Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.
The Cybersecurity Law of the People's Republic of China is a law designed to ensure cybersecurity, data protection, and data localization. It defines security obligations for network operators and service providers and establishes rules for data management and cross-border data transfer .
The Cybersecurity Law of the People's Republic of China was enacted on November 7, 2016 and implemented on June 1, 2017. The law aims to enhance cybersecurity, data protection and data localization in the interest of national security. It establishes the principle of cyberspace sovereignty and defines the security obligations of internet product and service providers, as well as internet service providers.
It includes rules for personal information protection, a security system for critical information infrastructure. It also requires network operators to store select data within China and allows Chinese authorities to conduct spot-checks on a company's network operations.
Below you'll find all of the requirements of this framework. In Cyberday, we map all requirement to global tasks, making multi-compliance management easy. Do it once, and see the progress across all frameworks!
The electronic information sent by and application software provided by any individual or organization shall neither be installed with malwares, nor contain any information whose publication or transmission is prohibited by laws and administrative regulations.
Electronic information distribution service providers and application software download service providers shall fulfill their security administration duties; and where the said providers learn that their users have conducted behaviors stipulated in the preceding paragraph, they shall stop the provision of services, take disposal measures such as deletion, keep relevant records and report the same to the relevant competent departments.












The relevant departments of the people's governments at provincial level or above may hold an interview with the legal representatives or principals of the network operators in accordance with prescribed authorizations and procedures upon discovery of relatively high security risks or security incidents on the network. Network operators shall take measures to effect rectification and eliminate hidden dangers as required.












For the occurrence of cybersecurity incidents, it is necessary to activate contingency plans for cybersecurity incidents immediately, investigate and assess such incidents, require network operators to take technical measures and other necessary measures to eliminate potential security hazards, prevent expansion of the harm, and promptly issue warning information in relation to the public to society.












Explore our comprehensive resources and improve your security with the themes of this framework.
Discover specific ways our platform streamlines your ISO 27001 compliance process, from automated controls to audit preparation.
Explore use caseTake our comprehensive assessment to identify gaps in your current implementation and get personalized recommendations.
Start assessmentDive deeper with our articles, case studies, and expert insights on framework implementation.
Read articleGet a concise overview of all requirements, controls, and implementation steps in our quick guide.
Get the guideSee how the overlap and differences with any other framework to optimize your compliance strategy.
Compare frameworkParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarUnderstand the basics of cyber security frameworks with our comprehensive guide.
Read the articleWhen building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.
Sets the overall compliance standard or regulation your organization needs to follow.
Break down the framework into specific obligations that must be met.
Concrete actions and activities your team carries out to satisfy each requirement.
Documented rules and practices that are created and maintained as a result of completing tasks.
