习近平新时代中国特色社会主义思想为指导,按照党中央、国务院决策部署,以总体国家安全观为统领,认真贯彻实施网络强国战略,全面加强网络安全工作统筹规划,以贯彻落实网络安全等级保护制度和关键信息基础设施安全保护制度为基础,以保护关键信息基础设施、重要网络和数据安全为重点,全面加强网络安全防范管理、监测预警、应急处置、侦查打击、情报信息等各项工作,及时监测、处置网络安全风险、威胁和网络安全突发事件,保护关键信息基础设施、重要网络和数据免受攻击、侵入、干扰和破坏,依法惩治网络违法犯罪活动,切实提高网络安全保护能力,积极构建国家网络安全综合防控体系,切实维护国家网络空间主权、国家安全和社会公共利益,保护人民群众的合法权益,保障和促进经济社会信息化健康发展。

(二)基本原则

坚持分等级保护、突出重点。根据网络(包含网络设施、信息系统、数据资源等)在国家安全、经济建设、社会生活中的重要程度,以及其遭到破坏后的危害程度等因素,科学确定网络的安全保护等级,实施分等级保护、分等级监管,重点保障关键信息基础设施和第三级(含第三级、下同)以上网络的安全。

坚持积极防御、综合防护。按照法律法规和有关国家标准规范,充分利用人工智能、大数据分析等技术,积极落实网络安全管理和技术防范措施,强化网络安全监测、态势感知、通报预警和应急处置等重点工作,综合采取网络安全保护、保卫、保障措施,防范和遏制重大网络安全风险、事件发生,保护云计算、物联网、新型互联网、大数据、智能制造等新技术应用和新业态安全。

坚持依法保护、形成合力。依据《网络安全法》等法律法规规定,公安机关依法履行网络安全保卫和监督管理职责,网络安全行业主管部门(含监管部门,下同)依法履行本行业网络安全主管、监管责任,强化和落实网络运营者主体防护责任,充分发挥和调动社会各方力量,协调配合、群策群力,形成网络安全保护工作合力。

(三)工作目标

网络安全等级保护制度深入贯彻实施。网络安全等级保护定级备案、等级测评、安全建设和检查等基础工作深入推进。网络安全保护“实战化、体系化、常态化”和“动态防御、主动防御、纵深防御、精准防护、整体防控、联防联控”的“三化六防”措施得到有效落实,网络安全保护良好生态基本建立,国家网络安全综合防护能力和水平显著提升。

关键信息基础设施安全保护制度建立实施。关键信息基础设施底数清晰,安全保护机构健全、职责明确、保障有力。在贯彻落实网络安全等级保护制度的基础上,关键信息基础设施涉及的关键岗位人员管理、供应链安全、数据安全、应急处置等重点安全保护措施得到有效落实,关键信息基础设施安全防护能力明显增强。

网络安全监测预警和应急处置能力显著提升。跨行业、跨部门、跨地区的立体化网络安全监测体系和网络安全保护平台基本建成,网络安全态势感知、通报预警和事件发现处置能力明显提高。网络安全预案科学齐备,应急处置机制完善,应急演练常态化开展,网络安全重大事件得到有效防范、遏制和处置。

网络安全综合防控体系基本形成。网络安全保护工作机制健全完善,党委统筹领导、各部门分工负责、社会力量多方参与的网络安全工作格局进一步完善。网络安全责任制得到有效落实,网络安全管理防范、监督指导和侦查打击等能力显著提升,“打防管控”一体化的网络安全综合防控体系基本形成。

二、深入贯彻实施国家网络安全等级保护制度

按照国家网络安全等级保护制度要求,各单位、各部门在公安机关指导监督下,认真组织、深入开展网络安全等级保护工作,建立良好的网络安全保护生态,切实履行主体责任,全面提升网络安全保护能力。

(一)深化网络定级备案工作。网络运营者应全面梳理本单位各类网络,特别是云计算、物联网、新型互联网、大数据、智能制造等新技术应用的基本情况,并根据网络的功能、服务范围、服务对象和处理数据等情况,科学确定网络的安全保护等级,对第二级以上网络依法向公安机关备案,并向行业主管部门报备。对新建网络,应在规划设计阶段确定安全保护等级。公安机关对网络运营者提交的备案材料和网络的安全保护等级进行审核,对定级结果合理、备案材料符合要求的,及时出具网络安全等级保护备案证明。行业主管部门可以依据《网络安全等级保护定级指南》国家标准,结合行业特点制定行业网络安全等级保护定级指导意见。

(二)定期开展网络安全等级测评。网络运营者应依据有关标准规范,对已定级备案网络的安全性进行检测评估,查找可能存在的网络安全问题和隐患。第三级以上网络运营者应委托符合国家有关规定的等级测评机构,每年开展一次网络安全等级测评,并及时将等级测评报告提交受理备案的公安机关和行业主管部门。新建第三级以上网络应在通过等级测评后投入运行。网络运营者在开展测评服务过程中要与测评机构签署安全保密协议,并对测评过程进行监督管理。公安机关要加强对本地等级测评机构的监督管理,建立测评人员背景审查和人员审核制度,确保等级测评过程客观、公正、安全。

(三)科学开展安全建设整改。网络运营者应在网络建设和运营过程中,同步规划、同步建设、同步使用有关网络安全保护措施。应依据《网络安全等级保护基本要求》《网络安全等级保护安全设计技术要求》等国家标准,在现有安全保护措施的基础上,全面梳理分析安全保护需求,并结合等级测评过程中发现的问题隐患,按照“一个中心(安全管理中心)、三重防护(安全通信网络、安全区域边界、安全计算环境)”的要求,认真开展网络安全建设和整改加固,全面落实安全保护技术措施。网络运营者可将网络迁移上云,或将网络安全服务外包,充分利用云服务商和网络安全服务商提升网络安全保护能力和水平。应全面加强网络安全管理,建立完善人员管理、教育培训、系统安全建设和运维等管理制度,加强机房、设备和介质安全管理,强化重要数据和个人信息保护,制定操作规范和工作流程,加强日常监督和考核,确保各项管理措施有效落实。

(四)强化安全责任落实。行业主管部门、网络运营者应依据《网络安全法》等法律法规和有关政策要求,按照“谁主管谁负责、谁运营谁负责”的原则,厘清网络安全保护边界,明确安全保护工作责任,建立网络安全等级保护工作责任制,落实责任追究制度,作到“守土有责、守土尽责”。网络运营者要定期组织专门力量开展网络安全自查和检测评估,行业主管部门要组织风险评估,及时发现网络安全隐患和薄弱环节并予以整改,不断提高网络安全保护能力和水平。

(五)加强供应链安全管理。网络运营者应加强网络关键人员的安全管理,第三级以上网络运营者应对为其提供设计、建设、运维、技术服务的机构和人员加强管理,评估服务过程中可能存在的安全风险,并采取相应的管控措施。网络运营者应加强网络运维管理,因业务需要确需通过互联网远程运维的,应进行评估论证,并采取相应的管控措施。网络运营者应采购、使用符合国家法律法规和有关标准规范要求的网络产品及服务,第三级以上网络运营者应积极应用安全可信的网络产品及服务。

(六)落实密码安全防护要求。网络运营者应贯彻落实《中华人民共和国密码法》等有关法律法规规定和密码应用相关标准规范。第三级以上网络应正确、有效采用密码技术进行保护,并使用符合相关要求的密码产品和服务。第三级以上网络运营者应在网络规划、建设和运行阶段,按照密码应用安全性评估管理办法和相关标准,在网络安全等级测评中同步开展密码应用安全性评估。

三、建立并实施关键信息基础设施安全保护制度

公安机关指导监督关键信息基础设施安全保护工作。各单位、各部门应加强关键信息基础设施安全的法律体系、政策体系、标准体系、保护体系、保卫体系和保障体系建设,建立并实施关键信息基础设施安全保护制度,在落实网络安全等级保护制度基础上,突出保护重点,强化保护措施,切实维护关键信息基础设施安全。

(一)组织认定关键信息基础设施。根据党中央和公安部有关规定,公共通信和信息服务、能源、交通、水利、金融、公共服务、电子政务、国防科技工业等重要行业和领域的主管、监管部门(以下统称保护工作部门)应制定本行业、本领域关键信息基础设施认定规则并报公安部备案。保护工作部门根据认定规则负责组织认定本行业、本领域关键信息基础设施,及时将认定结果通知相关设施运营者并报公安部。应将符合认定条件的基础网络、大型专网、核心业务系统、云平台、大数据平台、物联网、工业控制系统、智能制造系统、新型互联网、新兴通讯设施等重点保护对象纳入关键信息基础设施。关键信息基础设施清单实行动态调整机制,有关网络设施、信息系统发生较大变化,可能影响其认定结果的,运营者应及时将相关情况报告保护工作部门,保护工作部门应组织重新认定,将认定结果通知运营者,并报公安部。

(二)明确关键信息基础设施安全保护工作职能分工。公安部负责关键信息基础设施安全保护工作的顶层设计和规划部署,会同相关部门健全完善关键信息基础设施安全保护制度体系。保护工作部门负责对本行业、本领域关键信息基础设施安全保护工作的组织领导,根据国家网络安全法律法规和有关标准规范要求,制定并实施本行业、本领域关键信息基础设施安全总体规划和安全防护策略,落实本行业、本领域网络安全指导监督责任。关键信息基础设施运营者负责设置专门安全管理机构,组织开展关键信息基础设施安全保护工作,主要负责人对本单位关键信息基础设施安全保护负总责。

(三)落实关键信息基础设施重点防护措施。关键信息基础设施运营者应依据网络安全等级保护标准开展安全建设并进行等级测评,发现问题和风险隐患要及时整改;依据关键信息基础设施安全保护标准,加强安全保护和保障,并进行安全检测评估。要梳理网络资产,建立资产档案,强化核心岗位人员管理、整体防护、监测预警、应急处置、数据保护等重点保护措施,合理分区分域,收敛互联网暴露面,加强网络攻击威胁管控,强化纵深防御,积极利用新技术开展网络安全保护,构建以密码技术、可信计算、人工智能、大数据分析等为核心的网络安全保护体系,不断提升关键信息基础设施内生安全、主动免疫和主动防御能力。有条件的运营者应组建自己的安全服务机构,承担关键信息基础设施安全保护任务,也可通过迁移上云或购买安全服务等方式,提高网络安全专业化、集约化保障能力。

(四)加强重要数据和个人信息保护。运营者应建立并落实重要数据和个人信息安全保护制度,对关键信息基础设施中的重要网络和数据库进行容灾备份,采取身份鉴别、访问控制、密码保护、安全审计、安全隔离、可信验证等关键技术措施,切实保护重要数据全生命周期安全。运营者在境内运营中收集和产生的个人信息和重要数据应当在境内存储,因业务需要,确需向境外提供的,应当遵守有关规定并进行安全评估。

(五)强化核心岗位人员和产品服务的安全管理。要对专门安全管理机构的负责人和关键岗位人员进行安全背景审查,加强管理。要对关键信息基础设施设计、建设、运行、维护等服务实施安全管理,采购安全可信的网络产品和服务,确保供应链安全。当采购产品和服务可能影响国家安全的,应按照国家有关规定通过安全审查。公安机关加强对关键信息基础设施安全服务机构的安全管理,为运营者开展安全保护工作提供支持。

四、加强网络安全保护工作协作配合

行业主管部门、网络运营者与公安机关要密切协同,大力开展安全监测、通报预警、应急处置、威胁情报等工作,落实常态化措施,提升应对、处置网络安全突发事件和重大风险防控能力。

(一)加强网络安全立体化监测体系建设。各单位、各部门要全面加强网络安全监测,对关键信息基础设施、重要网络等开展实时监测,发现网络攻击和安全威胁,立即报告公安机关和有关部门并采取有效措施处置。要加强网络新技术研究和应用,研究绘制网络空间地理信息图谱(网络地图),实现挂图作战。行业主管部门、网络运营要建设本行业、本单位的网络安全保护业务平台,建设平台智慧大脑,依托平台和大数据开展实时监测、通报预警、应急处置、安全防护、指挥调度等工作,并与公安机关有关安全保卫平台对接,形成条块结合、纵横联通、协同联动的综合防控大格局。重点行业、网络运营者和公安机关要建设网络安全监控指挥中心,落实7×24小时值班值守制度,建立常态化、实战化的网络安全工作机制。

(二)加强网络安全信息共享和通报预警。行业主管部门、网络运营者要依托国家网络与信息安全信息通报机制,加强本行业、本领域网络安全信息通报预警力量建设,及时收集、汇总、分析各方网络安全信息,加强威胁情报工作,组织开展网络安全威胁分析和态势研判,及时通报预警和处置。第三级以上网络运营者和关键信息基础设施运营者要开展网络安全监测预警和信息通报工作,及时接收、处置来自国家、行业和地方网络安全预警通报信息,按规定向行业主管部门、备案公安机关报送网络安全监测预警信息和网络安全事件。公安机关要加强网络与信息安全信息通报预警机制建设和力量建设,不断提高网络安全通报预警能力。

(三)加强网络安全应急处置机制建设。行业主管部门、网络运营者要按照国家有关要求制定网络安全应急预案,加强网络安全应急力量建设和应急资源储备,与公安机关密切配合,建立网络安全事件报告制度和应急处置机制。关键信息基础设施运营者和第三级以上网络运营者应定期开展应急演练,有效处置网络安全事件,并针对应急演练中发现的突出问题和漏洞隐患,及时整改加固,完善保护措施。行业主管部门、网络运营者应配合公安机关每年组织开展的网络安全监督检查、比武演习等工作,不断提升安全保护能力和对抗能力。

(四)加强网络安全事件处置和案件侦办。关键信息基础设施、第三级以上网络发生重大网络安全威胁和事件时,行业主管部门、网络运营者和公安机关应联合开展处置。电信业务经营者、网络服务提供者应提供支持及协助。网络运营者应配合公安机关打击网络违法犯罪活动;发现违法犯罪线索、重大网络安全威胁和事件时,应及时报告公安机关和有关部门并提供必要协助。

(五)加强网络安全问题隐患整改督办。公安机关建立挂牌督办制度,针对网络运营者网络安全工作不力、重大安全问题隐患久拖不改,或存在较大网络安全风险、发生重大网络安全案事件的,按照规定的权限和程序,会同行业主管部门对相关负责人进行约谈,挂牌督办,并加大监督检查和行政执法力度,依法依规进行行政处罚。网络运营者应按照有关要求采取措施,及时进行整改,消除重大风险隐患。发生重大网络安全案事件的,行业主管部门应组织全行业开展整改整顿。

五、加强网络安全工作各项保障

(一)加强组织领导。各单位、各部门要高度重视网络安全等级保护和关键信息基础设施安全保护工作,将其列入重要议事日程,加强统筹领导和规划设计,认真研究解决网络安全机构设置、人员配备、经费投入、安全保护措施建设等重大问题。行业主管部门和网络运营者要明确本单位主要负责人是网络安全的第一责任人,并确定一名领导班子成员分管网络安全工作,成立网络安全专门机构,明确任务分工,一级抓一级,层层抓落实。

(二)加强经费政策保障。各单位、各部门要通过现有经费渠道、保障关键信息基础设施、第三级以上网络等开展等级测评、风险评估、密码应用安全性检测、演练竞赛、安全建设整改、安全保护平台建设、密码保障系统建设、运行维护、监督检查、教育培训等经费投入。关键信息基础设施运营者应保障足额的网络安全投入,作出网络安全和信息化有关决策时应有网络安全管理机构人员参与。有关部门要扶持重点网络安全技术产业和项目,支持网络安全技术研究开发和创新应用,推动网络安全产业健康发展。公安机关要会同相关部门组织实施“一带一路”网络安全战略,支持网络安全企业“走出去”, 与有关国家共享中国网络安全保护经验。

(三)加强考核评价。各单位、各部门要进一步健全完善网络安全考核评价制度,明确考核指标,组织开展考核。公安机关将网络安全工作纳入社会治安综合治理考核评价体系,每年组织对各地区网络安全工作进行考核评价,每年评选网络安全等级保护、关键信息基础设施安全保护工作先进单位,并将结果报告党委政府,通报网信部门。

(四)加强技术攻关。各单位、各部门要充分调动网络安全企业、科研机构、专家等社会力量积极参与网络安全核心技术攻关,加强网络安全协同协作、互动互补、共治共享和群防群治。公安机关要会同有关部门加强网络安全等级保护和关键信息基础设施安全保护标准制定工作,出台标准应用指南,加强标准宣贯和应用实施,建设试点示范基地,促进我国网络安全产业和企业的健康发展。

(五)加强人才培养。各单位、各部门要加强网络安全等级保护和关键信息基础设施安全保护业务交流,通过组织开展比武竞赛等形式,发现选拔高精尖技术人才,建设人才库,建立健全人才发现、培养、选拔和使用机制,为做好网络安全工作提供人才保障。

Determination Rules on Acts of Collecting and Using Personal Information in Violation of Rules and Regulations in Apps

Posted on Updated on

Notice concerning Issuance of the “Determination Rules on Acts of Collecting and Using Personal Information in Violation of Rules and Regulations in Apps”

All provincial, autonomous region, municipal and the Xinjiang Production-Construction Corps cybersecurity and informatization offices, telecommunications management bureaus, public security offices (bureaus), market supervision and management bureaus (offices, committees):

On the basis of the “Announcement concerning a Special Campaign on Collection and Use of Personal Information in Violation of Rules and Regulations in Apps”, in order to provide reference for the determination of acts of collecting and using personal information in violations of rules and regulations in apps, implement laws and regulations such as the “Cybersecurity Law”, etc., the Cyberspace Administration of China, Ministry of Industry and Information Technology, Ministry of Public Security, and State Administration of Market Regulation have jointly formulated the “Determination Rules on Acts of Collecting and Using Personal Information in Violation of Rules and Regulations in Apps”. These are hereby issued to you, please refer to and implement them in integration with supervision, management and law enforcement work realities.

Cyberspace Administration of China Secretariat

Ministry of Industry and Information Technology General Office

Ministry of Public Security General Office

State Administration for Market Regulation General Office

28 November 2019

Determination Rules on Acts of Collecting and Using Personal Information in Violation of Rules and Regulations in Apps

On the basis of the “Announcement concerning a Special Campaign on Collection and Use of Personal Information in Violation of Rules and Regulations in Apps”, in order to provide reference for the determination of acts of collecting and using personal information in violations of rules and regulations in apps, provide guidance for app operators’ self-inspection and self-rectification as well as netizens’ social supervision, and implement laws and regulations such as the “Cybersecurity Law”, these Rules are formulated.

I, The following acts may be determined as “not publishing collection and use norms”

1. There is no privacy policy in the app, or the privacy policy does not contain norms on the collection and use of personal information;

2. When using the app for the first time, users are not prompted to read privacy policies and other such norms on collection and use through a pop-up window and other such clear methods

3. The privacy policy and other such collection and use norms are difficult to access, for instance when after entering the app’s main interface, 4 clicks or other such manipulations are required before it can be accessed;

4. The privacy policy and other such collection and use norms are difficult to read, for instance because characters are too small and closely spaced, colours are too light, they are blurred and unclear, or no simplified Mandarin version is provided.

II, The following acts may be determined as “not indicating the objective, method and scope of collecting and using personal information”

1. Not listing the objective, method and scope of personal information collection and use in the app (including entrusted third parties or embedded third-party code and plug-ins) one by one;

2. When a change occurs in the objective, method and scope of personal information collection and use, not notifying the user in an appropriate manner, appropriate manners include revising the privacy policy and other such collection and use norms and alerting the user to read it;

3. When requesting to activate authorization of collectable personal information, or requesting to collect users’ identity card number, bank account number, geographical tracking and other such sensitive personal information, not simultaneously notifying the user about its objective, or having an unclear or difficult to understand objective.

4. Content related to collection and use norms is obscure and difficult to understand, verbose and overly detailed, which is difficult for users to understand, for instance using large amounts of specialist jargon, etc.

III, The following acts may be determined as “collecting and using personal information without users’ consent”

1. Beginning to collect personal information or activating authorizations for collectable information before obtaining users’ consent;

2. After users clearly indicate they do not consent, still collecting personal information or activating up collectable personal information authorizations, or frequently obtaining users’ consent, interfering with users’ regular use;

3. Actually collecting personal information or activating collectable personal information authorizations in excess of the scope of user authorization;

4. Obtaining users’ consent by way of implicit agreement to privacy policies and other non-explicit methods;

5. Altering the status of collectable personal information authorizations they have set up without users’ consent, for instance automatically restoring user-set up authorization to implicit approval status when updating an app;

6. Using users’ personal information and algorithms to direct push delivery information, without providing an option for non-targeted push delivery information;

7. Misleading users through fraudulent, swindling and other such improper methods into consenting to personal information collection or the activation of collectable personal information authorizations, for instance wilfully hoodwinking or covering up the true objective for the collection of users’ personal information;

8. Not providing users with a way and method to revoke consent for personal information collection;

9. Collecting users’ personal information in violation of the announced collection and use norms. 

IV, The following acts may be determined as “collecting personal information in violation of the principle of necessity, that is not related to the provided service”

1.  Collected categories of personal information or activated collectable personal information authorizations are not related to the existing business functions;

2. Refusing to provide business functions because users do not consent to the collection of unnecessary personal information or the activation of unnecessary authorizations;

3.  Requesting the collection of personal information in excess of the scope the user originally consented to when adding new business functions to the app, refusing to provide the original business functions if the user does not agree, except where the newly added business function supersedes the original business function;

4. The frequency of personal information collection exceeds the actual needs of business functions;

5. Obliging he user to consent to personal information collection for only the purpose of improving of service quality, enhancing user experience, targeting push delivery information, researching and developing new products, etc., 

6. Requiring users to consent once to activating multiple collectable personal information authorizations, where use is impossible if users do not consent.

V, The following acts may be determined as “providing personal information to others without consent”

1. Providing personal information directly from the app customer end to third parties both without user content, and without anonymized processing, including providing personal information to third parties through methods such as embedding third-party code or plug-in components at the customer end, etc.;

2. Providing collected personal information to third parties after data is transmitted to the app’s back-end servers both without user content, and without anonymized processing;

3. Even if functions are provided to correct and delete personal information and cancel user accounts, not timely responding to user’s corresponding operations, requiring manual processing, not completing examination and processing within the committed time limits (the committed time limit may not exceed 15 working days, where there is not committed time limit, 15 working days are taken as limit);

4. Where the executing of correction or deletion of personal information, the cancellation of user accounts and other such user operations has been completed, but it is not completed at the app back-end;

5. Not establishing and publishing personal information security complaints and reporting channels, or not accepting and processing matters within the committed time limits (the committed time limit may not exceed 15 working days, where there is not committed time limit, 15 working days are taken as limit).

关于印发《App违法违规收集使用个人信息行为认定方法》的通知
各省、自治区、直辖市及新疆生产建设兵团网信办、通信管理局、公安厅(局)、市场监管局(厅、委):
  根据《关于开展App违法违规收集使用个人信息专项治理的公告》,为认定App违法违规收集使用个人信息行为提供参考,落实《网络安全法》等法律法规,国家互联网信息办公室、工业和信息化部、公安部、市场监管总局联合制定了《App违法违规收集使用个人信息行为认定方法》。现印发你们,请结合监管和执法工作实际参考执行。
国家互联网信息办公室秘书局
工业和信息化部办公厅
公安部办公厅
市场监管总局办公厅
  2019年11月28日
App违法违规收集使用个人信息行为认定方法
  根据《关于开展App违法违规收集使用个人信息专项治理的公告》,为监督管理部门认定App违法违规收集使用个人信息行为提供参考,为App运营者自查自纠和网民社会监督提供指引,落实《网络安全法》等法律法规,制定本方法。
  一、以下行为可被认定为“未公开收集使用规则”
  1.在App中没有隐私政策,或者隐私政策中没有收集使用个人信息规则;
  2.在App首次运行时未通过弹窗等明显方式提示用户阅读隐私政策等收集使用规则;
  3.隐私政策等收集使用规则难以访问,如进入App主界面后,需多于4次点击等操作才能访问到;
  4.隐私政策等收集使用规则难以阅读,如文字过小过密、颜色过淡、模糊不清,或未提供简体中文版等。
  二、以下行为可被认定为“未明示收集使用个人信息的目的、方式和范围”
  1.未逐一列出App(包括委托的第三方或嵌入的第三方代码、插件)收集使用个人信息的目的、方式、范围等;
  2.收集使用个人信息的目的、方式、范围发生变化时,未以适当方式通知用户,适当方式包括更新隐私政策等收集使用规则并提醒用户阅读等;
  3.在申请打开可收集个人信息的权限,或申请收集用户身份证号、银行账号、行踪轨迹等个人敏感信息时,未同步告知用户其目的,或者目的不明确、难以理解;
  4.有关收集使用规则的内容晦涩难懂、冗长繁琐,用户难以理解,如使用大量专业术语等。
  三、以下行为可被认定为“未经用户同意收集使用个人信息”
  1.征得用户同意前就开始收集个人信息或打开可收集个人信息的权限;
  2.用户明确表示不同意后,仍收集个人信息或打开可收集个人信息的权限,或频繁征求用户同意、干扰用户正常使用;
  3.实际收集的个人信息或打开的可收集个人信息权限超出用户授权范围;
  4.以默认选择同意隐私政策等非明示方式征求用户同意;
  5.未经用户同意更改其设置的可收集个人信息权限状态,如App更新时自动将用户设置的权限恢复到默认状态;
  6.利用用户个人信息和算法定向推送信息,未提供非定向推送信息的选项;
  7.以欺诈、诱骗等不正当方式误导用户同意收集个人信息或打开可收集个人信息的权限,如故意欺瞒、掩饰收集使用个人信息的真实目的;
  8.未向用户提供撤回同意收集个人信息的途径、方式;
  9.违反其所声明的收集使用规则,收集使用个人信息。
  四、以下行为可被认定为“违反必要原则,收集与其提供的服务无关的个人信息”
  1.收集的个人信息类型或打开的可收集个人信息权限与现有业务功能无关;
  2.因用户不同意收集非必要个人信息或打开非必要权限,拒绝提供业务功能;
  3.App新增业务功能申请收集的个人信息超出用户原有同意范围,若用户不同意,则拒绝提供原有业务功能,新增业务功能取代原有业务功能的除外;
  4.收集个人信息的频度等超出业务功能实际需要;
  5.仅以改善服务质量、提升用户体验、定向推送信息、研发新产品等为由,强制要求用户同意收集个人信息;
  6.要求用户一次性同意打开多个可收集个人信息的权限,用户不同意则无法使用。
  五、以下行为可被认定为“未经同意向他人提供个人信息”
  1.既未经用户同意,也未做匿名化处理,App客户端直接向第三方提供个人信息,包括通过客户端嵌入的第三方代码、插件等方式向第三方提供个人信息;
  2.既未经用户同意,也未做匿名化处理,数据传输至App后台服务器后,向第三方提供其收集的个人信息;
  3.App接入第三方应用,未经用户同意,向第三方应用提供个人信息。
  六、以下行为可被认定为“未按法律规定提供删除或更正个人信息功能”或“未公布投诉、举报方式等信息”
  1.未提供有效的更正、删除个人信息及注销用户账号功能;
  2.为更正、删除个人信息或注销用户账号设置不必要或不合理条件;
  3.虽提供了更正、删除个人信息及注销用户账号功能,但未及时响应用户相应操作,需人工处理的,未在承诺时限内(承诺时限不得超过15个工作日,无承诺时限的,以15个工作日为限)完成核查和处理;
  4.更正、删除个人信息或注销用户账号等用户操作已执行完毕,但App后台并未完成的;
  5.未建立并公布个人信息安全投诉、举报渠道,或未在承诺时限内(承诺时限不得超过15个工作日,无承诺时限的,以15个工作日为限)受理并处理的。

Regulations on Internet Security Supervision and Inspection by Public Security Bodies

Posted on Updated on

Ministry of Public Security of the People’s Republic of China Decree

No. 151

The “Regulations on Internet Security Supervision and Inspection by Public Security Bodies” were passed at the Minister’s business meeting of the Ministry of Public Security on 5 September 2018, are hereby promulgated, and take effect on 1 November 2018.

Minister: Zhao Kezhi

15 September 2018

Regulations on Internet Security Supervision and Inspection by Public Security Bodies

Chapter I: General provisions

Article 1: These Regulations are formulated in order to standardize public security bodies’ Internet security supervision and inspection work, prevent online law-breaking and crime, safeguard cybersecurity, protect the lawful rights and interests of citizens, legal persons and other organizations, on the basis of the “People’s Police Law of the People’s Republic of China”, the “Cybersecurity Law of the People’s Republic of China” and other such laws and administrative regulations. 

Article 2: These Regulations apply to public security bodies conducting security supervision and inspection of Internet service providers’ and network-using work units’ fulfilment of cybersecurity duties provided in laws and administrative regulations. 

Article 3: Internet security supervision and inspection work is conducted by county-level or higher local People’s Government public security body cybersecurity protection departments. 

Higher-level public security bodies shall implement guidance and supervision of lower levels’ public security bodies’ conduct of Internet security supervision and inspection work.

Article 4: Public security bodies conducting Internet security supervision and inspection shall abide by the policies of scientific management, ensuring and stimulating development, strictly abide by statutory powers and procedures, incessantly improve law enforcement methods, and comprehensively implement law enforcement responsibilities. 

Article 5: Public security bodies and their work personnel shall strictly preserve the secrecy of personal information and privacy, commercial secrets and State secrets they learn in the process of fulfilling Internet security supervision and inspection duties and responsibilities, they may not leak this, sell it or illegally provide it to others.

Public security bodies and their work personnel can only use information they learn in the process of fulfilling Internet security supervision and inspection duties as required for maintaining cybersecurity, and may not use it for other purposes.

Article 6: Public security bodies shall timely notify relevant controlling departments and work units about cybersecurity risks they discover in the process of Internet security supervision and inspection work, which may harm national security, public security or social order.

Article 7: Public security bodies shall establish and implement rules for Internet security supervision and inspection work, and consciously accept supervision by inspection counterparts and the popular masses.

Chapter II: Supervision and inspection counterparts and content.

Article 8: Internet security supervision and inspection will be conducted by public security bodies of the locality of Internet service providers’ network service operations bodies and network using work units’ network management bodies. Where an Internet service provider is an individual, it may be implemented by the public security body of their regular place of residence.

Article 9: Public security bodies shall, on the basis of cybersecurity protection requirements and the concrete circumstances of cybersecurity risks and vulnerabilities, conduct supervision and inspection of the following Internet service providers and network-using work units.

(1) Those providing Internet access, Internet data centre, content distribution and domain name services;

(2) Those providing Internet information services;

(3) Those providing public network access services;

(4) Those providing other Internet services. 

Focus supervision and inspection shall be conducted of those who have not conducted the services provided in the previous Paragraph for a full year, those where a cybersecurity incident, breach of law or crime occurred within two years, or those who have been subject to administrative punishment by a public security body for not fulfilling statutory cybersecurity duties.

Article 10: Public security bodies shall, on the basis of the actual circumstances of Internet service providers’ and network-using work units fulfilling their statutory cybersecurity duties, and according to relevant State regulations and standards, conduct supervision and inspection of the following content:

(1) Whether or not they have conducted network work unit filing formalities, and have reported the access work unit, basic user information and changes therein;

(2) Whether or not they have formulated and implemented cybersecurity management rules and operating rules, and appointed a person responsible for cybersecurity;

(3) Whether or not they have adopted technical measures to record and preserve user registration information and network use record information according to the law;

(4) Whether or not they have adopted technical measures to defend against computer viruses, cyberattacks, cyber intrusions, etc.;

(5) Whether or not they have adopted corresponding prevention measures against the publication or transmission of information prohibited in laws and administrative regulations according to the law in public information services;

(6) Whether or not they have provided technical support and assistance to public security bodies lawfully maintaining cybersecurity, preventing and investigating terror activities, or investigating crimes according to statutory provisions;

(7) Whether or not they have fulfilled cybersecurity multi-level protection duties as provided in laws and administrative regulations.

Article 11: Apart from the content listed in Article 10 of these Regulations, public security bodies shall also conduct supervision and inspection of the following content, on the basis of the category of provided Internet services:

(1) Where Internet access services are provided, supervising and inspecting whether they have recorded and preserved network address, allocation and use details;

(2) Where Internet data centre services are provided, supervising and inspecting whether they have recorded user information of the host entrustment, host rental and virtual space rental they provide;

(3) Where Internet domain name services are provided, supervising and inspecting whether they have recorded network domain name application and modification information, and whether or not they have adopted measures to deal with unlawful domain names according to the law.

(4) Where Internet information services are provided, supervising and inspecting whether they have adopted user-disseminated information management measures according to the law, whether or not they have adopted measures to deal with already published or transmitted information of which the dissemination or transmission is prohibited by laws and administrative regulations, and maintained related records;

(5) Where Internet content distribution services are provided, supervising and inspecting whether or not they have recorded circumstances concerning content distribution network and content source network links;

(6) Where Internet public access services are provided, supervising and inspecting whether or not they have adopted technical network and information security protection measures conform to national standards.

Article 12: During periods of national major cybersecurity defence tasks, public security bodies may conduct targeted security supervision and inspection of the following content of Internet service providers and network-using work units related to national major cybersecurity defence tasks:

(1) Whether or not they have formulated work plans required for major national cybersecurity defence tasks, clarified cybersecurity duties and work divisions, and appointed a management person for cybersecurity;

(2) Whether or not they have organized and conducted cybersecurity risk assessments, and adopted corresponding risk control measures to remedy cybersecurity leaks and vulnerabilities;

(3) Whether or not they have formulated cybersecurity emergency response plans, organized and conducted emergency response exercises, and whether or not emergency response-related equipment is complete and effective.

(4) Whether or not they have adopted other cybersecurity protection tasks required for major cybersecurity protection tasks according to the law;

(5) Whether or not they have reported cybersecurity protection measures and implementation circumstances to public security bodies according to requirement. 

Internet security supervision and inspection with preventing terror attacks as its major objective will be implemented according to the content provided in the previous Paragraph.

Chapter III: Supervision and inspection procedures

Article 13: Public security bureaus conducting Internet security supervision and inspection may adopt on-site supervision and inspection or remote monitoring methods to do so.

Article 14: When public security bodies conduct on-site Internet security supervision and inspection, the number of People’s Police may not be less than 2, and they shall produce their People’s Police card and county-level or higher local People’s Government public security body-issued supervision and inspection notification letter.

Article 15: Public security bodies conducting on-site Internet security supervision and inspection may adopt the following measures on the basis of requirement:

(1) Entering business premises, computer rooms, work premises;

(2) Requiring the supervision and inspection counterpart’s responsible person or cybersecurity management personnel to explain supervision and inspection matters;

(3) Consulting and reproducing information related to Internet security supervision and inspection;

(4) Checking the operational state of technical network and information security protection measures.

Article 16: Public security bodies may conduct remote monitoring on whether or not cybersecurity leaks exist with Internet service providers and network-using work units.

Public security bodies conducting remote monitoring shall notify the supervision and inspection counterpart in advance about the inspection time, inspection cope and other such matters, or publish the related inspection matters, they may not interfere with or destroy the regular operations of the supervision and inspection counterpart’s networks.

Article 17: Public security bodies conducting on-site supervision and inspection or remote monitoring may entrust cybersecurity service bodies having corresponding technical capabilities with providing technical support. 

Cybersecurity service bodies and their work personnel shall strictly preserve the secrecy of personal information and privacy, commercial secrets and State secrets they learn in the process of fulfilling Internet security supervision and inspection duties and responsibilities, they may not leak this, sell it or illegally provide it to others.

Public security bodies shall strictly supervise cybersecurity service bodies’ implementation of cybersecurity management and secrecy protection responsibilities.

Article 18: Public security bodies conducting on-site supervision and inspection shall draft supervision and inspection records, and have them signed by the People’s Police conducting supervision and inspection and the responsible person or cybersecurity management personnel from the supervision and inspection counterpart. Where the responsible person or cybersecurity management personnel from the supervision and inspection counterpart object to the supervision and inspection record, they shall be allowed to explain the matter; where they refuse to sign, People’s Police shall indicate this on the supervision and inspection record.

Public security bodies conducting remote monitoring shall draft supervision and inspection records, and have the supervision and inspection record signed by two or more People’s Police conducting the supervision and inspection. 

Where cybersecurity service bodies are entrusted with providing technical support, the technical support personnel shall sign the supervision and inspection record together.

Article 19: Public security bodies discovering that cybersecurity risks or vulnerabilities exist in Internet service providers and network-using work unit in the process of Internet security supervision and inspection, shall urge and guide them to adopt measures to eliminate the risks or vulnerabilities, and indicate this in the supervision and inspection records; where they discover unlawful acts, but circumstances are light or no results have been created, they shall order them to correct the matter within a limited time.

Where the supervision and inspection counterpart believes they have completed correction before the end of the time limit, they may submit a re-inspection application in writing to the public security body.

Public security bodies shall, within three working days after the time limit ends or after receiving an earlier re-inspection application from the supervision and inspection counterpart, conduct a re-inspection of the corrected situation, and feed back the re-inspection results within three working days after the re-inspection concludes.

Article 12: All kinds of material collected in the process of inspection, or all kinds of produced documents and other materials, shall be stored in files according to regulations.

Chapter IV: Legal liability

Article 21: Where public security bodies discover Internet service providers or network-using work units committed the following unlawful acts in the process of Internet security supervision and inspection, they shall impose administrative punishment according to the law:

(1) Those not formulating or implementing cybersecurity management rules and operating rules, or not appointing a responsible person for cybersecurity, will be punished according to Article 59 Paragraph I of the “Cybersecurity Law of the People’s Republic of China”;

(2) Those not adopting technical measures to defend against computer viruses, cyberattacks, cyber intrusions and other such acts harming cybersecurity, will be punished according to the provisions of Article 59 Paragraph I of the “Cybersecurity Law of the People’s Republic of China”;

(3) Those not adopting measures to record and preserve user registration information and web access daily record information, will be punished according to the provisions of Article 59 Paragraph I of the “Cybersecurity Law of the People’s Republic of China”;

(4) Those not requiring users to provide real identity information according to requirements in the process of providing Internet information dissemination, instant communication and other such services, or who provide related services to users not providing real identity information, will be punished according to the provisions of Article 61 of the “Cybersecurity Law of the People’s Republic of China”;

(5) Those who do not adopt measures to cease transmission and delete information of which the dissemination and transmission is prohibited by laws and administrative regulations according to the law or according to public security bodies’ requirements, and preserve relevant records, will be punished according to the provisions of Article 68 or Article 69 Paragraph I of the “Cybersecurity Law of the People’s Republic of China”;

(6) Those refusing to provide technical support and assistance to public security bodies maintaining cybersecurity and investigating criminal activities according to the law, will be punished according to the provisions of Article 69 Paragraph III of the “Cybersecurity Law of the People’s Republic of China”.

Where the acts in the preceding items 4 to 6 violate the “Anti-Terrorism Law of the People’s Republic of China”, they will be punished according to the provisions of Article 84 or Article 86 Paragraph I of the “Anti-Terrorism Law of the People’s Republic of China”.

Article 22: Where public security bodies, in the process of Internet security supervision and inspection, discover Internet service providers and network-using work units steal or obtain personal information in an illegal manner, illegally sell or illegally provide it to others, but it does not constitute a crime, they will be punished according to the provisions of Article 64 Paragraph II of the “Cybersecurity Law of the People’s Republic of China”.

Article 23: Where public security bodies, in the process of Internet security supervision and inspection, discover Internet service providers and network-using work units have installed malicious programmes in the Internet services they provide, they will be punished according to the provisions of Article 60 Paragraph I of the “Cybersecurity Law of the People’s Republic of China”.

Article 24: Where Internet service providers and network-using work units refuse or impede public security bodies’ conduct of Internet security supervision and inspection, they will be punished according to the provisions of Article 69 Paragraph II of the “Cybersecurity Law of the People’s Republic of China”; where they refuse to cooperate with anti-terrorism work, they will be punished according to the provisions of Article 91 or Article 92 of the “Anti-Terrorism Law of the People’s Republic of China.

Article 25: Where cybersecurity service bodies and their work personnel entrusted with providing technical support engage in illegal intrusion into the supervision and inspection counterpart’s networks, interfere with the regular functioning of the supervision and inspection counterpart’s networks, or steal online data and other such activities harming cybersecurity, they will be punished according to the provisions of Article 63 of the “Cybersecurity Law of the People’s Republic of China”; where they steal personal information they have obtained in the process of their work or obtain it in an illegal manner, illegally sell or illegally provide it to others, they will be punished according to the provisions of Article 64 Paragraph II of the “Cybersecurity Law of the People’s Republic of China”, where it constitutes a crime, criminal liability will be prosecuted according to the law.

Where bodies and their work personnel as provided in the previous Paragraph infringe the commercial secrets of the supervision and inspection counterpart, constituting a crime, criminal liability will be prosecuted according to the law.

Article 26: Where public security bodies and their work personnel, in the process of Internet security supervision and inspection work, are derelict in their duties, abuse their powers, or engage in favouritism, the directly responsible person in charge and other directly responsible personnel will be punished according to the law; where it constitutes a crime, criminal liability will be prosecuted according to the law.

Article 27: Where Internet service providers and network-using work units violate these Regulations, constituting a violation of public security management, they will be subject to public order management punishment; where it constitutes a crime, criminal liability will be prosecuted according to the law.

Chapter V: Supplementary provisions

Article 28: Supervision and inspection of commercial Internet access service venues will be implementing according to the relevant provisions of the “Commercial Internet Access Service Venue Management Regulations”.

Article 29: These Regulations take effect on 1 November 2018.

中华人民共和国公安部令
第151号

《公安机关互联网安全监督检查规定》已经2018年9月5日公安部部长办公会议通过,现予发布,自2018年11月1日起施行。

部长  赵克志

2018年9月15日

公安机关互联网安全监督检查规定

第一章 总则

第一条 为规范公安机关互联网安全监督检查工作,预防网络违法犯罪,维护网络安全,保护公民、法人和其他组织合法权益,根据《中华人民共和国人民警察法》《中华人民共和国网络安全法》等有关法律、行政法规,制定本规定。

第二条 本规定适用于公安机关依法对互联网服务提供者和联网使用单位履行法律、行政法规规定的网络安全义务情况进行的安全监督检查。

第三条 互联网安全监督检查工作由县级以上地方人民政府公安机关网络安全保卫部门组织实施。

上级公安机关应当对下级公安机关开展互联网安全监督检查工作情况进行指导和监督。

第四条 公安机关开展互联网安全监督检查,应当遵循依法科学管理、保障和促进发展的方针,严格遵守法定权限和程序,不断改进执法方式,全面落实执法责任。

第五条 公安机关及其工作人员对履行互联网安全监督检查职责中知悉的个人信息、隐私、商业秘密和国家秘密,应当严格保密,不得泄露、出售或者非法向他人提供。

公安机关及其工作人员在履行互联网安全监督检查职责中获取的信息,只能用于维护网络安全的需要,不得用于其他用途。

第六条 公安机关对互联网安全监督检查工作中发现的可能危害国家安全、公共安全、社会秩序的网络安全风险,应当及时通报有关主管部门和单位。

第七条 公安机关应当建立并落实互联网安全监督检查工作制度,自觉接受检查对象和人民群众的监督。

第二章 监督检查对象和内容

第八条 互联网安全监督检查由互联网服务提供者的网络服务运营机构和联网使用单位的网络管理机构所在地公安机关实施。互联网服务提供者为个人的,可以由其经常居住地公安机关实施。

第九条 公安机关应当根据网络安全防范需要和网络安全风险隐患的具体情况,对下列互联网服务提供者和联网使用单位开展监督检查:

(一)提供互联网接入、互联网数据中心、内容分发、域名服务的;

(二)提供互联网信息服务的;

(三)提供公共上网服务的;

(四)提供其他互联网服务的;

对开展前款规定的服务未满一年的,两年内曾发生过网络安全事件、违法犯罪案件的,或者因未履行法定网络安全义务被公安机关予以行政处罚的,应当开展重点监督检查。

第十条 公安机关应当根据互联网服务提供者和联网使用单位履行法定网络安全义务的实际情况,依照国家有关规定和标准,对下列内容进行监督检查:

(一)是否办理联网单位备案手续,并报送接入单位和用户基本信息及其变更情况;

(二)是否制定并落实网络安全管理制度和操作规程,确定网络安全负责人;

(三)是否依法采取记录并留存用户注册信息和上网日志信息的技术措施;

(四)是否采取防范计算机病毒和网络攻击、网络侵入等技术措施;

(五)是否在公共信息服务中对法律、行政法规禁止发布或者传输的信息依法采取相关防范措施;

(六)是否按照法律规定的要求为公安机关依法维护国家安全、防范调查恐怖活动、侦查犯罪提供技术支持和协助;

(七)是否履行法律、行政法规规定的网络安全等级保护等义务。

第十一条 除本规定第十条所列内容外,公安机关还应当根据提供互联网服务的类型,对下列内容进行监督检查:

(一)对提供互联网接入服务的,监督检查是否记录并留存网络地址及分配使用情况;

(二)对提供互联网数据中心服务的,监督检查是否记录所提供的主机托管、主机租用和虚拟空间租用的用户信息;

(三)对提供互联网域名服务的,监督检查是否记录网络域名申请、变动信息,是否对违法域名依法采取处置措施;

(四)对提供互联网信息服务的,监督检查是否依法采取用户发布信息管理措施,是否对已发布或者传输的法律、行政法规禁止发布或者传输的信息依法采取处置措施,并保存相关记录;

(五)对提供互联网内容分发服务的,监督检查是否记录内容分发网络与内容源网络链接对应情况;

(六)对提供互联网公共上网服务的,监督检查是否采取符合国家标准的网络与信息安全保护技术措施。

第十二条 在国家重大网络安全保卫任务期间,对与国家重大网络安全保卫任务相关的互联网服务提供者和联网使用单位,公安机关可以对下列内容开展专项安全监督检查:

(一)是否制定重大网络安全保卫任务所要求的工作方案、明确网络安全责任分工并确定网络安全管理人员;

(二)是否组织开展网络安全风险评估,并采取相应风险管控措施堵塞网络安全漏洞隐患;

(三)是否制定网络安全应急处置预案并组织开展应急演练,应急处置相关设施是否完备有效;

(四)是否依法采取重大网络安全保卫任务所需要的其他网络安全防范措施;

(五)是否按照要求向公安机关报告网络安全防范措施及落实情况。

对防范恐怖袭击的重点目标的互联网安全监督检查,按照前款规定的内容执行。

第三章 监督检查程序

第十三条 公安机关开展互联网安全监督检查,可以采取现场监督检查或者远程检测的方式进行。

第十四条 公安机关开展互联网安全现场监督检查时,人民警察不得少于二人,并应当出示人民警察证和县级以上地方人民政府公安机关出具的监督检查通知书。

第十五条 公安机关开展互联网安全现场监督检查可以根据需要采取以下措施:

(一)进入营业场所、机房、工作场所;

(二)要求监督检查对象的负责人或者网络安全管理人员对监督检查事项作出说明;

(三)查阅、复制与互联网安全监督检查事项相关的信息;

(四)查看网络与信息安全保护技术措施运行情况。

第十六条 公安机关对互联网服务提供者和联网使用单位是否存在网络安全漏洞,可以开展远程检测。

公安机关开展远程检测,应当事先告知监督检查对象检查时间、检查范围等事项或者公开相关检查事项,不得干扰、破坏监督检查对象网络的正常运行。

第十七条 公安机关开展现场监督检查或者远程检测,可以委托具有相应技术能力的网络安全服务机构提供技术支持。

网络安全服务机构及其工作人员对工作中知悉的个人信息、隐私、商业秘密和国家秘密,应当严格保密,不得泄露、出售或者非法向他人提供。公安机关应当严格监督网络安全服务机构落实网络安全管理与保密责任。

第十八条 公安机关开展现场监督检查,应当制作监督检查记录,并由开展监督检查的人民警察和监督检查对象的负责人或者网络安全管理人员签名。监督检查对象负责人或者网络安全管理人员对监督检查记录有异议的,应当允许其作出说明;拒绝签名的,人民警察应当在监督检查记录中注明。

公安机关开展远程检测,应当制作监督检查记录,并由二名以上开展监督检查的人民警察在监督检查记录上签名。

委托网络安全服务机构提供技术支持的,技术支持人员应当一并在监督检查记录上签名。

第十九条 公安机关在互联网安全监督检查中,发现互联网服务提供者和联网使用单位存在网络安全风险隐患,应当督促指导其采取措施消除风险隐患,并在监督检查记录上注明;发现有违法行为,但情节轻微或者未造成后果的,应当责令其限期整改。

监督检查对象在整改期限届满前认为已经整改完毕的,可以向公安机关书面提出提前复查申请。

公安机关应当自整改期限届满或者收到监督检查对象提前复查申请之日起三个工作日内,对整改情况进行复查,并在复查结束后三个工作日内反馈复查结果。

第二十条 监督检查过程中收集的资料、制作的各类文书等材料,应当按照规定立卷存档。

第四章 法律责任

第二十一条 公安机关在互联网安全监督检查中,发现互联网服务提供者和联网使用单位有下列违法行为的,依法予以行政处罚:

(一)未制定并落实网络安全管理制度和操作规程,未确定网络安全负责人的,依照《中华人民共和国网络安全法》第五十九条第一款的规定予以处罚;

(二)未采取防范计算机病毒和网络攻击、网络侵入等危害网络安全行为的技术措施的,依照《中华人民共和国网络安全法》第五十九条第一款的规定予以处罚;

(三)未采取记录并留存用户注册信息和上网日志信息措施的,依照《中华人民共和国网络安全法》第五十九条第一款的规定予以处罚;

(四)在提供互联网信息发布、即时通讯等服务中,未要求用户提供真实身份信息,或者对不提供真实身份信息的用户提供相关服务的,依照《中华人民共和国网络安全法》第六十一条的规定予以处罚;

(五)在公共信息服务中对法律、行政法规禁止发布或者传输的信息未依法或者不按照公安机关的要求采取停止传输、消除等处置措施、保存有关记录的,依照《中华人民共和国网络安全法》第六十八条或者第六十九条第一项的规定予以处罚;

(六)拒不为公安机关依法维护国家安全和侦查犯罪的活动提供技术支持和协助的,依照《中华人民共和国网络安全法》第六十九条第三项的规定予以处罚。

有前款第四至六项行为违反《中华人民共和国反恐怖主义法》规定的,依照《中华人民共和国反恐怖主义法》第八十四条或者第八十六条第一款的规定予以处罚。

第二十二条 公安机关在互联网安全监督检查中,发现互联网服务提供者和联网使用单位,窃取或者以其他非法方式获取、非法出售或者非法向他人提供个人信息,尚不构成犯罪的,依照《中华人民共和国网络安全法》第六十四条第二款的规定予以处罚。

第二十三条 公安机关在互联网安全监督检查中,发现互联网服务提供者和联网使用单位在提供的互联网服务中设置恶意程序的,依照《中华人民共和国网络安全法》第六十条第一项的规定予以处罚。

第二十四条 互联网服务提供者和联网使用单位拒绝、阻碍公安机关实施互联网安全监督检查的,依照《中华人民共和国网络安全法》第六十九条第二项的规定予以处罚;拒不配合反恐怖主义工作的,依照《中华人民共和国反恐怖主义法》第九十一条或者第九十二条的规定予以处罚。

第二十五条 受公安机关委托提供技术支持的网络安全服务机构及其工作人员,从事非法侵入监督检查对象网络、干扰监督检查对象网络正常功能、窃取网络数据等危害网络安全的活动的,依照《中华人民共和国网络安全法》第六十三条的规定予以处罚;窃取或者以其他非法方式获取、非法出售或者非法向他人提供在工作中获悉的个人信息的,依照《中华人民共和国网络安全法》第六十四条第二款的规定予以处罚,构成犯罪的,依法追究刑事责任。

前款规定的机构及人员侵犯监督检查对象的商业秘密,构成犯罪的,依法追究刑事责任。

第二十六条 公安机关及其工作人员在互联网安全监督检查工作中,玩忽职守、滥用职权、徇私舞弊的,对直接负责的主管人员和其他直接责任人员依法予以处分;构成犯罪的,依法追究刑事责任。

第二十七条 互联网服务提供者和联网使用单位违反本规定,构成违反治安管理行为的,依法予以治安管理处罚;构成犯罪的,依法追究刑事责任。

第五章 附则

第二十八条 对互联网上网服务营业场所的监督检查,按照《互联网上网服务营业场所管理条例》的有关规定执行。

第二十九条 本规定自2018年11月1日起施行。

Regulations for Internet Security Supervision and Inspection by Public Security Bodies

Posted on Updated on

(Opinion-seeking Draft)

Chapter I: General Principles

Article 1: In order to strengthen and standardize Internet security supervision and inspection work by public security bodies, prevent online law-breaking and crime, safeguard cybersecurity, protect the lawful rights and interests of citizens, legal persons and other organizations, on the basis of the “People’s Police Law of the People’s Republic of China”, the “Cybersecurity Law of the People’s Republic of China” and other such relevant laws and administrative regulations, these Regulations are formulated. Read the rest of this entry »

Announcement concerning Launching a Special Campaign to Attack Online Obscenity and Sexual Information

Posted on Updated on

At present, online obscenity and sexual information has not been stopped despite repeated bans, and has not been eliminated despite repeated bans, this gravely harms the physical and mental health of minors and gravely harms the social atmosphere, all walks of society deeply abhor this, and the popular masses’ calls demanding strict punishment have grown strong. In order to strictly attack the use of the Internet to produce and disseminate obscenity and sexual information, the National “Sweeping Pornography and Striking Illegality” Work Group Office, the State Internet Information Office, the Ministry of Industry and Information Technology and the Ministry of Public Security have decided to launch a “Sweeping Pornography and Striking Illegality – Clean Web 2014” campaign for a united attack on online obscenity and sexual information on a nationwide level. Hereby, the relevant matters are notified as follows: Read the rest of this entry »

Notice concerning Punishing Criminal Activities Infringing Citizens’ Personal Data

Posted on Updated on

GTZ No. [2013]12

All provincial, autonomous region and municipal People’s Courts, People’s Procuratorate, public security offices and bureaus, the Xinjiang Uyghur Autonomous Region Higher People’s Court Production-Construction Corps Branch Court, the Xinjiang Production-Construction Corps People’s Procuratorate and Public Security Bureau:

In recent years, following the rapid development of our country’s economy and the broad spread of information networks, unlawful and criminal infringement of citizens’ personal data has become more prominent every day, there is a flood of illegal trading of citizens’ personal data on the Internet, and as a result, the spread of telecommunications swindles, network swindles, extortion and blackmail, kidnapping and illegal loan repayment demands and other such crimes had become ceaseless despite repeated attacks, social harm is great, and the masses react strongly. In order to effectively restrain and punish criminal infringement of citizens’ personal data, realistically guarantee the security of the broad popular masses’ personal data and their lawful rights and interests, stimulate coordinated social development, and safeguard social harmony and stability, the relevant matters are hereby notified as follows: Read the rest of this entry »

Notice concerning Punishing Criminal Activities of Infringement of Citizens’ Personal Information According to the Law.

Posted on Updated on

GTZ No. [2013]12

All provincial, autonomous region and municipal higher people’s courts and people’s procuratorates, public security offices and bureaus, the Xinjiang Uyghur Autonomous Region Higher People’s Court Production-Construction Corps Branch Court, the Xinjiang Production-Construction Corps people’s procuratorate, public security bureau:

In recent years, following the rapid development of our country’s economy and the broad popularization of information networks, unlawful and criminal infringement of citizens’ personal information has become more prominent every day, there is a flood of illegal sales of citizens’ personal information on the Internet, and the telecommunications fraud, online fraud, extortion and blackmail, kidnapping, illegal demand of loan repayment and other such crimes resulting from this cannot be stopped despite repeated attacks, the social harm is grave, and the masses react strongly against this. In order to effectively curb and punish criminal infringement of citizens’ personal information, realistically guarantee the security of the broad popular masses’ personal information and their lawful rights and interests, stimulate coordinated social development, and safeguard social harmony and stability, hereby, the relevant matters are notified as follows: Read the rest of this entry »

Opinions Concerning Some Questions of Applicable Law in Criminal Intellectual Property Law Infringement Cases

Posted on Updated on

In order to resolve new circumstances and new problems that have been met by public security organs, people’s procuratorates and people’s courts in handling criminal intellectual property rights infringement cases in recent years, punish criminal intellectual property rights infringement activities according to the law, protect socialist market economy order, according to the provisions of the Criminal Law, Criminal Procedure Law and relevant judicial interpretations, integrating investigation, litigation and trial practice, these Opinions are formulated. Read the rest of this entry »

Management Rules for the Security Protection of Internationally Connected Computer Information Networks

Posted on Updated on

(Approved by the State Council on 11 December 1997, promulgated as Ministry of Public Security Decree No. 33 on 16 December 1997, and revised on 8 January 2011 on the basis of the “State Council Decision concerning Abolishing and revising Several Administrative Laws and Regulations”.
Chapter I: General Provisions
Article 1: In order to strengthen the protection of the security of computer information network international interconnection, safeguard public order and social stability, according to the provisions of the “Computer Information System Security Protection Regulations of the People’s Republic of China”, the “Provisional Computer Information Network Management Rules of the People’s Republic of China” and other laws and regulations, these Rules are formulated.
Article 2: These Rules apply to the management of computer information network international interconnection security protection within the borders of the People’s Republic of China
Article 3: The Ministry of Public Security computer management and supervision organs is responsible for management work over computer information network information interconnection security protection. Public security organs’ computer management and supervision organs shall protect the public security of computer information network international interconnections, and safeguard the lawful rights and interests of work units and individuals engaging in international interconnection business, and the public interest.
Article 4: No work unit or individual may use international interconnection to harm national security or divulge State secrets, may not violate the national, social or collective interest or the lawful rights and interests of citizens, and may not engage in unlawful or criminal activities.
Article 5: No work unit or individual may utilize international interconnections to produce, reproduce, consult or disseminate the following information:
(1) inciting resistance, destroying the implementation of the Constitution, laws and administrative regulations;
(2) inciting subversion of State power, toppling the Socialist system;
(3) inciting separatism or destroying national unity;
(4) inciting ethnic hatred, ethnic discrimination or destroying ethnic unity;
(5) concocting or distorting facts, disseminating rumours, disordering social order;
(6) propagating feudal superstition, obscenity, sex, gambling, violence, murder, horror or inciting crime;
(7) brazenly humiliating other persons or concocting facts to slander other persons;
(8) harming the prestige of State organs
(9) other matters violating the Constitution, laws and administrative regulations.
Article 6: No work unit or individual may engage in the following activities endangering computer information network security:
(1) without permission, accessing computer information networks or using computer information network resources;
(2) without permission, conducting deletion, revision or adding to computer information network functions;
(3) without permission, conducting deletion, revision or adding to data stored in, processed or disseminated by computer information networks and application procedures;
(4) wilfully producing or disseminating computer viruses and other destructive processes;
(5) other matters endangering computer information network security.
Article 7: Users’ freedom to communicate and communication secrecy is protected by law. No work unit or individual may violate legal provisions or use international interconnections to violate users’ freedom to communicate and communication secrecy.
Chapter II: The responsibility to protect security
Article 8: Work units and individuals engaging in international interconnection work shall accept security supervision, inspection and guidance from public security organs, truthfully provide information, materials and data documents related to security protection to public security organs, assist with public security organs to investigate and prosecute unlawful and criminal activities of computer information networks through international interconnections.
Article 9: Controlling departments or controlling work units of international entry and exit port channel provision work units, connection work units shall be responsible for security protection management work of international entry and exit port channel and their subordinate interconnection networks according to laws and relevant State regulations.
Article 10: Interconnection work units, access work units and legal persons using computer information network international interconnections and other organizations shall implement the following security protection duties:
(1) being responsible for security protection management work of their networks, establishing and competing security protection management systems;
(2) implementing technological security protection measures, guaranteeing the operational security and information security of their networks;
(3) being responsible for security education and training of their network users;
(4) conducting registration of work units an individual entrusting information dissemination, and conducting examination of the content of the provided information according to Article 5 of these Rules
(5) establishing computer information network electronic announcement system user registration and information management systems;
(6) where discovering one of the circumstances listed in Article 4, Article 5, Article 6 and Article 7 of these Rules, they shall preserve the original relevant records, and report it to the local public security organs within 24 hours;
(7) According to relevant State regulations, deleting addresses and directories containing content as per Article 5 of these Rules or closing servers.
Article 11: Users, when accessing work units to conduct net access formalities, shall fill out a user filing form. The filing form is produced under the supervision of the Ministry of Public Security.
Article 12: Interconnection work units, access work units, legal persons and other organizations (including cross-provincial, autonomous region and municipal interconnection network work units and their subordinate branch organs) using computer information network international interconnections, shall within 30 days of official connection to the network, go to a hearing organ appointed by the provincial, autonomous region or municipal People’s Government public security organ of their locality to carry out filing formalities.
Work units listed in the previous Item shall be responsible for reporting the situation of access work units and users accessing their networks to the public security organs for filing, and timely report changes in the situation of work units and users accessing their network.
Article 13: Those using public or communal access registration shall strengthen management of communal accounts, and establish account use registration systems. User accounts may not be lent or transferred.
Article 14: Work units involved in State affairs, economic construction, national defence construction, scientific and technological frontiers and other important areas, when carrying out filing formalities, shall provide examination and approval certification of their administrative supervision department. The international interconnection of the networks of work units listed in the previous Item, shall adopt corresponding protection measures.
Chapter III: Security supervision
Article 15: Principal, autonomous region and municipal public security offices (bureaus), district (city) and county (city) public opinion bureaus shall have corresponding organs to be responsible for international interconnection security protection management work.
Article 16: Public security organs’ computer management and supervision organs shall grasp the filing situation of interconnection work units, access work units and users, establish filing dossiers, conduct filing statistics, and progressively report this upwards according to relevant State regulations.
Article 17: Public security organs’ computer management and supervision organs shall supervise interconnection work units, access work units and relevant users to establish and complete security protection management systems; supervising and inspecting the network security protection management as well as technology measure implementation situation.
When public security organs’ computer management and supervision organs, when organizing security inspections, related work units shall send people to participate. Public security organ computer management and supervision organs shall put forward opinions for improvement, make detailed records and file them for further reference concerning problems discovered in security inspection.
Article 18: Public security organ computer management and supervision organ discovering addresses, directories or servers containing content listed in Article 5 of these Rules, shall notify the relevant work unit to shut it down or delete it.
Article 19: Public security organ computer supervision and management organs shall be responsible for following, investigating and prosecuting unlawful acts committed through computer information networks and criminal cases related to computer information networks, unlawful and criminal activities violating the provisions of Article 4 and Article 7 of these Rules, shall be transferred to the relevant departments or judicial organs to deal with them according to relevant State regulations.
Chapter IV: Legal responsibility
Article 20: Those violating laws and administrative regulations, with one of the acts listed in Article 5 or Article 6 of these Rules, will be warned by the public security organs, where there is unlawful income, the unlawful income is confiscated, a fine of 5.000 Yuan or less may also be imposed on individuals, and a fine of 50.000 Yuan or less may also be imposed on work units; where circumstances are grave, the punishments of ceasing interconnection for six months or less and shutdown may be imposed, when necessary, it may also be advise that the original permit-issuing or approving organ cancels business permits or cancels interconnection qualification; where it constitutes an act violating public order, it will be punished according to public order management punishment law; where it constitutes a crime, criminal responsibility will be investigated according to the law.
Article 21: Where one of the following acts is present, the public security organ orders rectification within a limited time and issues a warning, where there is unlawful income, the unlawful income is confiscated; where there is no rectification within the provided time limit, the main responsible person and other directly responsible personnel of the work unit may be subject to a fine of 5.000 Yuan or less, and the work unit may be subject to a fine of 50.000 Yuan or less, where circumstances are grave, the punishments of ceasing interconnection for six months or less and shutdown may be imposed, when necessary, it may also be advise that the original permit-issuing or approving organ cancels business permits or cancels interconnection qualification.
(1) not having established security protection management systems;
(2) not having adopted security technology protection measures;
(3) not providing security education and training to network users;
(4) not providing information, materials and data documents needed for security protection measures, or providing untrue content;
(5) not having examined the content of information entrusted for publication or registered the entrusting work unit and individual;
(6) not having established electronic announcement system user registration and information management systems;
(7) not deleting network addresses or directories or shutting down servicers according to relevant State regulations;
(8) not establishing public account use registration systems
(9) Lending or transferring user accounts.
Article 22: Those violating the provisions of Article 4 and Article 7 of these Rules, are punished according to relevant laws and regulations.
Article 23: Those violating the provisions of Article 21 and Article 23 of these Rules, and not implementing filing duties, are punished by the public security organs with a warning or shutting down for rectification for a period not exceeding six months.
Chapter V: Supplementary provisions
Article 24: Security protection management of computer information networks interconnecting with the Hong Kong Special Administrative Region and the Taiwan and Macau regions, are implemented with reference to these Rules.
Article 25: These Rules take effect from the date of promulgation.

计算机信息网络国际联网安全保护管理办法
  (1997年12月11日国务院批准 1997年12月16日公安部令第33号发布 根据2011年1月8日《国务院关于废止和修改部分行政法规的决定》修订)
第一章 总  则
  第一条 为了加强对计算机信息网络国际联网的安全保护,维护公共秩序和社会稳定,根据《中华人民共和国计算机信息系统安全保护条例》、《中华人民共和国计算机信息网络国际联网管理暂行规定》和其他法律、行政法规的规定,制定本办法。
  第二条 中华人民共和国境内的计算机信息网络国际联网安全保护管理,适用本办法。
  第三条 公安部计算机管理监察机构负责计算机信息网络国际联网的安全保护管理工作。
  公安机关计算机管理监察机构应当保护计算机信息网络国际联网的公共安全,维护从事国际联网业务的单位和个人的合法权益和公众利益。
  第四条 任何单位和个人不得利用国际联网危害国家安全、泄露国家秘密,不得侵犯国家的、社会的、集体的利益和公民的合法权益,不得从事违法犯罪活动。
  第五条 任何单位和个人不得利用国际联网制作、复制、查阅和传播下列信息:
  (一)煽动抗拒、破坏宪法和法律、行政法规实施的;
  (二)煽动颠覆国家政权,推翻社会主义制度的;
  (三)煽动分裂国家、破坏国家统一的;
  (四)煽动民族仇恨、民族歧视,破坏民族团结的;
  (五)捏造或者歪曲事实,散布谣言,扰乱社会秩序的;
  (六)宣扬封建迷信、淫秽、色情、赌博、暴力、凶杀、恐怖,教唆犯罪的;
  (七)公然侮辱他人或者捏造事实诽谤他人的;
  (八)损害国家机关信誉的;
  (九)其他违反宪法和法律、行政法规的。
  第六条 任何单位和个人不得从事下列危害计算机信息网络安全的活动:
  (一)未经允许,进入计算机信息网络或者使用计算机信息网络资源的;
  (二)未经允许,对计算机信息网络功能进行删除、修改或者增加的;
  (三)未经允许,对计算机信息网络中存储、处理或者传输的数据和应用程序进行删除、修改或者增加的;
  (四)故意制作、传播计算机病毒等破坏性程序的;
  (五)其他危害计算机信息网络安全的。
  第七条 用户的通信自由和通信秘密受法律保护。任何单位和个人不得违反法律规定,利用国际联网侵犯用户的通信自由和通信秘密。
第二章 安全保护责任
  第八条 从事国际联网业务的单位和个人应当接受公安机关的安全监督、检查和指导,如实向公安机关提供有关安全保护的信息、资料及数据文件,协助公安机关查处通过国际联网的计算机信息网络的违法犯罪行为。
  第九条 国际出入口信道提供单位、互联单位的主管部门或者主管单位,应当依照法律和国家有关规定负责国际出入口信道、所属互联网络的安全保护管理工作。
  第十条 互联单位、接入单位及使用计算机信息网络国际联网的法人和其他组织应当履行下列安全保护职责:
  (一)负责本网络的安全保护管理工作,建立健全安全保护管理制度;
  (二)落实安全保护技术措施,保障本网络的运行安全和信息安全;
  (三)负责对本网络用户的安全教育和培训;
  (四)对委托发布信息的单位和个人进行登记,并对所提供的信息内容按照本办法第五条进行审核;
  (五)建立计算机信息网络电子公告系统的用户登记和信息管理制度;
  (六)发现有本办法第四条、第五条、第六条、第七条所列情形之一的,应当保留有关原始记录,并在24小时内向当地公安机关报告;
  (七)按照国家有关规定,删除本网络中含有本办法第五条内容的地址、目录或者关闭服务器。
  第十一条 用户在接入单位办理入网手续时,应当填写用户备案表。备案表由公安部监制。
  第十二条 互联单位、接入单位、使用计算机信息网络国际联网的法人和其他组织(包括跨省、自治区、直辖市联网的单位和所属的分支机构),应当自网络正式联通之日起30日内,到所在地的省、自治区、直辖市人民政府公安机关指定的受理机关办理备案手续。
  前款所列单位应当负责将接入本网络的接入单位和用户情况报当地公安机关备案,并及时报告本网络中接入单位和用户的变更情况。
  第十三条 使用公用账号的注册者应当加强对公用账号的管理,建立账号使用登记制度。用户账号不得转借、转让。
  第十四条 涉及国家事务、经济建设、国防建设、尖端科学技术等重要领域的单位办理备案手续时,应当出具其行政主管部门的审批证明。
  前款所列单位的计算机信息网络与国际联网,应当采取相应的安全保护措施。
第三章 安 全 监 督
  第十五条 省、自治区、直辖市公安厅(局),地(市)、县(市)公安局,应当有相应机构负责国际联网的安全保护管理工作。
  第十六条 公安机关计算机管理监察机构应当掌握互联单位、接入单位和用户的备案情况,建立备案档案,进行备案统计,并按照国家有关规定逐级上报。
  第十七条 公安机关计算机管理监察机构应当督促互联单位、接入单位及有关用户建立健全安全保护管理制度。监督、检查网络安全保护管理以及技术措施的落实情况。
  公安机关计算机管理监察机构在组织安全检查时,有关单位应当派人参加。公安机关计算机管理监察机构对安全检查发现的问题,应当提出改进意见,作出详细记录,存档备查。
  第十八条 公安机关计算机管理监察机构发现含有本办法第五条所列内容的地址、目录或者服务器时,应当通知有关单位关闭或者删除。
  第十九条 公安机关计算机管理监察机构应当负责追踪和查处通过计算机信息网络的违法行为和针对计算机信息网络的犯罪案件,对违反本办法第四条、第七条规定的违法犯罪行为,应当按照国家有关规定移送有关部门或者司法机关处理。
第四章 法 律 责 任
  第二十条 违反法律、行政法规,有本办法第五条、第六条所列行为之一的,由公安机关给予警告,有违法所得的,没收违法所得,对个人可以并处5000元以下的罚款,对单位可以并处1.5万元以下的罚款;情节严重的,并可以给予6个月以内停止联网、停机整顿的处罚,必要时可以建议原发证、审批机构吊销经营许可证或者取消联网资格;构成违反治安管理行为的,依照治安管理处罚法的规定处罚;构成犯罪的,依法追究刑事责任。
  第二十一条 有下列行为之一的,由公安机关责令限期改正,给予警告,有违法所得的,没收违法所得;在规定的限期内未改正的,对单位的主管负责人员和其他直接责任人员可以并处5000元以下的罚款,对单位可以并处1.5万元以下的罚款;情节严重的,并可以给予6个月以内的停止联网、停机整顿的处罚,必要时可以建议原发证、审批机构吊销经营许可证或者取消联网资格。
  (一)未建立安全保护管理制度的;
  (二)未采取安全技术保护措施的;
  (三)未对网络用户进行安全教育和培训的;
  (四)未提供安全保护管理所需信息、资料及数据文件,或者所提供内容不真实的;
  (五)对委托其发布的信息内容未进行审核或者对委托单位和个人未进行登记的;
  (六)未建立电子公告系统的用户登记和信息管理制度的;
  (七)未按照国家有关规定,删除网络地址、目录或者关闭服务器的;
  (八)未建立公用账号使用登记制度的;
  (九)转借、转让用户账号的。
  第二十二条 违反本办法第四条、第七条规定的,依照有关法律、法规予以处罚。
  第二十三条 违反本办法第十一条、第十二条规定,不履行备案职责的,由公安机关给予警告或者停机整顿不超过6个月的处罚。
第五章 附  则
  第二十四条 与香港特别行政区和台湾、澳门地区联网的计算机信息网络的安全保护管理,参照本办法执行。
  第二十五条 本办法自1997年12月30日起施行。

Notice concerning Strictly Handling Insult and Defamation Cases According to the Law.

Posted on Updated on

3 April 2009

All provincial, autonomous region and municipal public security offices and bureaus, the Xinjiang Production-Construction Corps Public Security Bureau

Since many years, all levels’ public security organs have, according to the relevant provisions of the “Criminal Law” and the “Public Order Management Punishment Law”, inspected and prosecuted a batch of insult and defamation cases, and have contributed to the protection of the personal dignity and reputation of citizens, and safeguarding social public order. But, a small number of local public security organs have, in the process of handling insult and defamation cases, not been able to handle cases strictly and correctly according to the law, which led to the broad attention of news media and all walks of society, engendered a harmful social influence, and damaged the image and law enforcement credibility of public security organs. In order to handle insult and defamation cases strictly according to the law, standardize law enforcement activities, raise case-handling quality, and protect the lawful rights and interests of citizens, hereby, the following relevant issues are notified: Read the rest of this entry »

Opinions concerning Strengthening the Supervision of Internet Mapping and Geographical Information Service Websites

Posted on Updated on

GCTZ No. [2008]1

All provincial, autonomous region and municipal Peoples’ Government, all State Council ministries and commissions, all directly subordinate organs:

Following the progress of satellite positioning technology, remote sensing technology, geographical information system technology and network technology, and development speed of mapping and geographical information services based on the Internet have, at the same time as providing conveniences to people’s work and lives, presented many problems that should not be overlooked. A number of work units and individuals have, in violation of the provision of relevant State laws and regulations, provided unauthorized Internet mapping and geographical information services without qualifications or approval, have published erroneous national maps, and indicated some geographical coordinate information that is sensitive, should not have been published or even involves State secrets. The emergence of these problems has gravely harmed the national interest and threatened national security. In order to strengthen supervision and management of Internet mapping and geographical information service websites, and with the agreement of the State Council, hereby, the following opinions are put forward: Read the rest of this entry »

Management Rules for Multi-Level Protection of Information Security

Posted on Updated on

Notice concerning issuance of the “Management Rules for Multi-Level Protection of Information Security”

All provincial, autonomous region and municipal people’s security departments (bureaus), secrecy protection bureaus, the State Secrets Management Bureau (Office of the State Commission for Encryption Management),the Office of the Leading Group for Informatization, the Xinjiang Production-Construction Corps Public Security Bureau, Secrecy Protection Bureau, State Encryption Management Bureau, and Informatization Leading Group Office, the Secrecy Protection Committee Offices of all ministries and commissions of Centre and State bodies, Encryption Work Leading Group Offices,, Informatization Leading Group Offices, all People’s Organizations’ Secrecy Protection Committee Offices:

In order to accelerate the advance of information security multi-level protection, standardize information security multi-level protection management, raise information security protection capabilities and levels, safeguard national security, social stability and the public interest, safeguard and stimulate informatization construction, the Ministry of Public Security, the State Secrecy Protection Bureau, the State Encryption Management Bureau and the State Council Informatization Work Office have formulated the “Management Rules for Multi-Level Protection of Information Security”. These are hereby issued to you, please implement them earnestly.

Ministry of Public Security
State Secrecy Protection Management Bureau
State Encryption Management Bureau
State Council Informatization Work Office

22 June 2007

Management Rules for Multi-Level Protection of Information Security”

    Chapter I: General provisions

Article 1: In order to standardize information security multi-level protection management, raise information security protection capabilities and levels, safeguard national security, social stability and the public interest, safeguard and stimulate informatization construction, on the basis of the “Computer Information Network Security Protection Regulations of the People’s Republic of China” and other such relevant laws and regulations, these Rules are formulated.

Article 2: Through formulating uniform information security multi-level protection management norms and technical standards, the State organizes citizens, legal persons and other organizations to implement security protection of information systems in a tiered manner, and conducts supervision and management of the implementation of multi-level protection work.

Article 3: Public security bodies are responsible for the supervision, inspection and guidance of information security multi-level protection work. The State secrecy protection work department is responsible for the supervision, inspection and guidance of secrecy protection-related work in multi-level protection work. The State encryption management department is responsible for the supervision, inspection and guidance of encryption-related work in multi-level protection work. Matters affecting other functional departments’ scope of jurisdiction will be managed by the relevant functional department according to the provisions of State laws and regulations. The State Council Informatization Work Office and local informatization leading group office bodies are responsible for the interdepartmental coordination of multi-level protection work.

Article 4: Departments in charge of information systems shall, according to these Rules and related norms and standards, supervise, inspect and guide information security multi-level protection work concerning work units operating and using information systems within their sector, their department or their locality.

Article 5: Work units operating and using information systems shall, according to these Rules and related norms and standards, fulfil information security multi-level protection duties and responsibilities.

Chapter II: Tier division and protection

Article 6: National information security multi-level protection upholds the principles of self-classification and self-protection. The security protection tier of an information system shall be determined on the basis of the degree of importance of the information system for national security, economic construction and social life, the degree of harm to national security, social order, the public interest as well as the lawful rights and interests of citizens, legal persons and other organizations if the information system is destroyed, and other such factors.

Article 7: Security protection tiers for information systems are divided into the following five levels:

The first tier, after the information system is destroyed, harm is inflicted upon the lawful rights and interests of citizens, legal persons and other organizations, but national security, social order and the public interest are not endangered;

The second tier, after the information system is destroyed, grave harm is done to the lawful rights and interests of citizens, legal persons and other organizations, or harm is inflicted upon social order and the public interest, but national security is not harmed.

The third tier, after the information system is destroyed, grave harm is done to social order and the public interest, or harm is inflicted upon national security.

The fourth tier, after the information system is destroyed, especially grave harm is inflicted upon social order and the public interest, or grave harm is inflicted upon national security

The fifth tier, after the information system is destroyed, especially grave harm is inflicted upon national security.

Article 8: Work units operating and using information systems implement protection of information systems on the basis of these Rules and related technical standards, relevant State information security supervision and management departments implement supervision and management of information security multi-level protection work.

Work units operating and using first-tier information systems shall implement protection on the basis of relevant State management norms and technical standards.

Work units operating and using second-tier information systems shall implement protection on the basis of relevant State management norms and technical standards. State information security supervision and management departments conduct guidance over information security multi-level protection work of information systems in this tier.

Work units operating and using third-tier information systems shall implement protection on the basis of relevant State management norms and technical standards. State information security supervision and management departments conduct supervision and inspection of information security multi-level protection work of information systems in this tier.

    Work units operating and using fourth-tier information systems shall implement protection on the basis of relevant State management norms, technical standards and special operational requirements. State information security supervision and management departments conduct mandatory supervision and inspection of information security multi-level protection work of information systems in this tier.

    Work units operating and using fifth-tier information systems shall implement protection on the basis of relevant State management norms, technical standards and special operational security requirements. State-appointed specialized bodies conduct specialized supervision and inspection of information security multi-level protection work of information systems in this tier.

Chapter III: Implementation and management of multi-level protection

Article 9: Work units operating and using information systems shall concretely implement multi-level protection work according to the “Information System Security Multi-Level Protection Implementation Guidelines.

Article 10: Work units operating and using information systems shall determine information systems’ security protection tier on the basis of these Rules and the “Information System Security Multi-Level Protection Implementation Guidelines”. Where there is a competent department, they shall undergo verification and approval by the competent department.

Information systems operating across provinces or uniformly nationwide may have their security protection tier determined uniformly by the competent department.

Where an information system is planned to be determined as fourth-tier or higher, operating and using work units or competent departments shall request the National Information Security Protection Tier Expert Assessment Committee to assess the matter.

    Article 11: After an information system’s security protection tier has been determined, the operating and using work unit shall use information technology products conform to relevant national regulations that satisfy the requirements of its information system security protection tier, according to State information security multi-level protection management norms and technical standards, and carry out information system security construction or reconstruction work.

    Article 12: In the process of information system construction, operating and using work units shall simultaneously construct information security facilities conform to the requirements of their tier according to the “Computer Information System Security Protection Tier Division Standards” (GB17859-1999), the “Basic Requirements for Information System Security Multi-Level Protection” and other such basic standards, and with reference to the “Information Security Technology – Common Security Technology Requirements for Information Systems” (GB/T20271-2006), “Information Security Technology – Basic Network Security Technology Requirements”(GB/T20270-2006), “Information Security Technology – Operating System Security Technology Requirements”(GB/T20272-2006), “Information Security Technology – Database Management System Security Technology Requirements”(GB/T20273-2006),“Information Security Technology – Server Technology Requirements”, “Information Security Technology – Terminal Computer System Security Multi-Level Technology Requirements” (GA/T671-2006) and other such technical standards.

    Article 13: Operating and using work units shall formulate and implement security management structures conform to the requirements of their system’s security protection tier, with reference to the “Information Security Technology – Information System Security Management Requirements” (GB/T20269-2006), “Information Security Technology – Information System Security Project Management Requirements” (GB/T20282-2006), “Basic Requirements for Information System Security Multi-Level Protection” and other such management standards.

    Article 14: After the construction of information systems is completed, operating and using work units or their competent departments shall choose an assessment body meeting the conditions provided in these Rules, to regularly conduct tier assessment of the information system’s security tier status on the basis of the “Information System Security Multi-Level Protection Assessment Requirements”. Third-tier information systems shall undergo tier assessment at least once every year, fourth-tier information systems shall undergo tier assessment at least once every half year, fifth-tier information systems shall undergo tier assessment on the basis of specialized security requirements.

Work units operating and using information systems and their competent departments shall regularly conduct inspections of information systems’ security status, security protection structures and the implementation status of measures. Third tier information systems shall undergo self-inspection at least once every year, fourth-tier information systems shall undergo self-inspection at least once every half year, fifth-tier information systems shall undergo self-inspection on the basis of specialized security requirements.

Where, through assessment or self-inspection, an information system’s security status does not meet their security protection tier’s requirements, operating and using work units shall formulate plans and rectify the matter.

Article 15: For already operating (running) second-tier and higher information systems their operating and using work unit shall, within 30 days after determination of the security protection tier, conduct filing formalities with the city-level or higher public security body of their locality.

For newly-built second-tier and higher information systems, their operating and using work unit shall, within 30 days after entering operations, conduct filing formalities with the city-level or higher public security bodies of their locality.

For work units subordinate to the Centre in Beijing, with information systems operating across provinces or in a national uniformly networked manner, whose tiers are uniformly determined by a competent department, the competent department conducts filing formalities with the Ministry of Public Security. For branch systems of information systems operating across provinces or in a nationwide uniformly networked manner that operate or are used in various localities, filing shall be submitted to the local city-level or higher public security body.

    Article 16: When conducting information security multi-level protection filing formalities an “Information System Security Multi-Level Protection Filing Form” shall be filled out, and the following materials shall simultaneously be submitted for third-tier and higher information systems: (1) system topologies, structures and explanations; (2) system security organization bodies and management structures; (3) system security protection equipment design and implementation plans and reconstruction implementation plans; (4) a list of information security products used on the system and their certification, and proof of sales licences; (5) a technical inspection and assessment report of post-assessment conformity to the system security protection tier; (6) an assessment opinion from the Information Security Protection Tier Expert Assessment Committee; (7) an opinion from the competent department on the examination, verification and approval of information system security protection tiers.

    Article 17: After information systems have been filed, public security bodies shall conduct examination and verification of the information system’s filing status, to those conforming to tier protection requirements, they shall issue an information system security multi-level protection filing certificate within ten working days after receiving the filing materials; where they discover [an information system] does not conform to these Rules and relevant standards, they shall notify the filing work unit within ten working days after receiving the filing materials and allow them to correct the matter; where they discover tier determination is inaccurate, they shall notify the filing work unit within ten working days after receiving the filing materials to examine and determine the matter again.

    Operating and using work units or competent departments shall, after determining an information system’s tier again, submit a new filing with the public security bodies according to these Rules.   

Article 18: Public security departments receiving filings shall conduct an inspection of the information security multi-level protection work status in work units operating and using third-tier and fourth-tier information systems. They shall inspect third-tier information systems at least once every year, and inspect fourth-tier information systems at least once every half year. The inspection of information systems operating across provinces or in a nationwide uniform manner, shall be conducted in coordination with its competent department. 

The inspection of fifth-tier information systems shall be conducted by a State-appointed specialized department.

    Public security bodies and state-appointed specialized departments shall inspect the following matters: (1) whether or not a change has occurred in the information system’s security needs, and the originally determined protection tier is still accurate; (2) the implementation status of the operating and using work unit’s security management structures and methods; (3) the inspection status by operating and using work units of information system security circumstances; (4) whether a system’s security tier assessment conforms to requirements;(5) whether the use of information security products conforms to requirements; (6) the status of information system security improvements; (7) the compliance status of filing materials with operating and using work units and information systems; (8) other matters that shall be subject to supervision and inspection.

    Article 19: Work units operating and using information systems shall accept security supervision, inspection and guidance from public security bodies and State-appointed specialized departments, and accurately provide the following relevant information materials and data files on information security protection to public security bodies and State-appointed specialized departments: (1) changes of status in an information system’s filing items; (2) changes of status in security organization and personnel; (3) changes of status in information security management structures and methods; (4) records of the information system’s operational status; (5) regular inspection records by operating and using work units and their competent departments of the security status of their information system; (6) technical assessment reports of tier assessments conducted on information systems;(7) changes of status in information security products used; (8) information security incident emergency response plans, information security incident emergency response deployment result reports; (9) information system security construction and reconstruction result reports.

    Article 20: Where public security inspections discover that an information system’s security protection status does not comply with information security multi-level protection-related management norms and technical standards, they shall issue a correction notice to operating and using work units. Operating and using work units shall, on the basis of the requirements of the correction notice, conduct correction according to management norms and technical standards. After the correction is completed, they shall file the correction reports with the public security bodies. When necessary, public security bodies may organize inspection of the correction status.

    Article 21: Third-tier and higher information systems shall choose and use information security products meeting the following conditions: (1) the work unit developing and producing the product is invested in by Chinese citizens or legal persons, or State-invested or controlled, and has autonomous legal person qualifications within the borders of the People’s Republic of China; (2) the core technologies and critical components of the product have our country’s indigenous intellectual property rights; (3) the work unit developing and manufacturing the product and the main operational and technical personnel have no criminal records; (4) the work unit developing and manufacturing the product states that they have not willfully left or installed loopholes, back doors, Trojans and other such programmes and functions; (5) it does not constitute a risk to national security, social order and the public interest; (6) where they are already listed in information security product certification catalogues, a certification letter issued by the national information security product certification body shall be obtained.

    Article 22: Third-tier or higher information systems shall choose a multi-level protection assessment body meeting the following conditions to conduct assessment: (1) being registered and established within the borders of the People’s Republic of China (except the Hong Kong, Macau and Taiwan regions); (2) being an enterprise or undertaking work unit invested in by Chinese citizens or Chinese legal persons, or be State-invested or State-controlled (except the Hong Kong, Macau and Taiwan regions); (3) having engaged in related assessment and monitoring work for two years or more, and not having a record of violations of the law; (4) work personnel is limited to Chinese citizens; (5) legal persons and the main operational and technical personnel have no criminal records; (6) technical equipment and facilities used shall conform to the requirements in these Rules on information security products; (7) having complete secrecy protection management, project management, quality management, personnel management, training management and other such security management structures; (8) not constituting a threat to national security, social order and the public interest.

    Article 23: Bodies engaging in information system security tier assessment shall implement the following duties: (1) abiding by relevant State laws and regulations, and technical standards, providing secure, objective and fair assessment and evaluation services, guaranteeing the quality and efficacy of assessment; (2) protecting the State secrets, commercial secrets and personal privacy they learn in the process of assessment activities; (3) conducting security and secrecy protection education for assessment personnel, signing security and secrecy protection letters of responsibility with them, and providing that they shall implement security and secrecy protection duties and bear legal liability, and are responsible for inspecting their implementation.

    Chapter IV: Tiered protection and management of State secret-related information systems

Article 14: Secrecy-related information systems shall be protected on the basis of the basic requirements of national information security multi-level protection, according to the management norms and technical standards of the State secrecy protection work department concerning tiered protection of secrecy-related information systems, and in integration with the actual status of the system. State secret information may not be processed on non-secrecy-related information systems.

Article 25: Secrecy-related information systems will, according to the highest classification level of the information they process, be divided into three tiers, from high to low: secret, top secret and absolute secret.

Work units constructing and using secrecy-related information systems shall determine system tiers on the basis of determining secrecy through information norms, on the basis of secrecy-related information system tiered protection management rules and the State secrecy protection standard BMB17-2006 “Technical Requirements for Tiered Protection of Computer Information Systems Involving State Secrets”. With regard to secrecy-related information systems containing multiple security areas, protection tiers may be determined separately for every security area.

    Secrecy protection work departments and bodies shall supervise and guide work units building and using secrecy-related information systems, and reasonably conduct system tier determination.

    Article 26: Work units constructing and using secrecy-related information systems shall timely report their secrecy-related information tier determination and construction and use status to their operational competent department’s secrecy protection work body and the secrecy protection work department responsible for system examination and approval for filing, and accept the supervision, inspection and guidance of secrecy protection departments.

    Article 27: Work units constructing and using secrecy-related information systems shall choose a work unit holding secrecy-related integration qualifications to undertake or participate in the design and implementation of secrecy-related information systems.

    Work units constructing and operating secrecy-related information systems shall conduct planning and design on the basis of secrecy-related information system tiered protection management norms and technical standards, according to the different requirements of the three tiers of secret, top secret and absolute secret, and in integration of systems’ reality, and implement tiered protection, their protection levels in general is not lower than the third-tier, fourth-tier and fifth-tier levels of national information security multi-level protection.

    Article 28: Domestic products shall, in principle, be chosen for information security secrecy protection products used in secrecy-related information systems, these shall pass inspections conducted by examination bodies authorized by the State Secrets Protection Bureau on the basis of State secret protection-related standards, products that have passed examination will be listed in a catalogue examined and published by the State Secrets Protection Bureau.

    Article 29: Work units constructing and using secrecy-related information systems shall, after the system’s project implementation is concluded, put forward an application with the secrecy protection work department, for a system assessment body authorized by the State Secrets Protection Bureau to conduct a secrecy protection assessment of the secrecy-related information system on the basis of national secrecy protection standard BMB22-2007 “Assessment Guidelines for the Tiered Protection of Computer Information Systems Involving State Secrets”.

    Work units constructing and using secrecy-related in information systems shall, before the system is put into use, apply with the city-level or higher secrecy protection work department for system examination and approval to be conducted according to the “Management Regulations for the Examination and Approval of Information Systems Involving State Secrets”, secrecy-related information systems may only be put into use after passing examination and approval. For secrecy-related information systems already put into use, their constructing and using work unit shall, after completing the system’s reconstruction according to tiered protection requirements, file the matter with the secrecy protection work department.

    Article 30: Work units constructing and using secrecy-related information systems shall, when applying for system examination and approval or filing, submit the following materials: (1) the system’s design, implementation plan and inspection analysis result; (2) certification materials of the qualifications of the work unit building the system; (3) a report of the system’s construction and project supervision status; (4) a report of the system’s security and secrecy protection inspection and assessment; (5) the status of system security and secrecy protection organization bodies and management structures; (6) other relevant materials.

    Article 31: When a change occurs in the secrecy tier, scope of connection, environmental facilities, main functioning, or responsible work units for security and secrecy protection management of secrecy-related information systems, the work units constructing or using them shall timely report the matter to the secrecy protection work department responsible for examination and approval. The secrecy protection work department shall, on the basis of the actual circumstances, decide whether or not to conduct assessment, examination and approval again.

    Article 32: Work units constructing and using secrecy-related information systems shall, on the basis of State secrecy protection standard BMB20-2007 “Management Norms for the Tiered Protection of Information Systems Involving State Secrets”, strengthen secrecy protection management in the operations of secrecy-related information systems, regularly conduct risk assessments, and eliminate leaks, vulnerabilities and loopholes.

Article 33: The national and all local levels’ secrecy protection work departments will implement supervision and management over tiered protection work of secrecy-related information systems of all localities and all departments, and complete the following work: (1) guiding, supervising and inspection the conduct of tiered protection work; (2) guiding work units operating and using secrecy-related information systems in standardizing information secrecy determination, and rationally determining systems’ protection tier; (3) participating in the analysis of secrecy-related information system tiered protection plans, guiding constructing and using work units to perform simultaneous planning and design of secrecy-protection equipment; (4) conducting supervision and management according to the law over work units with integration qualifications for secrecy-related information systems; (5) strictly conducting system assessment, examination and approval work, supervising and inspection the implementation status of tiered protection management structures and technical measures of work units constructing and using secrecy-related information system; (6) strengthening secrecy protection and inspection of secrecy-related information systems during operations. Secrecy protection inspection or system assessments are conducted at least once every two years for secret and top secret information systems, secrecy protection inspection or system assessments are conducted at least once every year for absolute secret information systems; (7)understanding and grasping the management and use status of secrecy-related information systems at all levels and of all categories, timely discovering, investigating and handling all kinds of acts violating laws and regulations and leakage incidents.

Chapter V: Encryption management in information security multi-level protection 

Article 34: The national encryption management department conducts categorized and tiered management of information security multi-level protection. On the basis of role and degree of importance of the protection counterpart in national security, social stability and economic construction, the protection counterpart’s security protection requirements and degree of involvement with secrets, the degree of harm after the destruction of the protection counterpart as well as the nature of encryption-using departments, etc., tiered protection norms for encryption are determined.

Work units operating and using information systems using encryption to conduct tiered protection shall abide by the “Information Security Multi-Level Protection Encryption Management Rules”, the “Technological Requirements for Commercial Encryption in Information Security Multi-Level Protection” and other such encryption management regulations and related standards.

Article 35: The installation, use and management of encryption in information system security multi-level protection shall strictly implement related State provisions concerning encryption management.

Article 36: Work units operating and using information systems shall fully use encryption technology to protect information systems. Where encryption is adopted to conduct protection of information and information systems involving State secrets, they shall report to the National Encryption Management Bureau for examination and approval, the design, implementation, use, operations, maintenance and daily management of encryption, etc., shall be executed according to State encryption management-related regulations and related standards; where encryption is adopted to protect information and information systems not involving State secrets, it must abide by the “Commercial Encryption Management Regulations” and regulations related to tiered and categorized encryption management and related standards, the installation and use status of encryption shall be reported to the national encryption management body for filing.

    Article 37: Where encryption technology is used to conduct tiered system protection construction or reconstruction of information systems, encryption products that passed approval for use approval for sale by the national encryption management departments must be adopted, foreign import or unauthorized, self-developed encryption products may not be used; without approval, it is prohibited to use imported information technology products containing encryption functions.

    Article 8: Assessment work of encryption in information systems and encryption equipment is conducted by an assessment body recognized by the State Encryption Management Bureau, no other department, work unit or individual may conduct encryption assessment or monitoring.

Article 39: All levels’ encryption management departments may, on a regular or non-regular basis, conduct inspections and assessments of the encryption installation, use and management status in information systems’ multi-level protection work, the encryption installation, use and management status of important secrecy-related information systems will be inspected and assessed at least once every two years. Where, in the process of supervision and inspection, the existence is discovered of security vulnerabilities, violations of encryption management-related regulations, or non-achievement of encryption-related standard requirements, the matters shall be handled according to State encryption management-related regulations.

    Chapter VI: Legal liability

Article 40: Where third-tier or higher work units operating and using information systems violating the provisions of these Rules, and one of the following acts is present, the public security body, State secrecy protection work department and State encryption work management department will, according to their respective duties and responsibilities, order them to correct the matter within a limited time; where they have not corrected the matter within this time, they will receive a warning, and the situation will be reported to their higher-level competent department, suggesting the directly responsible persons in charge and other directly responsible personnel is punished, and the punishment outcomes are to be timely reported back: (1) not having filed or undergone examination and approval according to these Rules; (2) not implementing security management structures and measures according to these Rules; (3) not conducting system security status inspections according to the provisions of these Rules; (4) not conducting system security technical monitoring according to the provisions of these Rules; (5) after receiving a correction notification, refusing to correct; (6) not choosing and using information security products and assessment bodies according to the provisions of these Rules; (7)not accurately providing relevant documents and certification materials according to the provisions of these Rules; (8) violating secrecy protection management regulations; (9) violating encryption management regulations; (10) violating other provisions of these Rules.

Where the violation of the provisions in the previous Paragraph results in grave harm, the relevant department imposes punishment according to relevant laws and regulations.

    Article 41: Where information security supervision and management departments and their work personnel, during the implementation of their supervision and management duties, commit dereliction of duties, abuse their powers, or engage in embezzlement or malpractice, they will be subject to administrative punishment according to the law; where it constitutes a crime, criminal liability is prosecuted according to the law. 

    Chapter VII: Supplementary provisions

Article 42: Operating and using work units already operating information systems will determine the security protection tier of the information system within 180 days after these Rules take effect; and determine the security protection tier of newly-built information in the design and planning phase.  

Article 43: “Or higher” as mentioned in these Rules includes the number (or tier) in question.

    Article 44: These Rules take effect on the date of promulgation, the “Information Security Multi-Level Protection Management Rules (Trial)” (GTZ No. [2006]7 are abolished at the same time.

关于印发《信息安全等级保护管理办法》的通知

各省、自治区、直辖市公安厅(局)、保密局、国家密码管理局(国家密码管理委员会办公室)、信息化领导小组办公室,新疆生产建设兵团公安局、保密局、国家密码管理局、信息化领导小组办公室,中央和国家机关各部委保密委员会办公室、密码工作领导小组办公室、信息化领导小组办公室,各人民团体保密委员会办公室:

    为加快推进信息安全等级保护,规范信息安全等级保护管理,提高信息安全保障能力和水平,维护国家安全、社会稳定和公共利益,保障和促进信息化建设,公安部、国家保密局、国家密码管理局、国务院信息化工作办公室制定了《信息安全等级保护管理办法》。现印发给你们,请认真贯彻执行。

公安部    国家保密局          

国家密码管理局   国务院信息工作办公室

 二〇〇七年六月二十二日            

信息安全等级保护管理办法

    第一章 总则

    第一条 为规范信息安全等级保护管理,提高信息安全保障能力和水平,维护国家安全、社会稳定和公共利益,保障和促进信息化建设,根据《中华人民共和国计算机信息系统安全保护条例》等有关法律法规,制定本办法。

    第二条 国家通过制定统一的信息安全等级保护管理规范和技术标准,组织公民、法人和其他组织对信息系统分等级实行安全保护,对等级保护工作的实施进行监督、管理。

    第三条 公安机关负责信息安全等级保护工作的监督、检查、指导。国家保密工作部门负责等级保护工作中有关保密工作的监督、检查、指导。国家密码管理部门负责等级保护工作中有关密码工作的监督、检查、指导。涉及其他职能部门管辖范围的事项,由有关职能部门依照国家法律法规的规定进行管理。国务院信息化工作办公室及地方信息化领导小组办事机构负责等级保护工作的部门间协调。

    第四条 信息系统主管部门应当依照本办法及相关标准规范,督促、检查、指导本行业、本部门或者本地区信息系统运营、使用单位的信息安全等级保护工作。

    第五条 信息系统的运营、使用单位应当依照本办法及其相关标准规范,履行信息安全等级保护的义务和责任。

    第二章 等级划分与保护

    第六条 国家信息安全等级保护坚持自主定级、自主保护的原则。信息系统的安全保护等级应当根据信息系统在国家安全、经济建设、社会生活中的重要程度,信息系统遭到破坏后对国家安全、社会秩序、公共利益以及公民、法人和其他组织的合法权益的危害程度等因素确定。

    第七条 信息系统的安全保护等级分为以下五级:

    第一级,信息系统受到破坏后,会对公民、法人和其他组织的合法权益造成损害,但不损害国家安全、社会秩序和公共利益。

    第二级,信息系统受到破坏后,会对公民、法人和其他组织的合法权益产生严重损害,或者对社会秩序和公共利益造成损害,但不损害国家安全。

    第三级,信息系统受到破坏后,会对社会秩序和公共利益造成严重损害,或者对国家安全造成损害。

    第四级,信息系统受到破坏后,会对社会秩序和公共利益造成特别严重损害,或者对国家安全造成严重损害。

    第五级,信息系统受到破坏后,会对国家安全造成特别严重损害。

    第八条 信息系统运营、使用单位依据本办法和相关技术标准对信息系统进行保护,国家有关信息安全监管部门对其信息安全等级保护工作进行监督管理。

    第一级信息系统运营、使用单位应当依据国家有关管理规范和技术标准进行保护。

    第二级信息系统运营、使用单位应当依据国家有关管理规范和技术标准进行保护。国家信息安全监管部门对该级信息系统信息安全等级保护工作进行指导。

    第三级信息系统运营、使用单位应当依据国家有关管理规范和技术标准进行保护。国家信息安全监管部门对该级信息系统信息安全等级保护工作进行监督、检查。

    第四级信息系统运营、使用单位应当依据国家有关管理规范、技术标准和业务专门需求进行保护。国家信息安全监管部门对该级信息系统信息安全等级保护工作进行强制监督、检查。

    第五级信息系统运营、使用单位应当依据国家管理规范、技术标准和业务特殊安全需求进行保护。国家指定专门部门对该级信息系统信息安全等级保护工作进行专门监督、检查。

    第三章 等级保护的实施与管理

    第九条 信息系统运营、使用单位应当按照《信息系统安全等级保护实施指南》具体实施等级保护工作。

    第十条 信息系统运营、使用单位应当依据本办法和《信息系统安全等级保护定级指南》确定信息系统的安全保护等级。有主管部门的,应当经主管部门审核批准。

    跨省或者全国统一联网运行的信息系统可以由主管部门统一确定安全保护等级。

    对拟确定为第四级以上信息系统的,运营、使用单位或者主管部门应当请国家信息安全保护等级专家评审委员会评审。

    第十一条 信息系统的安全保护等级确定后,运营、使用单位应当按照国家信息安全等级保护管理规范和技术标准,使用符合国家有关规定,满足信息系统安全保护等级需求的信息技术产品,开展信息系统安全建设或者改建工作。

    第十二条 在信息系统建设过程中,运营、使用单位应当按照《计算机信息系统安全保护等级划分准则》(GB17859-1999)、《信息系统安全等级保护基本要求》等技术标准,参照《信息安全技术 信息系统通用安全技术要求》(GB/T20271-2006)、《信息安全技术 网络基础安全技术要求》(GB/T20270-2006)、《信息安全技术 操作系统安全技术要求》(GB/T20272-2006)、《信息安全技术 数据库管理系统安全技术要求》(GB/T20273-2006)、《信息安全技术 服务器技术要求》、《信息安全技术 终端计算机系统安全等级技术要求》(GA/T671-2006)等技术标准同步建设符合该等级要求的信息安全设施。

    第十三条 运营、使用单位应当参照《信息安全技术 信息系统安全管理要求》(GB/T20269-2006)、《信息安全技术 信息系统安全工程管理要求》(GB/T20282-2006)、《信息系统安全等级保护基本要求》等管理规范,制定并落实符合本系统安全保护等级要求的安全管理制度。

    第十四条 信息系统建设完成后,运营、使用单位或者其主管部门应当选择符合本办法规定条件的测评机构,依据《信息系统安全等级保护测评要求》等技术标准,定期对信息系统安全等级状况开展等级测评。第三级信息系统应当每年至少进行一次等级测评,第四级信息系统应当每半年至少进行一次等级测评,第五级信息系统应当依据特殊安全需求进行等级测评。

    信息系统运营、使用单位及其主管部门应当定期对信息系统安全状况、安全保护制度及措施的落实情况进行自查。第三级信息系统应当每年至少进行一次自查,第四级信息系统应当每半年至少进行一次自查,第五级信息系统应当依据特殊安全需求进行自查。

    经测评或者自查,信息系统安全状况未达到安全保护等级要求的,运营、使用单位应当制定方案进行整改。

    第十五条 已运营(运行)的第二级以上信息系统,应当在安全保护等级确定后30日内,由其运营、使用单位到所在地设区的市级以上公安机关办理备案手续。

    新建第二级以上信息系统,应当在投入运行后30日内,由其运营、使用单位到所在地设区的市级以上公安机关办理备案手续。

    隶属于中央的在京单位,其跨省或者全国统一联网运行并由主管部门统一定级的信息系统,由主管部门向公安部办理备案手续。跨省或者全国统一联网运行的信息系统在各地运行、应用的分支系统,应当向当地设区的市级以上公安机关备案。

    第十六条 办理信息系统安全保护等级备案手续时,应当填写《信息系统安全等级保护备案表》,第三级以上信息系统应当同时提供以下材料:(一)系统拓扑结构及说明;(二)系统安全组织机构和管理制度;(三)系统安全保护设施设计实施方案或者改建实施方案; (四)系统使用的信息安全产品清单及其认证、销售许可证明; (五)测评后符合系统安全保护等级的技术检测评估报告;(六)信息系统安全保护等级专家评审意见;(七)主管部门审核批准信息系统安全保护等级的意见。

    第十七条 信息系统备案后,公安机关应当对信息系统的备案情况进行审核,对符合等级保护要求的,应当在收到备案材料之日起的10个工作日内颁发信息系统安全等级保护备案证明;发现不符合本办法及有关标准的,应当在收到备案材料之日起的10个工作日内通知备案单位予以纠正;发现定级不准的,应当在收到备案材料之日起的10个工作日内通知备案单位重新审核确定。

    运营、使用单位或者主管部门重新确定信息系统等级后,应当按照本办法向公安机关重新备案。

    第十八条 受理备案的公安机关应当对第三级、第四级信息系统的运营、使用单位的信息安全等级保护工作情况进行检查。对第三级信息系统每年至少检查一次,对第四级信息系统每半年至少检查一次。对跨省或者全国统一联网运行的信息系统的检查,应当会同其主管部门进行。

    对第五级信息系统,应当由国家指定的专门部门进行检查。

    公安机关、国家指定的专门部门应当对下列事项进行检查:(一) 信息系统安全需求是否发生变化,原定保护等级是否准确;(二) 运营、使用单位安全管理制度、措施的落实情况;(三) 运营、使用单位及其主管部门对信息系统安全状况的检查情况;(四) 系统安全等级测评是否符合要求;(五) 信息安全产品使用是否符合要求; (六) 信息系统安全整改情况;(七) 备案材料与运营、使用单位、信息系统的符合情况;(八) 其他应当进行监督检查的事项。

    第十九条 信息系统运营、使用单位应当接受公安机关、国家指定的专门部门的安全监督、检查、指导,如实向公安机关、国家指定的专门部门提供下列有关信息安全保护的信息资料及数据文件:(一) 信息系统备案事项变更情况;(二) 安全组织、人员的变动情况;(三) 信息安全管理制度、措施变更情况;(四) 信息系统运行状况记录;(五) 运营、使用单位及主管部门定期对信息系统安全状况的检查记录;(六) 对信息系统开展等级测评的技术测评报告; (七) 信息安全产品使用的变更情况;(八) 信息安全事件应急预案,信息安全事件应急处置结果报告; (九) 信息系统安全建设、整改结果报告。

    第二十条 公安机关检查发现信息系统安全保护状况不符合信息安全等级保护有关管理规范和技术标准的,应当向运营、使用单位发出整改通知。运营、使用单位应当根据整改通知要求,按照管理规范和技术标准进行整改。整改完成后,应当将整改报告向公安机关备案。必要时,公安机关可以对整改情况组织检查。

    第二十一条 第三级以上信息系统应当选择使用符合以下条件的信息安全产品:(一)产品研制、生产单位是由中国公民、法人投资或者国家投资或者控股的,在中华人民共和国境内具有独立的法人资格;(二)产品的核心技术、关键部件具有我国自主知识产权;(三)产品研制、生产单位及其主要业务、技术人员无犯罪记录; (四)产品研制、生产单位声明没有故意留有或者设置漏洞、后门、木马等程序和功能;(五)对国家安全、社会秩序、公共利益不构成危害;(六)对已列入信息安全产品认证目录的,应当取得国家信息安全产品认证机构颁发的认证证书。

    第二十二条 第三级以上信息系统应当选择符合下列条件的等级保护测评机构进行测评:(一) 在中华人民共和国境内注册成立(港澳台地区除外);(二) 由中国公民投资、中国法人投资或者国家投资的企事业单位(港澳台地区除外);(三) 从事相关检测评估工作两年以上,无违法记录;(四) 工作人员仅限于中国公民;(五) 法人及主要业务、技术人员无犯罪记录;(六) 使用的技术装备、设施应当符合本办法对信息安全产品的要求; (七) 具有完备的保密管理、项目管理、质量管理、人员管理和培训教育等安全管理制度;(八) 对国家安全、社会秩序、公共利益不构成威胁。

    第二十三条 从事信息系统安全等级测评的机构,应当履行下列义务:(一)遵守国家有关法律法规和技术标准,提供安全、客观、公正的检测评估服务,保证测评的质量和效果;(二)保守在测评活动中知悉的国家秘密、商业秘密和个人隐私,防范测评风险;(三)对测评人员进行安全保密教育,与其签订安全保密责任书,规定应当履行的安全保密义务和承担的法律责任,并负责检查落实。

    第四章 涉及国家秘密信息系统的分级保护管理

    第二十四条 涉密信息系统应当依据国家信息安全等级保护的基本要求,按照国家保密工作部门有关涉密信息系统分级保护的管理规定和技术标准,结合系统实际情况进行保护。非涉密信息系统不得处理国家秘密信息。

    第二十五条 涉密信息系统按照所处理信息的最高密级,由低到高分为秘密、机密、绝密三个等级。

    涉密信息系统建设使用单位应当在信息规范定密的基础上,依据涉密信息系统分级保护管理办法和国家保密标准BMB17-2006《涉及国家秘密的计算机信息系统分级保护技术要求》确定系统等级。对于包含多个安全域的涉密信息系统,各安全域可以分别确定保护等级。

    保密工作部门和机构应当监督指导涉密信息系统建设使用单位准确、合理地进行系统定级。

    第二十六条 涉密信息系统建设使用单位应当将涉密信息系统定级和建设使用情况,及时上报业务主管部门的保密工作机构和负责系统审批的保密工作部门备案,并接受保密部门的监督、检查、指导。

    第二十七条 涉密信息系统建设使用单位应当选择具有涉密集成资质的单位承担或者参与涉密信息系统的设计与实施。

    涉密信息系统建设使用单位应当依据涉密信息系统分级保护管理规范和技术标准,按照秘密、机密、绝密三级的不同要求,结合系统实际进行方案设计,实施分级保护,其保护水平总体上不低于国家信息安全等级保护第三级、第四级、第五级的水平。

    第二十八条 涉密信息系统使用的信息安全保密产品原则上应当选用国产品,并应当通过国家保密局授权的检测机构依据有关国家保密标准进行的检测,通过检测的产品由国家保密局审核发布目录。

    第二十九条 涉密信息系统建设使用单位在系统工程实施结束后,应当向保密工作部门提出申请,由国家保密局授权的系统测评机构依据国家保密标准BMB22-2007《涉及国家秘密的计算机信息系统分级保护测评指南》,对涉密信息系统进行安全保密测评。

    涉密信息系统建设使用单位在系统投入使用前,应当按照《涉及国家秘密的信息系统审批管理规定》,向设区的市级以上保密工作部门申请进行系统审批,涉密信息系统通过审批后方可投入使用。已投入使用的涉密信息系统,其建设使用单位在按照分级保护要求完成系统整改后,应当向保密工作部门备案。

    第三十条 涉密信息系统建设使用单位在申请系统审批或者备案时,应当提交以下材料:(一)系统设计、实施方案及审查论证意见;(二)系统承建单位资质证明材料;(三)系统建设和工程监理情况报告;(四)系统安全保密检测评估报告;(五)系统安全保密组织机构和管理制度情况;(六)其他有关材料。

    第三十一条 涉密信息系统发生涉密等级、连接范围、环境设施、主要应用、安全保密管理责任单位变更时,其建设使用单位应当及时向负责审批的保密工作部门报告。保密工作部门应当根据实际情况,决定是否对其重新进行测评和审批。

    第三十二条 涉密信息系统建设使用单位应当依据国家保密标准BMB20-2007《涉及国家秘密的信息系统分级保护管理规范》,加强涉密信息系统运行中的保密管理,定期进行风险评估,消除泄密隐患和漏洞。

    第三十三条 国家和地方各级保密工作部门依法对各地区、各部门涉密信息系统分级保护工作实施监督管理,并做好以下工作:(一)指导、监督和检查分级保护工作的开展;(二)指导涉密信息系统建设使用单位规范信息定密,合理确定系统保护等级;(三)参与涉密信息系统分级保护方案论证,指导建设使用单位做好保密设施的同步规划设计;(四)依法对涉密信息系统集成资质单位进行监督管理;(五)严格进行系统测评和审批工作,监督检查涉密信息系统建设使用单位分级保护管理制度和技术措施的落实情况;(六)加强涉密信息系统运行中的保密监督检查。对秘密级、机密级信息系统每两年至少进行一次保密检查或者系统测评,对绝密级信息系统每年至少进行一次保密检查或者系统测评;(七)了解掌握各级各类涉密信息系统的管理使用情况,及时发现和查处各种违规违法行为和泄密事件。

    第五章 信息安全等级保护的密码管理

    第三十四条 国家密码管理部门对信息安全等级保护的密码实行分类分级管理。根据被保护对象在国家安全、社会稳定、经济建设中的作用和重要程度,被保护对象的安全防护要求和涉密程度,被保护对象被破坏后的危害程度以及密码使用部门的性质等,确定密码的等级保护准则。

    信息系统运营、使用单位采用密码进行等级保护的,应当遵照《信息安全等级保护密码管理办法》、《信息安全等级保护商用密码技术要求》等密码管理规定和相关标准。

    第三十五条 信息系统安全等级保护中密码的配备、使用和管理等,应当严格执行国家密码管理的有关规定。

    第三十六条 信息系统运营、使用单位应当充分运用密码技术对信息系统进行保护。采用密码对涉及国家秘密的信息和信息系统进行保护的,应报经国家密码管理局审批,密码的设计、实施、使用、运行维护和日常管理等,应当按照国家密码管理有关规定和相关标准执行;采用密码对不涉及国家秘密的信息和信息系统进行保护的,须遵守《商用密码管理条例》和密码分类分级保护有关规定与相关标准,其密码的配备使用情况应当向国家密码管理机构备案。

    第三十七条 运用密码技术对信息系统进行系统等级保护建设和整改的,必须采用经国家密码管理部门批准使用或者准于销售的密码产品进行安全保护,不得采用国外引进或者擅自研制的密码产品;未经批准不得采用含有加密功能的进口信息技术产品。

    第三十八条 信息系统中的密码及密码设备的测评工作由国家密码管理局认可的测评机构承担,其他任何部门、单位和个人不得对密码进行评测和监控。

    第三十九条 各级密码管理部门可以定期或者不定期对信息系统等级保护工作中密码配备、使用和管理的情况进行检查和测评,对重要涉密信息系统的密码配备、使用和管理情况每两年至少进行一次检查和测评。在监督检查过程中,发现存在安全隐患或者违反密码管理相关规定或者未达到密码相关标准要求的,应当按照国家密码管理的相关规定进行处置。

    第六章 法律责任

    第四十条 第三级以上信息系统运营、使用单位违反本办法规定,有下列行为之一的,由公安机关、国家保密工作部门和国家密码工作管理部门按照职责分工责令其限期改正;逾期不改正的,给予警告,并向其上级主管部门通报情况,建议对其直接负责的主管人员和其他直接责任人员予以处理,并及时反馈处理结果: (一) 未按本办法规定备案、审批的;(二) 未按本办法规定落实安全管理制度、措施的;(三) 未按本办法规定开展系统安全状况检查的;(四) 未按本办法规定开展系统安全技术测评的;(五) 接到整改通知后,拒不整改的;(六) 未按本办法规定选择使用信息安全产品和测评机构的;(七) 未按本办法规定如实提供有关文件和证明材料的;(八) 违反保密管理规定的;(九) 违反密码管理规定的;(十) 违反本办法其他规定的。

    违反前款规定,造成严重损害的,由相关部门依照有关法律、法规予以处理。

    第四十一条 信息安全监管部门及其工作人员在履行监督管理职责中,玩忽职守、滥用职权、徇私舞弊的,依法给予行政处分;构成犯罪的,依法追究刑事责任。

    第七章 附则

    第四十二条 已运行信息系统的运营、使用单位自本办法施行之日起180日内确定信息系统的安全保护等级;新建信息系统在设计、规划阶段确定安全保护等级。

    第四十三条 本办法所称“以上”包含本数(级)。

    第四十四条 本办法自发布之日起施行,《信息安全等级保护管理办法(试行)》(公通字[2006]7号)同时废止。 

Notice concerning Strengthening Governance over Peddlers and Street Stalls Selling Pirated and Illegal Products and Unlicensed Operations and Activities

Posted on Updated on

All provincial, autonomous region and municipal “Sweeping Pornography and Striking Illegality” work leading small group offices, public security offices (bureaus), construction offices (committees), cultural offices (bureaus), press and publications bureaus, industry and commerce bureau, the Xinjiang Production-Construction Corps Public Security Bureaus: Read the rest of this entry »

Notice Concerning Launching a Concentrated Campaign Attacking Pirated Audiovisual and Computer Software Products

Posted on Updated on

All provincial, autonomous region and municipal “Sweeping Pornography and Striking Illegality” leading small group offices, Party Committee Propaganda Departments, Politico-legal committees, culture offices (bureaus), press and publications bureaus, copyright bureaus, industry and commerce bureaus, industry and commerce bureaus, public security offices (bureaus), construction offices (commissions), supervision offices (bureaus): Read the rest of this entry »

Announcement concerning Launching the Anti-Piracy Hundred Days Campaign

Posted on Updated on

All provincial, autonomous region and municipal “Sweeping Pornography and Striking Illegality” work leading small groups, culture offices (bureaus), press and publications bureaus, copyright bureaus, industry and commerce bureaus, public security offices(bureaus), construction offices (committees), supervision offices (bureaus):

Read the rest of this entry »

Public Security Bureau, National Copyright Administration Temporary Regulations Concerning Strengthening Cooperation and Coordination in the Attack Work on Unlawful and Criminal Copyright Infringement

Posted on Updated on

Promulgated on 26 March 2006

Article 1: In order to strengthen the coordination and cooperation of Public Security organs and the copyright administrative management entities (hereafter named “both parties”), to severely attack unlawful and criminal acts of copyright infringement, to protect the copyright and related rights of the authors of literary, artistic and scientific works, and to stimulate the development and prospering of cultural and scientific enterprises, these Regulations are formulated in accordance with the “Criminal Law of the People’s Republic of China”, the “Copyright Law of the People’s Republic of China”, the “Regulations on Transfer of Suspected Criminal Cases by Administrative Enforcement Entities” and related laws and regulations. Read the rest of this entry »

Coordinated Work Plan for Internet Site Management

Posted on Updated on

Notice concerning Printing and Issuing the “Coordinated Work Plan for Internet Site Management”

17 February 2006

All provincial, autonomous region and municipal Party Committee Propaganda Departments, telecommunications management bureaus, information offices, education offices (education commissions), cultural offices (bureaus), public security offices (bureaus), national security offices (bureaus), radio, film and television bureaus, press and publications bureaus, secrecy preservation bureaus, administrative industry and commerce management bureaus, food and drug supervision and management bureaus (drug supervision and management bureaus):

On the basis of the uniform deployment of the Centre, relevant departments launched joint and concentrated clean-up and rectification work of Internet sites between November 2004 and June 2005. In this concentrated campaign, all departments resolutely grasped implementation according to the “Plan for the Centralized Launch of Internet Site Clean-Up and Rectification Work”, acted vigorously, cooperated closely, accumulated certain experiences in coordinated work, and laid a firm basis for further doing daily supervision and management work of the Internet well. Read the rest of this entry »

Information Security Multi-Level Protection Management Rules (Trial)

Posted on Updated on

Ministry of Public Security, National Administration of State Secrets Protection, State Cryptography Administration, Staten Council Informatization Work Office

17 January 2006

(GTZ No. [2006]7)

Chapter I: General Provisions

Article 1: In order to strengthen information security multi-level protection, standardize information security multi-level protection management, raise information security protection capabilities and levels, safeguard national security, social stability and the public interest, ensure and stimulate informatization construction, on the basis of national relevant laws and regulations such as the “Computer and Information System Security Protection Regulations of the People’s Republic of China”, these Rules are formulated.

Article 2: Information security multi-level protection refers to implementing security protection in a tiered manner for national secrets information and proprietary information of citizens, legal persons and other organizations as well as the information systems storing, transmitting and processing this information, implementing tiered management of information security products used in information systems, and responding to and handling information security incidents occurring on information systems in a tiered manner. 

Article 3: Security protection tiers of information systems shall be determined on the basis of the degree of importance of the information and information system in national security, economic construction and social life, the degree of harm to national security, social order, the public interest as well as the lawful rights and interests of citizens, legal persons and other organizations if the information or information systems are destroyed, the basic security protection levels the information and information systems should reach, and other such factors.

Article 4: Security protection tiers for information systems are divided into the following five levels:

(1) The first tier is the self-protection tier, it applies to ordinary information system where, after they are destroyed, harm is created to the lawful rights and interests of citizens, legal persons and other organizations, but national security, social order and the public interest is not harmed.

(2) The second tier is the guided protection tier, it applies to ordinary information systems where, after they are destroyed, light harm is created to social order and the public interest, but national security is not harmed.

(3) The third tier is the supervised protection tier, it applies to important information systems involving national security, social order and the public interest where, after they are destroyed, harm is created to national security, social order and the public interest.

(4) The fourth tier is the mandatory protection tier, it applies to important information systems involving national security, social order and the public interest where, after they are destroyed, grave harm is created to national security, social order and the public interest.

(5) The fifth tier is the special control protection level, it applies to core sub-systems of important information systems involving national security, social order and the public interest where, after they are destroyed, especially grave harm is created to national security, social order and the public interest.

Article 5: Information system operating and using work units and individual conduct protection of information system according to these Rules and related technical standards, relevant State information security functional departments conduct supervision and management over information security multi-level protection work.

(1) First-tier information system operating and using work units or individuals may conduct protection on the basis of State management norms and technical standards.

(2) Second-tier information system operating and using work units or individuals shall conduct protection on the basis of State management norms and technical standards. When necessary, relevant State information security functional departments may conduct guidance over their information security multi-level protection work.

(3) Third-tier information system operating and using work units shall conduct protection on the basis of State management norms and technical standards, relevant State information security functional departments conduct supervision and inspection of their information security multi-level protection work.

(4) Fourth-tier information system operating and using work units shall conduct protection on the basis of State management norms and technical standards, relevant State information security functional departments conduct mandatory supervision and inspection of their information security multi-level protection work.

(5) Fifth-tier information system operating and using work units shall conduct protection on the basis of State management norms and technical standards, State-appointed specialized departments or specialized bodies conduct specialized supervision and inspection of their information security multi-level protection work.

Article 6: Public security bodies are responsible for the supervision, inspection and guidance of information security multi-level protection work. State secrecy protection work departments are responsible for the supervision, inspection and guidance of state secret-related work in information security multi-level protection work. State encryption management departments are responsible for the supervision, inspection and guidance of encryption-related work in information security multi-level protection work. 

Matters involving the scope of jurisdiction of other functional departments are managed by the relevant department according to the provisions of State laws and regulations.

The State Council Informatization Work Office and local informatization leading group office bodies are responsible for interdepartmental coordinating of multi-level protection work.

Chapter II: Information security multi-level protection work security management

Article 7: Information system operating and using work units shall, on the basis of these Rules and relevant standards, determine the security protection tier of information systems. Where they have a competent department, they shall report to the competent department for examination and approval.

Article 8: Information system operating and using work units shall conduct information system construction, on the basis of already determined security protection tiers, according to these Rules and relevant technical standards, and use information technology products that conform to relevant State regulations and satisfy information system security protection tier requirements.

Article 9: Information system operating and using work units shall implement the following security multi-level protection duties and responsibilities:

(1) Implementing responsible departments and personnel for information security multi-level protection, to be responsible for information system security multi-level protection management work;

(2) Establishing and completing security multi-level protection management structures;

(3) Implementing the requirements of security multi-level protection technical standards;

(4) Regularly conducting security state monitoring and risk assessment;

(5) Establishing information security incident tiered response and processing systems;

(6) Being responsible for security multi-level protection education and training of information system users;

(7) Other security multi-level protection duties and responsibilities they should fulfil.

Article 10: After information system constructions are complete, their operating and using work unit shall, on the basis of these Rules, select a monitoring work unit holding relevant State technical qualifications and security qualifications, to conduct security monitoring according to technical standards, and only when they conform to requirements, may they be put into use.

Article 11: Work units engaging in information security security tiered monitoring shall abide by the provisions of relevant State laws and regulations, and technical standards, protect State secrets, commercial secrets and personal privacy they learn during monitoring activities, and provide secure, objective and fair monitoring and assessment services.

Monitoring work unit qualification management rules will be formulated separately by relevant departments.

Article 12: Third-tier and higher information system operating and using work units shall, within 30 days from the day of starting the operation of a system, go to a receiving body appointed by the local provincial, autonomous region or municipal public security body to conduct filing procedures, and fill out an “Information System Security Protection Tier Filing Registration Form”. Except where the State has provided otherwise.

When a change occurs in the filed matter, the information system operating and using work unit or their competent department shall report the changed circumstances to the original filing body within 30 days after the day of change.

Article 13: Public security bodies shall grasp the filing situation of information system operating and using work units, establish file dossiers, and conduct filing management. Where someone is discovered not to follow these Regulations and other relevant standards, they shall notify them and order rectification.

Article 14: Public security bodies shall supervise and inspect the situation of security multi-level protection duties and responsibilities fulfilled by work units operating and using third-tier and fourth-tier information systems.

Information systems of a third-tier security protection level will be subject to at least one inspection per year, information system of a fourth-tier protection level shall be inspected at least once every half year.

Article 15: Where public security bodies discover an information system operating or using work unit has not fulfilled security multi-level protection duties and responsibilities, or has not met security protection requirements, they shall notify them in writing and have them rectify.

Chapter III: Secrecy protection management in information security multi-level protection

Article 16: Information systems involving state secrets shall conduct protection on the basis of the basic requirements of State information security multi-level protection, according to management regulations of the State secrecy protection work department on secret-related information systems’ tiered protection and technical standards, an in integration with the actual situation of the system. 

Information systems not involving State secrets may not process State secret information.

Article 17: Information systems involving State secrets will be divided into three levels from high to low, secret-level, top secret-level and absolute secret-level, according to the highest secrecy level of the information they process, their overall protection levels will respectively not be lower than the requirements for the third tier, fourth tier and fifth tier.

Work units constructing information systems involving State secrets shall determine the highest secrecy level of the information the system processes and the protection tier of the system according to the “Law for the Protection of State Secrets of the People’s Republic of China” and relevant State regulations concerning secrets and the concrete scope of their secrecy levels.

Article 18: The design and implementation, examination, approval and filing, operation and maintenance, and daily secrecy protection management of information systems involving State secrets will be implemented according to relevant State regulations on secrecy protection work and technical standards.

Article 19: All levels’ secrecy protection work departments shall organize inspection and assessment of information systems involving State secrets they put into use. Where they discover that security vulnerabilities exist on the system or technical protection measures to not conform to tiered protection management regulations and technical standards, they shall notify the system-using work unit and management department for rectification within a limited time.

Information systems of the secret or top secret-level will be subject to secrecy protection inspection or system assessment at least once per two years; absolute secret-level information systems will be subject to secrecy protection inspection or system assessment at least once per year.

Chapter IV: Information security multi-level protection encryption management

Article 20: The State encryption management department will conduct categorized and tiered management of information security multi-level protection encryption. On the basis of the role and degree of importance of the protected counterpart in national security, social stability and economic construction, the protected counterpart’s security protection requirements and degree of involvement with secrets, the degree of harm after the destruction of the protected counterpart as well as the nature of the encryption-using department, etc., encryption protection tiering norms will be determined.

Where an information system operating or using work units adopts encryption to conduct tiered protection, they shall abide by information security multi-level protection encryption management regulations and related standards.

Article 21: The provision, use and management of encryption in information security multi-level protection shall strictly implement relevant State regulations on encryption management.

Article 22: Encryption technology must be fully used to protect information systems. Where encryption is adopted to protect information and information systems involving State secrets, the design, implementation, use, operation, maintenance and daily management of the encryption shall be executed according to relevant State regulations on encryption management and technical standards; where encryption is used to protect information and information systems not involving State secrets, the “Commercial Encryption Management Regulations”, categorized and tiered encryption-related regulations and relevant technical standards must be followed.

Article 23: All levels’ encryption management departments may, at regular or irregular intervals, conduct inspection and assessment of the provision, use and management of encryption in information security multi-level protection work, they will conduct inspection and assessment of the provision, use and management of encryption on important secret-related information systems at least once every two years. Where they discover the existence of security vulnerabilities, violations of encryption management-related regulations or failure to meet the requirements of encryption-related standards in the process of supervision and inspection, the matter will be dealt with according to State encryption management-related regulations. 

Chapter V: Legal liability

Article 24: Where the competent departments and operating or using work units of third-tier or fourth-tier information systems and State secret-related information systems violate the provisions of these Rules, and one of the following acts is present, resulting in grave harm, the relevant department will handle the matter according to relevant laws and regulations:

(1) Not reporting for filing, examination and approval according to these Rules;

(2) Not conducting system security facility construction and structural construction according to the requirements of multi-level protection technology standards;

(3) Refusing rectification after receiving rectification notices;

(4) Violating secrecy protection management regulations;

(5) Violating encryption management regulations;

(6) Violating these Rules and other regulations.

Chapter VI: Supplementary provisions

Article 25: Military computer information system security protection work will be executed according to relevant military regulations

Article 26: These Management Rules take effect on 1 March 2006.

信息安全等级保护管理办法(试行)

  (公安部公通字[2006]7号文件颁布) 
  第一章 总则
  第一条 为加强信息安全等级保护,规范信息安全等级保护管理,提高信息安全保障能力和水平,维护国家安全、社会稳定和公共利益,保障和促进信息化建设,根据《中华人民共和国计算机信息系统安全保护条例》等国家有关法律法规,制定本办法。
  第二条 信息安全等级保护,是指对国家秘密信息及公民、法人和其他组织的专有信息以及公开信息和存储、传输、处理这些信息的信息系统分等级实行安全保护,对信息系统中使用的信息安全产品实行按等级管理,对信息系统中发生的信息安全事件分等级响应、处置。
  第三条 信息系统的安全保护等级应当根据信息和信息系统在国家安全、经济建设、社会生活中的重要程度,信息和信息系统遭到破坏后对国家安全、社会秩序、公共利益以及公民、法人和其他组织的合法权益的危害程度,信息和信息系统应当达到的基本的安全保护水平等因素确定。
  第四条 信息系统的安全保护等级分为以下五级:
  (一) 第一级为自主保护级,适用于一般的信息系统,其受到破坏后,会对公民、法人和其他组织的合法权益产生损害,但不损害国家安全、社会秩序和公共利益。
  (二) 第二级为指导保护级,适用于一般的信息系统,其受到破坏后,会对社会秩序和公共利益造成轻微损害,但不损害国家安全。
  (三) 第三级为监督保护级,适用于涉及国家安全、社会秩序和公共利益的重要信息系统,其受到破坏后,会对国家安全、社会秩序和公共利益造成损害。
  (四) 第四级为强制保护级,适用于涉及国家安全、社会秩序和公共利益的重要信息系统,其受到破坏后,会对国家安全、社会秩序和公共利益造成严重损害。
  (五) 第五级为专控保护级,适用于涉及国家安全、社会秩序和公共利益的重要信息系统的核心子系统,其受到破坏后,会对国家安全、社会秩序和公共利益造成特别严重损害。
  第五条 信息系统运营、使用单位及个人依据本办法和相关技术标准对信息系统进行保护,国家有关信息安全职能部门对其信息安全等级保护工作进行监督管理。
  (一) 第一级信息系统运营、使用单位或者个人可以依据国家管理规范和技术标准进行保护。
  (二) 第二级信息系统运营、使用单位应当依据国家管理规范和技术标准进行保护。必要时,国家有关信息安全职能部门可以对其信息安全等级保护工作进行指导。
  (三) 第三级信息系统运营、使用单位应当依据国家管理规范和技术标准进行保护,国家有关信息安全职能部门对其信息安全等级保护工作进行监督、检查。
  (四) 第四级信息系统运营、使用单位应当依据国家管理规范和技术标准进行保护,国家有关信息安全职能部门对其信息安全等级保护工作进行强制监督、检查。
  (五) 第五级信息系统运营、使用单位应当依据国家管理规范和技术标准进行保护,国家指定的专门部门或者专门机构对其信息安全等级保护工作进行专门监督、检查。
  第六条 公安机关负责信息安全等级保护工作的监督、检查、指导。国家保密工作部门负责等级保护工作中有关保密工作的监督、检查、指导。国家密码管理部门负责等级保护工作中有关密码工作的监督、检查、指导。
  涉及其他职能部门管辖范围的事项,由有关职能部门依照国家法律法规的规定进行管理。
  国务院信息化工作办公室及地方信息化领导小组办事机构负责等级保护工作的部门间协调。
  第二章 信息安全等级保护工作的安全管理
  第七条 信息系统的运营、使用单位应当依据本办法和有关标准,确定信息系统的安全保护等级。有主管部门的,应当报主管部门审核批准。
  第八条 信息系统的运营、使用单位应当根据据已确定的安全保护等级,依照本办法和有关技术标准,使用符合国家有关规定,满足信息系统安全保护等级需求的信息技术产品,进行信息系统建设。
  第九条 信息系统的运营、使用单位应当履行下列安全等级保护职责:
  (一) 落实信息安全等级保护的责任部门和人员,负责信息系统的安全等级保护管理工作;
  (二) 建立健全安全等级保护管理制度;
  (三) 落实安全等级保护技术标准要求;
  (四) 定期进行安全状况检测和风险评估;
  (五) 建立信息安全事件的等级响应、处置制度;
  (六) 负责对信息系统用户的安全等级保护教育和培训;
  (七) 其他应当履行的安全等级保护职责。
  第十条 信息系统建设完成后,其运营、使用单位应当依据本办法选择具有国家相关技术资质和安全资质的测评单位,按照技术标准进行安全测评,符合要求的,方可投入使用。
  第十一条 从事信息系统安全等级测评的单位,应当遵守国家有关法律法规和技术标准规定,保守在测评活动中知悉的国家秘密、商业秘密和个人隐私,提供安全、客观、公正的检测评估服务。
  测评单位资质管理办法由有关部门另行制定。
  第十二条 第三级以上信息系统的运营、使用单位应当自系统投入运行之日起三十日内,到所在地的省、自治区、直辖市公安机关指定的受理机构办理备案手续,填写《信息系统安全保护等级备案登记表》。国家另有规定的除外。
  备案事项发生变更时,信息系统运营、使用单位或其主管部门应当自变更之日起三十日内将变更情况报原备案机关。
  第十三条 公安机关应当掌握信息系统运营、使用单位的备案情况,建立备案档案,进行备案管理。发现不符合本办法及有关标准的,应通知其予以纠正。
  第十四条 公安机关应当监督、检查第三级和第四级信息系统运营、使用单位履行安全等级保护职责的情况。
  对安全保护等级为三级的信息系统每年至少检查一次,对安全保护等级为四级的信息系统每半年至少检查一次。
  第十五条 公安机关发现信息系统运营、使用单位未履行安全等级保护职责或未达到安全保护要求的,应当书面通知其整改。
  第三章 信息安全等级保护的保密管理
  第十六条 涉及国家秘密的信息系统应当依据国家信息安全等级保护的基本要求,按照国家保密工作部门涉密信息系统分级保护的管理规定和技术标准,结合系统实际情况进行保护。
  不涉及国家秘密的信息系统不得处理国家秘密信息。
  第十七条 涉及国家秘密的信息系统按照所处理信息的最高密级,由低到高划分为秘密级、机密级和绝密级三个级别,其总体防护水平分别不低于三级、四级、五级的要求。
  涉及国家秘密的信息系统建设单位应当依据《中华人民共和国保守国家秘密法》和国家有关秘密及其密级具体范围的规定,确定系统处理信息的最高密级和系统的保护级别。
  第十八条 涉及国家秘密的信息系统的设计实施、审批备案、运行维护和日常保密管理,按照国家保密工作部门的有关规定和技术标准执行。
  第十九条 各级保密工作部门应当对已投入使用的涉及国家秘密的信息系统组织检查和测评。发现系统存在安全隐患或系统保护措施不符合分级保护管理规定和技术标准的,应当通知系统使用单位和管理部门限期整改。
  对秘密级、机密级信息系统,每两年至少进行一次保密检查或系统测评;对绝密级信息系统,每年至少进行一次保密检查或系统测评。
  第四章 信息安全等级保护的密码管理
  第二十条 国家密码管理部门对信息安全等级保护的密码实行分类分级管理。根据被保护对象在国家安全、社会稳定、经济建设中的作用和重要程度,被保护对象的安全防护要求和涉密程度,被保护对象被破坏后的危害程度以及密码使用部门的性质等,确定密码的等级保护准则。
  信息系统运营、使用单位采用密码进行等级保护的,应当遵照信息安全等级保护密码管理规定和相关标准。
  第二十一条 信息系统安全等级保护中密码的配备、使用和管理等,应严格执行国家密码管理的有关规定。
  第二十二条 要充分运用密码技术对信息系统进行保护。采用密码对涉及国家秘密的信息和信息系统进行保护的,密码的设计、实施、使用、运行维护和日常管理等,应当按照国家密码管理有关规定和技术标准执行;采用密码对不涉及国家秘密的信息和信息系统进行保护的须遵照《商用密码管理条例》和密码分类分级保护有关规定与相关标准。
  第二十三条 各级密码管理部门可以定期或者不定期对信息系统等级保护工作中密码配备、使用和管理的情况进行检查和测评,对重要涉密信息系统的密码配备、使用和管理情况每两年至少进行一次检查和测评。 在监督检查过程中,发现存在安全隐患或违反密码管理相关规定或者未达到密码相关标准要求的,按照国家密码管理的相关规定进行处置。
  第五章 法律责任
  第二十四条 三级、四级信息系统和涉及国家秘密的信息系统的主管部门和运营、使用单位违反本办法规定,有下列行为之一,造成严重损害的,由相关部门依照有关法律、法规予以处理:
  (一) 未按本办法规定报请备案、审批的;
  (二) 未按等级保护技术标准要求进行系统安全设施建设和制度建设的;
  (三) 接到整改通知后,拒不整改的;
  (四) 违反保密管理规定的;
  (五) 违反密码管理规定的;
  (六) 违反本办法和其他规定的。
  第六章 附则
  第二十五条 军队的计算机信息系统安全保护工作,按照军队的有关法规执行。
  第二十六条 本管理办法自2006年3月1日起施行。

Regulations on Internet Security Protection Technology Measures

Posted on Updated on

Ministry of Public Security Decree

No. 82

The “Regulations on Internet Security Protection Technology Measures” have been passed on the Ministerial Business Meeting of the Ministry of Public Security on 23 November 2005, are hereby promulgated, and take effect on 1 March 2006.

13 December 2005

Regulations on Internet Security Protection Technology Measures Read the rest of this entry »

Notice Concerning Further Deepening Internet Cafe Management Work

Posted on Updated on

Ministry of Culture

State Administration of Industry and Commerce

Ministry of Public Security

Ministry of Information Industry

Ministry of Education

Ministry of Finance

State Council

Legal System Office

Central Civilization Office

Communist Youth League Centre Read the rest of this entry »