PSB

Determination Rules on Acts of Collecting and Using Personal Information in Violation of Rules and Regulations in Apps

Posted on Updated on

Notice concerning Issuance of the “Determination Rules on Acts of Collecting and Using Personal Information in Violation of Rules and Regulations in Apps”

All provincial, autonomous region, municipal and the Xinjiang Production-Construction Corps cybersecurity and informatization offices, telecommunications management bureaus, public security offices (bureaus), market supervision and management bureaus (offices, committees):

On the basis of the “Announcement concerning a Special Campaign on Collection and Use of Personal Information in Violation of Rules and Regulations in Apps”, in order to provide reference for the determination of acts of collecting and using personal information in violations of rules and regulations in apps, implement laws and regulations such as the “Cybersecurity Law”, etc., the Cyberspace Administration of China, Ministry of Industry and Information Technology, Ministry of Public Security, and State Administration of Market Regulation have jointly formulated the “Determination Rules on Acts of Collecting and Using Personal Information in Violation of Rules and Regulations in Apps”. These are hereby issued to you, please refer to and implement them in integration with supervision, management and law enforcement work realities.

Cyberspace Administration of China Secretariat

Ministry of Industry and Information Technology General Office

Ministry of Public Security General Office

State Administration for Market Regulation General Office

28 November 2019

Determination Rules on Acts of Collecting and Using Personal Information in Violation of Rules and Regulations in Apps

On the basis of the “Announcement concerning a Special Campaign on Collection and Use of Personal Information in Violation of Rules and Regulations in Apps”, in order to provide reference for the determination of acts of collecting and using personal information in violations of rules and regulations in apps, provide guidance for app operators’ self-inspection and self-rectification as well as netizens’ social supervision, and implement laws and regulations such as the “Cybersecurity Law”, these Rules are formulated.

I, The following acts may be determined as “not publishing collection and use norms”

1. There is no privacy policy in the app, or the privacy policy does not contain norms on the collection and use of personal information;

2. When using the app for the first time, users are not prompted to read privacy policies and other such norms on collection and use through a pop-up window and other such clear methods

3. The privacy policy and other such collection and use norms are difficult to access, for instance when after entering the app’s main interface, 4 clicks or other such manipulations are required before it can be accessed;

4. The privacy policy and other such collection and use norms are difficult to read, for instance because characters are too small and closely spaced, colours are too light, they are blurred and unclear, or no simplified Mandarin version is provided.

II, The following acts may be determined as “not indicating the objective, method and scope of collecting and using personal information”

1. Not listing the objective, method and scope of personal information collection and use in the app (including entrusted third parties or embedded third-party code and plug-ins) one by one;

2. When a change occurs in the objective, method and scope of personal information collection and use, not notifying the user in an appropriate manner, appropriate manners include revising the privacy policy and other such collection and use norms and alerting the user to read it;

3. When requesting to activate authorization of collectable personal information, or requesting to collect users’ identity card number, bank account number, geographical tracking and other such sensitive personal information, not simultaneously notifying the user about its objective, or having an unclear or difficult to understand objective.

4. Content related to collection and use norms is obscure and difficult to understand, verbose and overly detailed, which is difficult for users to understand, for instance using large amounts of specialist jargon, etc.

III, The following acts may be determined as “collecting and using personal information without users’ consent”

1. Beginning to collect personal information or activating authorizations for collectable information before obtaining users’ consent;

2. After users clearly indicate they do not consent, still collecting personal information or activating up collectable personal information authorizations, or frequently obtaining users’ consent, interfering with users’ regular use;

3. Actually collecting personal information or activating collectable personal information authorizations in excess of the scope of user authorization;

4. Obtaining users’ consent by way of implicit agreement to privacy policies and other non-explicit methods;

5. Altering the status of collectable personal information authorizations they have set up without users’ consent, for instance automatically restoring user-set up authorization to implicit approval status when updating an app;

6. Using users’ personal information and algorithms to direct push delivery information, without providing an option for non-targeted push delivery information;

7. Misleading users through fraudulent, swindling and other such improper methods into consenting to personal information collection or the activation of collectable personal information authorizations, for instance wilfully hoodwinking or covering up the true objective for the collection of users’ personal information;

8. Not providing users with a way and method to revoke consent for personal information collection;

9. Collecting users’ personal information in violation of the announced collection and use norms. 

IV, The following acts may be determined as “collecting personal information in violation of the principle of necessity, that is not related to the provided service”

1.  Collected categories of personal information or activated collectable personal information authorizations are not related to the existing business functions;

2. Refusing to provide business functions because users do not consent to the collection of unnecessary personal information or the activation of unnecessary authorizations;

3.  Requesting the collection of personal information in excess of the scope the user originally consented to when adding new business functions to the app, refusing to provide the original business functions if the user does not agree, except where the newly added business function supersedes the original business function;

4. The frequency of personal information collection exceeds the actual needs of business functions;

5. Obliging he user to consent to personal information collection for only the purpose of improving of service quality, enhancing user experience, targeting push delivery information, researching and developing new products, etc., 

6. Requiring users to consent once to activating multiple collectable personal information authorizations, where use is impossible if users do not consent.

V, The following acts may be determined as “providing personal information to others without consent”

1. Providing personal information directly from the app customer end to third parties both without user content, and without anonymized processing, including providing personal information to third parties through methods such as embedding third-party code or plug-in components at the customer end, etc.;

2. Providing collected personal information to third parties after data is transmitted to the app’s back-end servers both without user content, and without anonymized processing;

3. Even if functions are provided to correct and delete personal information and cancel user accounts, not timely responding to user’s corresponding operations, requiring manual processing, not completing examination and processing within the committed time limits (the committed time limit may not exceed 15 working days, where there is not committed time limit, 15 working days are taken as limit);

4. Where the executing of correction or deletion of personal information, the cancellation of user accounts and other such user operations has been completed, but it is not completed at the app back-end;

5. Not establishing and publishing personal information security complaints and reporting channels, or not accepting and processing matters within the committed time limits (the committed time limit may not exceed 15 working days, where there is not committed time limit, 15 working days are taken as limit).

关于印发《App违法违规收集使用个人信息行为认定方法》的通知
各省、自治区、直辖市及新疆生产建设兵团网信办、通信管理局、公安厅(局)、市场监管局(厅、委):
  根据《关于开展App违法违规收集使用个人信息专项治理的公告》,为认定App违法违规收集使用个人信息行为提供参考,落实《网络安全法》等法律法规,国家互联网信息办公室、工业和信息化部、公安部、市场监管总局联合制定了《App违法违规收集使用个人信息行为认定方法》。现印发你们,请结合监管和执法工作实际参考执行。
国家互联网信息办公室秘书局
工业和信息化部办公厅
公安部办公厅
市场监管总局办公厅
  2019年11月28日
App违法违规收集使用个人信息行为认定方法
  根据《关于开展App违法违规收集使用个人信息专项治理的公告》,为监督管理部门认定App违法违规收集使用个人信息行为提供参考,为App运营者自查自纠和网民社会监督提供指引,落实《网络安全法》等法律法规,制定本方法。
  一、以下行为可被认定为“未公开收集使用规则”
  1.在App中没有隐私政策,或者隐私政策中没有收集使用个人信息规则;
  2.在App首次运行时未通过弹窗等明显方式提示用户阅读隐私政策等收集使用规则;
  3.隐私政策等收集使用规则难以访问,如进入App主界面后,需多于4次点击等操作才能访问到;
  4.隐私政策等收集使用规则难以阅读,如文字过小过密、颜色过淡、模糊不清,或未提供简体中文版等。
  二、以下行为可被认定为“未明示收集使用个人信息的目的、方式和范围”
  1.未逐一列出App(包括委托的第三方或嵌入的第三方代码、插件)收集使用个人信息的目的、方式、范围等;
  2.收集使用个人信息的目的、方式、范围发生变化时,未以适当方式通知用户,适当方式包括更新隐私政策等收集使用规则并提醒用户阅读等;
  3.在申请打开可收集个人信息的权限,或申请收集用户身份证号、银行账号、行踪轨迹等个人敏感信息时,未同步告知用户其目的,或者目的不明确、难以理解;
  4.有关收集使用规则的内容晦涩难懂、冗长繁琐,用户难以理解,如使用大量专业术语等。
  三、以下行为可被认定为“未经用户同意收集使用个人信息”
  1.征得用户同意前就开始收集个人信息或打开可收集个人信息的权限;
  2.用户明确表示不同意后,仍收集个人信息或打开可收集个人信息的权限,或频繁征求用户同意、干扰用户正常使用;
  3.实际收集的个人信息或打开的可收集个人信息权限超出用户授权范围;
  4.以默认选择同意隐私政策等非明示方式征求用户同意;
  5.未经用户同意更改其设置的可收集个人信息权限状态,如App更新时自动将用户设置的权限恢复到默认状态;
  6.利用用户个人信息和算法定向推送信息,未提供非定向推送信息的选项;
  7.以欺诈、诱骗等不正当方式误导用户同意收集个人信息或打开可收集个人信息的权限,如故意欺瞒、掩饰收集使用个人信息的真实目的;
  8.未向用户提供撤回同意收集个人信息的途径、方式;
  9.违反其所声明的收集使用规则,收集使用个人信息。
  四、以下行为可被认定为“违反必要原则,收集与其提供的服务无关的个人信息”
  1.收集的个人信息类型或打开的可收集个人信息权限与现有业务功能无关;
  2.因用户不同意收集非必要个人信息或打开非必要权限,拒绝提供业务功能;
  3.App新增业务功能申请收集的个人信息超出用户原有同意范围,若用户不同意,则拒绝提供原有业务功能,新增业务功能取代原有业务功能的除外;
  4.收集个人信息的频度等超出业务功能实际需要;
  5.仅以改善服务质量、提升用户体验、定向推送信息、研发新产品等为由,强制要求用户同意收集个人信息;
  6.要求用户一次性同意打开多个可收集个人信息的权限,用户不同意则无法使用。
  五、以下行为可被认定为“未经同意向他人提供个人信息”
  1.既未经用户同意,也未做匿名化处理,App客户端直接向第三方提供个人信息,包括通过客户端嵌入的第三方代码、插件等方式向第三方提供个人信息;
  2.既未经用户同意,也未做匿名化处理,数据传输至App后台服务器后,向第三方提供其收集的个人信息;
  3.App接入第三方应用,未经用户同意,向第三方应用提供个人信息。
  六、以下行为可被认定为“未按法律规定提供删除或更正个人信息功能”或“未公布投诉、举报方式等信息”
  1.未提供有效的更正、删除个人信息及注销用户账号功能;
  2.为更正、删除个人信息或注销用户账号设置不必要或不合理条件;
  3.虽提供了更正、删除个人信息及注销用户账号功能,但未及时响应用户相应操作,需人工处理的,未在承诺时限内(承诺时限不得超过15个工作日,无承诺时限的,以15个工作日为限)完成核查和处理;
  4.更正、删除个人信息或注销用户账号等用户操作已执行完毕,但App后台并未完成的;
  5.未建立并公布个人信息安全投诉、举报渠道,或未在承诺时限内(承诺时限不得超过15个工作日,无承诺时限的,以15个工作日为限)受理并处理的。

Regulations on Internet Security Supervision and Inspection by Public Security Bodies

Posted on Updated on

Ministry of Public Security of the People’s Republic of China Decree

No. 151

The “Regulations on Internet Security Supervision and Inspection by Public Security Bodies” were passed at the Minister’s business meeting of the Ministry of Public Security on 5 September 2018, are hereby promulgated, and take effect on 1 November 2018.

Minister: Zhao Kezhi

15 September 2018

Regulations on Internet Security Supervision and Inspection by Public Security Bodies

Chapter I: General provisions

Article 1: These Regulations are formulated in order to standardize public security bodies’ Internet security supervision and inspection work, prevent online law-breaking and crime, safeguard cybersecurity, protect the lawful rights and interests of citizens, legal persons and other organizations, on the basis of the “People’s Police Law of the People’s Republic of China”, the “Cybersecurity Law of the People’s Republic of China” and other such laws and administrative regulations. 

Article 2: These Regulations apply to public security bodies conducting security supervision and inspection of Internet service providers’ and network-using work units’ fulfilment of cybersecurity duties provided in laws and administrative regulations. 

Article 3: Internet security supervision and inspection work is conducted by county-level or higher local People’s Government public security body cybersecurity protection departments. 

Higher-level public security bodies shall implement guidance and supervision of lower levels’ public security bodies’ conduct of Internet security supervision and inspection work.

Article 4: Public security bodies conducting Internet security supervision and inspection shall abide by the policies of scientific management, ensuring and stimulating development, strictly abide by statutory powers and procedures, incessantly improve law enforcement methods, and comprehensively implement law enforcement responsibilities. 

Article 5: Public security bodies and their work personnel shall strictly preserve the secrecy of personal information and privacy, commercial secrets and State secrets they learn in the process of fulfilling Internet security supervision and inspection duties and responsibilities, they may not leak this, sell it or illegally provide it to others.

Public security bodies and their work personnel can only use information they learn in the process of fulfilling Internet security supervision and inspection duties as required for maintaining cybersecurity, and may not use it for other purposes.

Article 6: Public security bodies shall timely notify relevant controlling departments and work units about cybersecurity risks they discover in the process of Internet security supervision and inspection work, which may harm national security, public security or social order.

Article 7: Public security bodies shall establish and implement rules for Internet security supervision and inspection work, and consciously accept supervision by inspection counterparts and the popular masses.

Chapter II: Supervision and inspection counterparts and content.

Article 8: Internet security supervision and inspection will be conducted by public security bodies of the locality of Internet service providers’ network service operations bodies and network using work units’ network management bodies. Where an Internet service provider is an individual, it may be implemented by the public security body of their regular place of residence.

Article 9: Public security bodies shall, on the basis of cybersecurity protection requirements and the concrete circumstances of cybersecurity risks and vulnerabilities, conduct supervision and inspection of the following Internet service providers and network-using work units.

(1) Those providing Internet access, Internet data centre, content distribution and domain name services;

(2) Those providing Internet information services;

(3) Those providing public network access services;

(4) Those providing other Internet services. 

Focus supervision and inspection shall be conducted of those who have not conducted the services provided in the previous Paragraph for a full year, those where a cybersecurity incident, breach of law or crime occurred within two years, or those who have been subject to administrative punishment by a public security body for not fulfilling statutory cybersecurity duties.

Article 10: Public security bodies shall, on the basis of the actual circumstances of Internet service providers’ and network-using work units fulfilling their statutory cybersecurity duties, and according to relevant State regulations and standards, conduct supervision and inspection of the following content:

(1) Whether or not they have conducted network work unit filing formalities, and have reported the access work unit, basic user information and changes therein;

(2) Whether or not they have formulated and implemented cybersecurity management rules and operating rules, and appointed a person responsible for cybersecurity;

(3) Whether or not they have adopted technical measures to record and preserve user registration information and network use record information according to the law;

(4) Whether or not they have adopted technical measures to defend against computer viruses, cyberattacks, cyber intrusions, etc.;

(5) Whether or not they have adopted corresponding prevention measures against the publication or transmission of information prohibited in laws and administrative regulations according to the law in public information services;

(6) Whether or not they have provided technical support and assistance to public security bodies lawfully maintaining cybersecurity, preventing and investigating terror activities, or investigating crimes according to statutory provisions;

(7) Whether or not they have fulfilled cybersecurity multi-level protection duties as provided in laws and administrative regulations.

Article 11: Apart from the content listed in Article 10 of these Regulations, public security bodies shall also conduct supervision and inspection of the following content, on the basis of the category of provided Internet services:

(1) Where Internet access services are provided, supervising and inspecting whether they have recorded and preserved network address, allocation and use details;

(2) Where Internet data centre services are provided, supervising and inspecting whether they have recorded user information of the host entrustment, host rental and virtual space rental they provide;

(3) Where Internet domain name services are provided, supervising and inspecting whether they have recorded network domain name application and modification information, and whether or not they have adopted measures to deal with unlawful domain names according to the law.

(4) Where Internet information services are provided, supervising and inspecting whether they have adopted user-disseminated information management measures according to the law, whether or not they have adopted measures to deal with already published or transmitted information of which the dissemination or transmission is prohibited by laws and administrative regulations, and maintained related records;

(5) Where Internet content distribution services are provided, supervising and inspecting whether or not they have recorded circumstances concerning content distribution network and content source network links;

(6) Where Internet public access services are provided, supervising and inspecting whether or not they have adopted technical network and information security protection measures conform to national standards.

Article 12: During periods of national major cybersecurity defence tasks, public security bodies may conduct targeted security supervision and inspection of the following content of Internet service providers and network-using work units related to national major cybersecurity defence tasks:

(1) Whether or not they have formulated work plans required for major national cybersecurity defence tasks, clarified cybersecurity duties and work divisions, and appointed a management person for cybersecurity;

(2) Whether or not they have organized and conducted cybersecurity risk assessments, and adopted corresponding risk control measures to remedy cybersecurity leaks and vulnerabilities;

(3) Whether or not they have formulated cybersecurity emergency response plans, organized and conducted emergency response exercises, and whether or not emergency response-related equipment is complete and effective.

(4) Whether or not they have adopted other cybersecurity protection tasks required for major cybersecurity protection tasks according to the law;

(5) Whether or not they have reported cybersecurity protection measures and implementation circumstances to public security bodies according to requirement. 

Internet security supervision and inspection with preventing terror attacks as its major objective will be implemented according to the content provided in the previous Paragraph.

Chapter III: Supervision and inspection procedures

Article 13: Public security bureaus conducting Internet security supervision and inspection may adopt on-site supervision and inspection or remote monitoring methods to do so.

Article 14: When public security bodies conduct on-site Internet security supervision and inspection, the number of People’s Police may not be less than 2, and they shall produce their People’s Police card and county-level or higher local People’s Government public security body-issued supervision and inspection notification letter.

Article 15: Public security bodies conducting on-site Internet security supervision and inspection may adopt the following measures on the basis of requirement:

(1) Entering business premises, computer rooms, work premises;

(2) Requiring the supervision and inspection counterpart’s responsible person or cybersecurity management personnel to explain supervision and inspection matters;

(3) Consulting and reproducing information related to Internet security supervision and inspection;

(4) Checking the operational state of technical network and information security protection measures.

Article 16: Public security bodies may conduct remote monitoring on whether or not cybersecurity leaks exist with Internet service providers and network-using work units.

Public security bodies conducting remote monitoring shall notify the supervision and inspection counterpart in advance about the inspection time, inspection cope and other such matters, or publish the related inspection matters, they may not interfere with or destroy the regular operations of the supervision and inspection counterpart’s networks.

Article 17: Public security bodies conducting on-site supervision and inspection or remote monitoring may entrust cybersecurity service bodies having corresponding technical capabilities with providing technical support. 

Cybersecurity service bodies and their work personnel shall strictly preserve the secrecy of personal information and privacy, commercial secrets and State secrets they learn in the process of fulfilling Internet security supervision and inspection duties and responsibilities, they may not leak this, sell it or illegally provide it to others.

Public security bodies shall strictly supervise cybersecurity service bodies’ implementation of cybersecurity management and secrecy protection responsibilities.

Article 18: Public security bodies conducting on-site supervision and inspection shall draft supervision and inspection records, and have them signed by the People’s Police conducting supervision and inspection and the responsible person or cybersecurity management personnel from the supervision and inspection counterpart. Where the responsible person or cybersecurity management personnel from the supervision and inspection counterpart object to the supervision and inspection record, they shall be allowed to explain the matter; where they refuse to sign, People’s Police shall indicate this on the supervision and inspection record.

Public security bodies conducting remote monitoring shall draft supervision and inspection records, and have the supervision and inspection record signed by two or more People’s Police conducting the supervision and inspection. 

Where cybersecurity service bodies are entrusted with providing technical support, the technical support personnel shall sign the supervision and inspection record together.

Article 19: Public security bodies discovering that cybersecurity risks or vulnerabilities exist in Internet service providers and network-using work unit in the process of Internet security supervision and inspection, shall urge and guide them to adopt measures to eliminate the risks or vulnerabilities, and indicate this in the supervision and inspection records; where they discover unlawful acts, but circumstances are light or no results have been created, they shall order them to correct the matter within a limited time.

Where the supervision and inspection counterpart believes they have completed correction before the end of the time limit, they may submit a re-inspection application in writing to the public security body.

Public security bodies shall, within three working days after the time limit ends or after receiving an earlier re-inspection application from the supervision and inspection counterpart, conduct a re-inspection of the corrected situation, and feed back the re-inspection results within three working days after the re-inspection concludes.

Article 12: All kinds of material collected in the process of inspection, or all kinds of produced documents and other materials, shall be stored in files according to regulations.

Chapter IV: Legal liability

Article 21: Where public security bodies discover Internet service providers or network-using work units committed the following unlawful acts in the process of Internet security supervision and inspection, they shall impose administrative punishment according to the law:

(1) Those not formulating or implementing cybersecurity management rules and operating rules, or not appointing a responsible person for cybersecurity, will be punished according to Article 59 Paragraph I of the “Cybersecurity Law of the People’s Republic of China”;

(2) Those not adopting technical measures to defend against computer viruses, cyberattacks, cyber intrusions and other such acts harming cybersecurity, will be punished according to the provisions of Article 59 Paragraph I of the “Cybersecurity Law of the People’s Republic of China”;

(3) Those not adopting measures to record and preserve user registration information and web access daily record information, will be punished according to the provisions of Article 59 Paragraph I of the “Cybersecurity Law of the People’s Republic of China”;

(4) Those not requiring users to provide real identity information according to requirements in the process of providing Internet information dissemination, instant communication and other such services, or who provide related services to users not providing real identity information, will be punished according to the provisions of Article 61 of the “Cybersecurity Law of the People’s Republic of China”;

(5) Those who do not adopt measures to cease transmission and delete information of which the dissemination and transmission is prohibited by laws and administrative regulations according to the law or according to public security bodies’ requirements, and preserve relevant records, will be punished according to the provisions of Article 68 or Article 69 Paragraph I of the “Cybersecurity Law of the People’s Republic of China”;

(6) Those refusing to provide technical support and assistance to public security bodies maintaining cybersecurity and investigating criminal activities according to the law, will be punished according to the provisions of Article 69 Paragraph III of the “Cybersecurity Law of the People’s Republic of China”.

Where the acts in the preceding items 4 to 6 violate the “Anti-Terrorism Law of the People’s Republic of China”, they will be punished according to the provisions of Article 84 or Article 86 Paragraph I of the “Anti-Terrorism Law of the People’s Republic of China”.

Article 22: Where public security bodies, in the process of Internet security supervision and inspection, discover Internet service providers and network-using work units steal or obtain personal information in an illegal manner, illegally sell or illegally provide it to others, but it does not constitute a crime, they will be punished according to the provisions of Article 64 Paragraph II of the “Cybersecurity Law of the People’s Republic of China”.

Article 23: Where public security bodies, in the process of Internet security supervision and inspection, discover Internet service providers and network-using work units have installed malicious programmes in the Internet services they provide, they will be punished according to the provisions of Article 60 Paragraph I of the “Cybersecurity Law of the People’s Republic of China”.

Article 24: Where Internet service providers and network-using work units refuse or impede public security bodies’ conduct of Internet security supervision and inspection, they will be punished according to the provisions of Article 69 Paragraph II of the “Cybersecurity Law of the People’s Republic of China”; where they refuse to cooperate with anti-terrorism work, they will be punished according to the provisions of Article 91 or Article 92 of the “Anti-Terrorism Law of the People’s Republic of China.

Article 25: Where cybersecurity service bodies and their work personnel entrusted with providing technical support engage in illegal intrusion into the supervision and inspection counterpart’s networks, interfere with the regular functioning of the supervision and inspection counterpart’s networks, or steal online data and other such activities harming cybersecurity, they will be punished according to the provisions of Article 63 of the “Cybersecurity Law of the People’s Republic of China”; where they steal personal information they have obtained in the process of their work or obtain it in an illegal manner, illegally sell or illegally provide it to others, they will be punished according to the provisions of Article 64 Paragraph II of the “Cybersecurity Law of the People’s Republic of China”, where it constitutes a crime, criminal liability will be prosecuted according to the law.

Where bodies and their work personnel as provided in the previous Paragraph infringe the commercial secrets of the supervision and inspection counterpart, constituting a crime, criminal liability will be prosecuted according to the law.

Article 26: Where public security bodies and their work personnel, in the process of Internet security supervision and inspection work, are derelict in their duties, abuse their powers, or engage in favouritism, the directly responsible person in charge and other directly responsible personnel will be punished according to the law; where it constitutes a crime, criminal liability will be prosecuted according to the law.

Article 27: Where Internet service providers and network-using work units violate these Regulations, constituting a violation of public security management, they will be subject to public order management punishment; where it constitutes a crime, criminal liability will be prosecuted according to the law.

Chapter V: Supplementary provisions

Article 28: Supervision and inspection of commercial Internet access service venues will be implementing according to the relevant provisions of the “Commercial Internet Access Service Venue Management Regulations”.

Article 29: These Regulations take effect on 1 November 2018.

中华人民共和国公安部令
第151号

《公安机关互联网安全监督检查规定》已经2018年9月5日公安部部长办公会议通过,现予发布,自2018年11月1日起施行。

部长  赵克志

2018年9月15日

公安机关互联网安全监督检查规定

第一章 总则

第一条 为规范公安机关互联网安全监督检查工作,预防网络违法犯罪,维护网络安全,保护公民、法人和其他组织合法权益,根据《中华人民共和国人民警察法》《中华人民共和国网络安全法》等有关法律、行政法规,制定本规定。

第二条 本规定适用于公安机关依法对互联网服务提供者和联网使用单位履行法律、行政法规规定的网络安全义务情况进行的安全监督检查。

第三条 互联网安全监督检查工作由县级以上地方人民政府公安机关网络安全保卫部门组织实施。

上级公安机关应当对下级公安机关开展互联网安全监督检查工作情况进行指导和监督。

第四条 公安机关开展互联网安全监督检查,应当遵循依法科学管理、保障和促进发展的方针,严格遵守法定权限和程序,不断改进执法方式,全面落实执法责任。

第五条 公安机关及其工作人员对履行互联网安全监督检查职责中知悉的个人信息、隐私、商业秘密和国家秘密,应当严格保密,不得泄露、出售或者非法向他人提供。

公安机关及其工作人员在履行互联网安全监督检查职责中获取的信息,只能用于维护网络安全的需要,不得用于其他用途。

第六条 公安机关对互联网安全监督检查工作中发现的可能危害国家安全、公共安全、社会秩序的网络安全风险,应当及时通报有关主管部门和单位。

第七条 公安机关应当建立并落实互联网安全监督检查工作制度,自觉接受检查对象和人民群众的监督。

第二章 监督检查对象和内容

第八条 互联网安全监督检查由互联网服务提供者的网络服务运营机构和联网使用单位的网络管理机构所在地公安机关实施。互联网服务提供者为个人的,可以由其经常居住地公安机关实施。

第九条 公安机关应当根据网络安全防范需要和网络安全风险隐患的具体情况,对下列互联网服务提供者和联网使用单位开展监督检查:

(一)提供互联网接入、互联网数据中心、内容分发、域名服务的;

(二)提供互联网信息服务的;

(三)提供公共上网服务的;

(四)提供其他互联网服务的;

对开展前款规定的服务未满一年的,两年内曾发生过网络安全事件、违法犯罪案件的,或者因未履行法定网络安全义务被公安机关予以行政处罚的,应当开展重点监督检查。

第十条 公安机关应当根据互联网服务提供者和联网使用单位履行法定网络安全义务的实际情况,依照国家有关规定和标准,对下列内容进行监督检查:

(一)是否办理联网单位备案手续,并报送接入单位和用户基本信息及其变更情况;

(二)是否制定并落实网络安全管理制度和操作规程,确定网络安全负责人;

(三)是否依法采取记录并留存用户注册信息和上网日志信息的技术措施;

(四)是否采取防范计算机病毒和网络攻击、网络侵入等技术措施;

(五)是否在公共信息服务中对法律、行政法规禁止发布或者传输的信息依法采取相关防范措施;

(六)是否按照法律规定的要求为公安机关依法维护国家安全、防范调查恐怖活动、侦查犯罪提供技术支持和协助;

(七)是否履行法律、行政法规规定的网络安全等级保护等义务。

第十一条 除本规定第十条所列内容外,公安机关还应当根据提供互联网服务的类型,对下列内容进行监督检查:

(一)对提供互联网接入服务的,监督检查是否记录并留存网络地址及分配使用情况;

(二)对提供互联网数据中心服务的,监督检查是否记录所提供的主机托管、主机租用和虚拟空间租用的用户信息;

(三)对提供互联网域名服务的,监督检查是否记录网络域名申请、变动信息,是否对违法域名依法采取处置措施;

(四)对提供互联网信息服务的,监督检查是否依法采取用户发布信息管理措施,是否对已发布或者传输的法律、行政法规禁止发布或者传输的信息依法采取处置措施,并保存相关记录;

(五)对提供互联网内容分发服务的,监督检查是否记录内容分发网络与内容源网络链接对应情况;

(六)对提供互联网公共上网服务的,监督检查是否采取符合国家标准的网络与信息安全保护技术措施。

第十二条 在国家重大网络安全保卫任务期间,对与国家重大网络安全保卫任务相关的互联网服务提供者和联网使用单位,公安机关可以对下列内容开展专项安全监督检查:

(一)是否制定重大网络安全保卫任务所要求的工作方案、明确网络安全责任分工并确定网络安全管理人员;

(二)是否组织开展网络安全风险评估,并采取相应风险管控措施堵塞网络安全漏洞隐患;

(三)是否制定网络安全应急处置预案并组织开展应急演练,应急处置相关设施是否完备有效;

(四)是否依法采取重大网络安全保卫任务所需要的其他网络安全防范措施;

(五)是否按照要求向公安机关报告网络安全防范措施及落实情况。

对防范恐怖袭击的重点目标的互联网安全监督检查,按照前款规定的内容执行。

第三章 监督检查程序

第十三条 公安机关开展互联网安全监督检查,可以采取现场监督检查或者远程检测的方式进行。

第十四条 公安机关开展互联网安全现场监督检查时,人民警察不得少于二人,并应当出示人民警察证和县级以上地方人民政府公安机关出具的监督检查通知书。

第十五条 公安机关开展互联网安全现场监督检查可以根据需要采取以下措施:

(一)进入营业场所、机房、工作场所;

(二)要求监督检查对象的负责人或者网络安全管理人员对监督检查事项作出说明;

(三)查阅、复制与互联网安全监督检查事项相关的信息;

(四)查看网络与信息安全保护技术措施运行情况。

第十六条 公安机关对互联网服务提供者和联网使用单位是否存在网络安全漏洞,可以开展远程检测。

公安机关开展远程检测,应当事先告知监督检查对象检查时间、检查范围等事项或者公开相关检查事项,不得干扰、破坏监督检查对象网络的正常运行。

第十七条 公安机关开展现场监督检查或者远程检测,可以委托具有相应技术能力的网络安全服务机构提供技术支持。

网络安全服务机构及其工作人员对工作中知悉的个人信息、隐私、商业秘密和国家秘密,应当严格保密,不得泄露、出售或者非法向他人提供。公安机关应当严格监督网络安全服务机构落实网络安全管理与保密责任。

第十八条 公安机关开展现场监督检查,应当制作监督检查记录,并由开展监督检查的人民警察和监督检查对象的负责人或者网络安全管理人员签名。监督检查对象负责人或者网络安全管理人员对监督检查记录有异议的,应当允许其作出说明;拒绝签名的,人民警察应当在监督检查记录中注明。

公安机关开展远程检测,应当制作监督检查记录,并由二名以上开展监督检查的人民警察在监督检查记录上签名。

委托网络安全服务机构提供技术支持的,技术支持人员应当一并在监督检查记录上签名。

第十九条 公安机关在互联网安全监督检查中,发现互联网服务提供者和联网使用单位存在网络安全风险隐患,应当督促指导其采取措施消除风险隐患,并在监督检查记录上注明;发现有违法行为,但情节轻微或者未造成后果的,应当责令其限期整改。

监督检查对象在整改期限届满前认为已经整改完毕的,可以向公安机关书面提出提前复查申请。

公安机关应当自整改期限届满或者收到监督检查对象提前复查申请之日起三个工作日内,对整改情况进行复查,并在复查结束后三个工作日内反馈复查结果。

第二十条 监督检查过程中收集的资料、制作的各类文书等材料,应当按照规定立卷存档。

第四章 法律责任

第二十一条 公安机关在互联网安全监督检查中,发现互联网服务提供者和联网使用单位有下列违法行为的,依法予以行政处罚:

(一)未制定并落实网络安全管理制度和操作规程,未确定网络安全负责人的,依照《中华人民共和国网络安全法》第五十九条第一款的规定予以处罚;

(二)未采取防范计算机病毒和网络攻击、网络侵入等危害网络安全行为的技术措施的,依照《中华人民共和国网络安全法》第五十九条第一款的规定予以处罚;

(三)未采取记录并留存用户注册信息和上网日志信息措施的,依照《中华人民共和国网络安全法》第五十九条第一款的规定予以处罚;

(四)在提供互联网信息发布、即时通讯等服务中,未要求用户提供真实身份信息,或者对不提供真实身份信息的用户提供相关服务的,依照《中华人民共和国网络安全法》第六十一条的规定予以处罚;

(五)在公共信息服务中对法律、行政法规禁止发布或者传输的信息未依法或者不按照公安机关的要求采取停止传输、消除等处置措施、保存有关记录的,依照《中华人民共和国网络安全法》第六十八条或者第六十九条第一项的规定予以处罚;

(六)拒不为公安机关依法维护国家安全和侦查犯罪的活动提供技术支持和协助的,依照《中华人民共和国网络安全法》第六十九条第三项的规定予以处罚。

有前款第四至六项行为违反《中华人民共和国反恐怖主义法》规定的,依照《中华人民共和国反恐怖主义法》第八十四条或者第八十六条第一款的规定予以处罚。

第二十二条 公安机关在互联网安全监督检查中,发现互联网服务提供者和联网使用单位,窃取或者以其他非法方式获取、非法出售或者非法向他人提供个人信息,尚不构成犯罪的,依照《中华人民共和国网络安全法》第六十四条第二款的规定予以处罚。

第二十三条 公安机关在互联网安全监督检查中,发现互联网服务提供者和联网使用单位在提供的互联网服务中设置恶意程序的,依照《中华人民共和国网络安全法》第六十条第一项的规定予以处罚。

第二十四条 互联网服务提供者和联网使用单位拒绝、阻碍公安机关实施互联网安全监督检查的,依照《中华人民共和国网络安全法》第六十九条第二项的规定予以处罚;拒不配合反恐怖主义工作的,依照《中华人民共和国反恐怖主义法》第九十一条或者第九十二条的规定予以处罚。

第二十五条 受公安机关委托提供技术支持的网络安全服务机构及其工作人员,从事非法侵入监督检查对象网络、干扰监督检查对象网络正常功能、窃取网络数据等危害网络安全的活动的,依照《中华人民共和国网络安全法》第六十三条的规定予以处罚;窃取或者以其他非法方式获取、非法出售或者非法向他人提供在工作中获悉的个人信息的,依照《中华人民共和国网络安全法》第六十四条第二款的规定予以处罚,构成犯罪的,依法追究刑事责任。

前款规定的机构及人员侵犯监督检查对象的商业秘密,构成犯罪的,依法追究刑事责任。

第二十六条 公安机关及其工作人员在互联网安全监督检查工作中,玩忽职守、滥用职权、徇私舞弊的,对直接负责的主管人员和其他直接责任人员依法予以处分;构成犯罪的,依法追究刑事责任。

第二十七条 互联网服务提供者和联网使用单位违反本规定,构成违反治安管理行为的,依法予以治安管理处罚;构成犯罪的,依法追究刑事责任。

第五章 附则

第二十八条 对互联网上网服务营业场所的监督检查,按照《互联网上网服务营业场所管理条例》的有关规定执行。

第二十九条 本规定自2018年11月1日起施行。

Regulations for Internet Security Supervision and Inspection by Public Security Bodies

Posted on Updated on

(Opinion-seeking Draft)

Chapter I: General Principles

Article 1: In order to strengthen and standardize Internet security supervision and inspection work by public security bodies, prevent online law-breaking and crime, safeguard cybersecurity, protect the lawful rights and interests of citizens, legal persons and other organizations, on the basis of the “People’s Police Law of the People’s Republic of China”, the “Cybersecurity Law of the People’s Republic of China” and other such relevant laws and administrative regulations, these Regulations are formulated. Read the rest of this entry »

Announcement concerning Launching a Special Campaign to Attack Online Obscenity and Sexual Information

Posted on Updated on

At present, online obscenity and sexual information has not been stopped despite repeated bans, and has not been eliminated despite repeated bans, this gravely harms the physical and mental health of minors and gravely harms the social atmosphere, all walks of society deeply abhor this, and the popular masses’ calls demanding strict punishment have grown strong. In order to strictly attack the use of the Internet to produce and disseminate obscenity and sexual information, the National “Sweeping Pornography and Striking Illegality” Work Group Office, the State Internet Information Office, the Ministry of Industry and Information Technology and the Ministry of Public Security have decided to launch a “Sweeping Pornography and Striking Illegality – Clean Web 2014” campaign for a united attack on online obscenity and sexual information on a nationwide level. Hereby, the relevant matters are notified as follows: Read the rest of this entry »

Notice concerning Punishing Criminal Activities Infringing Citizens’ Personal Data

Posted on Updated on

GTZ No. [2013]12

All provincial, autonomous region and municipal People’s Courts, People’s Procuratorate, public security offices and bureaus, the Xinjiang Uyghur Autonomous Region Higher People’s Court Production-Construction Corps Branch Court, the Xinjiang Production-Construction Corps People’s Procuratorate and Public Security Bureau:

In recent years, following the rapid development of our country’s economy and the broad spread of information networks, unlawful and criminal infringement of citizens’ personal data has become more prominent every day, there is a flood of illegal trading of citizens’ personal data on the Internet, and as a result, the spread of telecommunications swindles, network swindles, extortion and blackmail, kidnapping and illegal loan repayment demands and other such crimes had become ceaseless despite repeated attacks, social harm is great, and the masses react strongly. In order to effectively restrain and punish criminal infringement of citizens’ personal data, realistically guarantee the security of the broad popular masses’ personal data and their lawful rights and interests, stimulate coordinated social development, and safeguard social harmony and stability, the relevant matters are hereby notified as follows: Read the rest of this entry »

Notice concerning Punishing Criminal Activities of Infringement of Citizens’ Personal Information According to the Law.

Posted on Updated on

GTZ No. [2013]12

All provincial, autonomous region and municipal higher people’s courts and people’s procuratorates, public security offices and bureaus, the Xinjiang Uyghur Autonomous Region Higher People’s Court Production-Construction Corps Branch Court, the Xinjiang Production-Construction Corps people’s procuratorate, public security bureau:

In recent years, following the rapid development of our country’s economy and the broad popularization of information networks, unlawful and criminal infringement of citizens’ personal information has become more prominent every day, there is a flood of illegal sales of citizens’ personal information on the Internet, and the telecommunications fraud, online fraud, extortion and blackmail, kidnapping, illegal demand of loan repayment and other such crimes resulting from this cannot be stopped despite repeated attacks, the social harm is grave, and the masses react strongly against this. In order to effectively curb and punish criminal infringement of citizens’ personal information, realistically guarantee the security of the broad popular masses’ personal information and their lawful rights and interests, stimulate coordinated social development, and safeguard social harmony and stability, hereby, the relevant matters are notified as follows: Read the rest of this entry »

Opinions Concerning Some Questions of Applicable Law in Criminal Intellectual Property Law Infringement Cases

Posted on Updated on

In order to resolve new circumstances and new problems that have been met by public security organs, people’s procuratorates and people’s courts in handling criminal intellectual property rights infringement cases in recent years, punish criminal intellectual property rights infringement activities according to the law, protect socialist market economy order, according to the provisions of the Criminal Law, Criminal Procedure Law and relevant judicial interpretations, integrating investigation, litigation and trial practice, these Opinions are formulated. Read the rest of this entry »

Management Rules for the Security Protection of Internationally Connected Computer Information Networks

Posted on Updated on

(Approved by the State Council on 11 December 1997, promulgated as Ministry of Public Security Decree No. 33 on 16 December 1997, and revised on 8 January 2011 on the basis of the “State Council Decision concerning Abolishing and revising Several Administrative Laws and Regulations”.
Chapter I: General Provisions
Article 1: In order to strengthen the protection of the security of computer information network international interconnection, safeguard public order and social stability, according to the provisions of the “Computer Information System Security Protection Regulations of the People’s Republic of China”, the “Provisional Computer Information Network Management Rules of the People’s Republic of China” and other laws and regulations, these Rules are formulated.
Article 2: These Rules apply to the management of computer information network international interconnection security protection within the borders of the People’s Republic of China
Article 3: The Ministry of Public Security computer management and supervision organs is responsible for management work over computer information network information interconnection security protection. Public security organs’ computer management and supervision organs shall protect the public security of computer information network international interconnections, and safeguard the lawful rights and interests of work units and individuals engaging in international interconnection business, and the public interest.
Article 4: No work unit or individual may use international interconnection to harm national security or divulge State secrets, may not violate the national, social or collective interest or the lawful rights and interests of citizens, and may not engage in unlawful or criminal activities.
Article 5: No work unit or individual may utilize international interconnections to produce, reproduce, consult or disseminate the following information:
(1) inciting resistance, destroying the implementation of the Constitution, laws and administrative regulations;
(2) inciting subversion of State power, toppling the Socialist system;
(3) inciting separatism or destroying national unity;
(4) inciting ethnic hatred, ethnic discrimination or destroying ethnic unity;
(5) concocting or distorting facts, disseminating rumours, disordering social order;
(6) propagating feudal superstition, obscenity, sex, gambling, violence, murder, horror or inciting crime;
(7) brazenly humiliating other persons or concocting facts to slander other persons;
(8) harming the prestige of State organs
(9) other matters violating the Constitution, laws and administrative regulations.
Article 6: No work unit or individual may engage in the following activities endangering computer information network security:
(1) without permission, accessing computer information networks or using computer information network resources;
(2) without permission, conducting deletion, revision or adding to computer information network functions;
(3) without permission, conducting deletion, revision or adding to data stored in, processed or disseminated by computer information networks and application procedures;
(4) wilfully producing or disseminating computer viruses and other destructive processes;
(5) other matters endangering computer information network security.
Article 7: Users’ freedom to communicate and communication secrecy is protected by law. No work unit or individual may violate legal provisions or use international interconnections to violate users’ freedom to communicate and communication secrecy.
Chapter II: The responsibility to protect security
Article 8: Work units and individuals engaging in international interconnection work shall accept security supervision, inspection and guidance from public security organs, truthfully provide information, materials and data documents related to security protection to public security organs, assist with public security organs to investigate and prosecute unlawful and criminal activities of computer information networks through international interconnections.
Article 9: Controlling departments or controlling work units of international entry and exit port channel provision work units, connection work units shall be responsible for security protection management work of international entry and exit port channel and their subordinate interconnection networks according to laws and relevant State regulations.
Article 10: Interconnection work units, access work units and legal persons using computer information network international interconnections and other organizations shall implement the following security protection duties:
(1) being responsible for security protection management work of their networks, establishing and competing security protection management systems;
(2) implementing technological security protection measures, guaranteeing the operational security and information security of their networks;
(3) being responsible for security education and training of their network users;
(4) conducting registration of work units an individual entrusting information dissemination, and conducting examination of the content of the provided information according to Article 5 of these Rules
(5) establishing computer information network electronic announcement system user registration and information management systems;
(6) where discovering one of the circumstances listed in Article 4, Article 5, Article 6 and Article 7 of these Rules, they shall preserve the original relevant records, and report it to the local public security organs within 24 hours;
(7) According to relevant State regulations, deleting addresses and directories containing content as per Article 5 of these Rules or closing servers.
Article 11: Users, when accessing work units to conduct net access formalities, shall fill out a user filing form. The filing form is produced under the supervision of the Ministry of Public Security.
Article 12: Interconnection work units, access work units, legal persons and other organizations (including cross-provincial, autonomous region and municipal interconnection network work units and their subordinate branch organs) using computer information network international interconnections, shall within 30 days of official connection to the network, go to a hearing organ appointed by the provincial, autonomous region or municipal People’s Government public security organ of their locality to carry out filing formalities.
Work units listed in the previous Item shall be responsible for reporting the situation of access work units and users accessing their networks to the public security organs for filing, and timely report changes in the situation of work units and users accessing their network.
Article 13: Those using public or communal access registration shall strengthen management of communal accounts, and establish account use registration systems. User accounts may not be lent or transferred.
Article 14: Work units involved in State affairs, economic construction, national defence construction, scientific and technological frontiers and other important areas, when carrying out filing formalities, shall provide examination and approval certification of their administrative supervision department. The international interconnection of the networks of work units listed in the previous Item, shall adopt corresponding protection measures.
Chapter III: Security supervision
Article 15: Principal, autonomous region and municipal public security offices (bureaus), district (city) and county (city) public opinion bureaus shall have corresponding organs to be responsible for international interconnection security protection management work.
Article 16: Public security organs’ computer management and supervision organs shall grasp the filing situation of interconnection work units, access work units and users, establish filing dossiers, conduct filing statistics, and progressively report this upwards according to relevant State regulations.
Article 17: Public security organs’ computer management and supervision organs shall supervise interconnection work units, access work units and relevant users to establish and complete security protection management systems; supervising and inspecting the network security protection management as well as technology measure implementation situation.
When public security organs’ computer management and supervision organs, when organizing security inspections, related work units shall send people to participate. Public security organ computer management and supervision organs shall put forward opinions for improvement, make detailed records and file them for further reference concerning problems discovered in security inspection.
Article 18: Public security organ computer management and supervision organ discovering addresses, directories or servers containing content listed in Article 5 of these Rules, shall notify the relevant work unit to shut it down or delete it.
Article 19: Public security organ computer supervision and management organs shall be responsible for following, investigating and prosecuting unlawful acts committed through computer information networks and criminal cases related to computer information networks, unlawful and criminal activities violating the provisions of Article 4 and Article 7 of these Rules, shall be transferred to the relevant departments or judicial organs to deal with them according to relevant State regulations.
Chapter IV: Legal responsibility
Article 20: Those violating laws and administrative regulations, with one of the acts listed in Article 5 or Article 6 of these Rules, will be warned by the public security organs, where there is unlawful income, the unlawful income is confiscated, a fine of 5.000 Yuan or less may also be imposed on individuals, and a fine of 50.000 Yuan or less may also be imposed on work units; where circumstances are grave, the punishments of ceasing interconnection for six months or less and shutdown may be imposed, when necessary, it may also be advise that the original permit-issuing or approving organ cancels business permits or cancels interconnection qualification; where it constitutes an act violating public order, it will be punished according to public order management punishment law; where it constitutes a crime, criminal responsibility will be investigated according to the law.
Article 21: Where one of the following acts is present, the public security organ orders rectification within a limited time and issues a warning, where there is unlawful income, the unlawful income is confiscated; where there is no rectification within the provided time limit, the main responsible person and other directly responsible personnel of the work unit may be subject to a fine of 5.000 Yuan or less, and the work unit may be subject to a fine of 50.000 Yuan or less, where circumstances are grave, the punishments of ceasing interconnection for six months or less and shutdown may be imposed, when necessary, it may also be advise that the original permit-issuing or approving organ cancels business permits or cancels interconnection qualification.
(1) not having established security protection management systems;
(2) not having adopted security technology protection measures;
(3) not providing security education and training to network users;
(4) not providing information, materials and data documents needed for security protection measures, or providing untrue content;
(5) not having examined the content of information entrusted for publication or registered the entrusting work unit and individual;
(6) not having established electronic announcement system user registration and information management systems;
(7) not deleting network addresses or directories or shutting down servicers according to relevant State regulations;
(8) not establishing public account use registration systems
(9) Lending or transferring user accounts.
Article 22: Those violating the provisions of Article 4 and Article 7 of these Rules, are punished according to relevant laws and regulations.
Article 23: Those violating the provisions of Article 21 and Article 23 of these Rules, and not implementing filing duties, are punished by the public security organs with a warning or shutting down for rectification for a period not exceeding six months.
Chapter V: Supplementary provisions
Article 24: Security protection management of computer information networks interconnecting with the Hong Kong Special Administrative Region and the Taiwan and Macau regions, are implemented with reference to these Rules.
Article 25: These Rules take effect from the date of promulgation.

计算机信息网络国际联网安全保护管理办法
  (1997年12月11日国务院批准 1997年12月16日公安部令第33号发布 根据2011年1月8日《国务院关于废止和修改部分行政法规的决定》修订)
第一章 总  则
  第一条 为了加强对计算机信息网络国际联网的安全保护,维护公共秩序和社会稳定,根据《中华人民共和国计算机信息系统安全保护条例》、《中华人民共和国计算机信息网络国际联网管理暂行规定》和其他法律、行政法规的规定,制定本办法。
  第二条 中华人民共和国境内的计算机信息网络国际联网安全保护管理,适用本办法。
  第三条 公安部计算机管理监察机构负责计算机信息网络国际联网的安全保护管理工作。
  公安机关计算机管理监察机构应当保护计算机信息网络国际联网的公共安全,维护从事国际联网业务的单位和个人的合法权益和公众利益。
  第四条 任何单位和个人不得利用国际联网危害国家安全、泄露国家秘密,不得侵犯国家的、社会的、集体的利益和公民的合法权益,不得从事违法犯罪活动。
  第五条 任何单位和个人不得利用国际联网制作、复制、查阅和传播下列信息:
  (一)煽动抗拒、破坏宪法和法律、行政法规实施的;
  (二)煽动颠覆国家政权,推翻社会主义制度的;
  (三)煽动分裂国家、破坏国家统一的;
  (四)煽动民族仇恨、民族歧视,破坏民族团结的;
  (五)捏造或者歪曲事实,散布谣言,扰乱社会秩序的;
  (六)宣扬封建迷信、淫秽、色情、赌博、暴力、凶杀、恐怖,教唆犯罪的;
  (七)公然侮辱他人或者捏造事实诽谤他人的;
  (八)损害国家机关信誉的;
  (九)其他违反宪法和法律、行政法规的。
  第六条 任何单位和个人不得从事下列危害计算机信息网络安全的活动:
  (一)未经允许,进入计算机信息网络或者使用计算机信息网络资源的;
  (二)未经允许,对计算机信息网络功能进行删除、修改或者增加的;
  (三)未经允许,对计算机信息网络中存储、处理或者传输的数据和应用程序进行删除、修改或者增加的;
  (四)故意制作、传播计算机病毒等破坏性程序的;
  (五)其他危害计算机信息网络安全的。
  第七条 用户的通信自由和通信秘密受法律保护。任何单位和个人不得违反法律规定,利用国际联网侵犯用户的通信自由和通信秘密。
第二章 安全保护责任
  第八条 从事国际联网业务的单位和个人应当接受公安机关的安全监督、检查和指导,如实向公安机关提供有关安全保护的信息、资料及数据文件,协助公安机关查处通过国际联网的计算机信息网络的违法犯罪行为。
  第九条 国际出入口信道提供单位、互联单位的主管部门或者主管单位,应当依照法律和国家有关规定负责国际出入口信道、所属互联网络的安全保护管理工作。
  第十条 互联单位、接入单位及使用计算机信息网络国际联网的法人和其他组织应当履行下列安全保护职责:
  (一)负责本网络的安全保护管理工作,建立健全安全保护管理制度;
  (二)落实安全保护技术措施,保障本网络的运行安全和信息安全;
  (三)负责对本网络用户的安全教育和培训;
  (四)对委托发布信息的单位和个人进行登记,并对所提供的信息内容按照本办法第五条进行审核;
  (五)建立计算机信息网络电子公告系统的用户登记和信息管理制度;
  (六)发现有本办法第四条、第五条、第六条、第七条所列情形之一的,应当保留有关原始记录,并在24小时内向当地公安机关报告;
  (七)按照国家有关规定,删除本网络中含有本办法第五条内容的地址、目录或者关闭服务器。
  第十一条 用户在接入单位办理入网手续时,应当填写用户备案表。备案表由公安部监制。
  第十二条 互联单位、接入单位、使用计算机信息网络国际联网的法人和其他组织(包括跨省、自治区、直辖市联网的单位和所属的分支机构),应当自网络正式联通之日起30日内,到所在地的省、自治区、直辖市人民政府公安机关指定的受理机关办理备案手续。
  前款所列单位应当负责将接入本网络的接入单位和用户情况报当地公安机关备案,并及时报告本网络中接入单位和用户的变更情况。
  第十三条 使用公用账号的注册者应当加强对公用账号的管理,建立账号使用登记制度。用户账号不得转借、转让。
  第十四条 涉及国家事务、经济建设、国防建设、尖端科学技术等重要领域的单位办理备案手续时,应当出具其行政主管部门的审批证明。
  前款所列单位的计算机信息网络与国际联网,应当采取相应的安全保护措施。
第三章 安 全 监 督
  第十五条 省、自治区、直辖市公安厅(局),地(市)、县(市)公安局,应当有相应机构负责国际联网的安全保护管理工作。
  第十六条 公安机关计算机管理监察机构应当掌握互联单位、接入单位和用户的备案情况,建立备案档案,进行备案统计,并按照国家有关规定逐级上报。
  第十七条 公安机关计算机管理监察机构应当督促互联单位、接入单位及有关用户建立健全安全保护管理制度。监督、检查网络安全保护管理以及技术措施的落实情况。
  公安机关计算机管理监察机构在组织安全检查时,有关单位应当派人参加。公安机关计算机管理监察机构对安全检查发现的问题,应当提出改进意见,作出详细记录,存档备查。
  第十八条 公安机关计算机管理监察机构发现含有本办法第五条所列内容的地址、目录或者服务器时,应当通知有关单位关闭或者删除。
  第十九条 公安机关计算机管理监察机构应当负责追踪和查处通过计算机信息网络的违法行为和针对计算机信息网络的犯罪案件,对违反本办法第四条、第七条规定的违法犯罪行为,应当按照国家有关规定移送有关部门或者司法机关处理。
第四章 法 律 责 任
  第二十条 违反法律、行政法规,有本办法第五条、第六条所列行为之一的,由公安机关给予警告,有违法所得的,没收违法所得,对个人可以并处5000元以下的罚款,对单位可以并处1.5万元以下的罚款;情节严重的,并可以给予6个月以内停止联网、停机整顿的处罚,必要时可以建议原发证、审批机构吊销经营许可证或者取消联网资格;构成违反治安管理行为的,依照治安管理处罚法的规定处罚;构成犯罪的,依法追究刑事责任。
  第二十一条 有下列行为之一的,由公安机关责令限期改正,给予警告,有违法所得的,没收违法所得;在规定的限期内未改正的,对单位的主管负责人员和其他直接责任人员可以并处5000元以下的罚款,对单位可以并处1.5万元以下的罚款;情节严重的,并可以给予6个月以内的停止联网、停机整顿的处罚,必要时可以建议原发证、审批机构吊销经营许可证或者取消联网资格。
  (一)未建立安全保护管理制度的;
  (二)未采取安全技术保护措施的;
  (三)未对网络用户进行安全教育和培训的;
  (四)未提供安全保护管理所需信息、资料及数据文件,或者所提供内容不真实的;
  (五)对委托其发布的信息内容未进行审核或者对委托单位和个人未进行登记的;
  (六)未建立电子公告系统的用户登记和信息管理制度的;
  (七)未按照国家有关规定,删除网络地址、目录或者关闭服务器的;
  (八)未建立公用账号使用登记制度的;
  (九)转借、转让用户账号的。
  第二十二条 违反本办法第四条、第七条规定的,依照有关法律、法规予以处罚。
  第二十三条 违反本办法第十一条、第十二条规定,不履行备案职责的,由公安机关给予警告或者停机整顿不超过6个月的处罚。
第五章 附  则
  第二十四条 与香港特别行政区和台湾、澳门地区联网的计算机信息网络的安全保护管理,参照本办法执行。
  第二十五条 本办法自1997年12月30日起施行。

Notice concerning Strictly Handling Insult and Defamation Cases According to the Law.

Posted on Updated on

3 April 2009

All provincial, autonomous region and municipal public security offices and bureaus, the Xinjiang Production-Construction Corps Public Security Bureau

Since many years, all levels’ public security organs have, according to the relevant provisions of the “Criminal Law” and the “Public Order Management Punishment Law”, inspected and prosecuted a batch of insult and defamation cases, and have contributed to the protection of the personal dignity and reputation of citizens, and safeguarding social public order. But, a small number of local public security organs have, in the process of handling insult and defamation cases, not been able to handle cases strictly and correctly according to the law, which led to the broad attention of news media and all walks of society, engendered a harmful social influence, and damaged the image and law enforcement credibility of public security organs. In order to handle insult and defamation cases strictly according to the law, standardize law enforcement activities, raise case-handling quality, and protect the lawful rights and interests of citizens, hereby, the following relevant issues are notified: Read the rest of this entry »

Opinions concerning Strengthening the Supervision of Internet Mapping and Geographical Information Service Websites

Posted on Updated on

GCTZ No. [2008]1

All provincial, autonomous region and municipal Peoples’ Government, all State Council ministries and commissions, all directly subordinate organs:

Following the progress of satellite positioning technology, remote sensing technology, geographical information system technology and network technology, and development speed of mapping and geographical information services based on the Internet have, at the same time as providing conveniences to people’s work and lives, presented many problems that should not be overlooked. A number of work units and individuals have, in violation of the provision of relevant State laws and regulations, provided unauthorized Internet mapping and geographical information services without qualifications or approval, have published erroneous national maps, and indicated some geographical coordinate information that is sensitive, should not have been published or even involves State secrets. The emergence of these problems has gravely harmed the national interest and threatened national security. In order to strengthen supervision and management of Internet mapping and geographical information service websites, and with the agreement of the State Council, hereby, the following opinions are put forward: Read the rest of this entry »

Management Rules for Multi-Level Protection of Information Security

Posted on Updated on

Notice concerning issuance of the “Management Rules for Multi-Level Protection of Information Security”

All provincial, autonomous region and municipal people’s security departments (bureaus), secrecy protection bureaus, the State Secrets Management Bureau (Office of the State Commission for Encryption Management),the Office of the Leading Group for Informatization, the Xinjiang Production-Construction Corps Public Security Bureau, Secrecy Protection Bureau, State Encryption Management Bureau, and Informatization Leading Group Office, the Secrecy Protection Committee Offices of all ministries and commissions of Centre and State bodies, Encryption Work Leading Group Offices,, Informatization Leading Group Offices, all People’s Organizations’ Secrecy Protection Committee Offices:

In order to accelerate the advance of information security multi-level protection, standardize information security multi-level protection management, raise information security protection capabilities and levels, safeguard national security, social stability and the public interest, safeguard and stimulate informatization construction, the Ministry of Public Security, the State Secrecy Protection Bureau, the State Encryption Management Bureau and the State Council Informatization Work Office have formulated the “Management Rules for Multi-Level Protection of Information Security”. These are hereby issued to you, please implement them earnestly.

Ministry of Public Security
State Secrecy Protection Management Bureau
State Encryption Management Bureau
State Council Informatization Work Office

22 June 2007

Management Rules for Multi-Level Protection of Information Security”

    Chapter I: General provisions

Article 1: In order to standardize information security multi-level protection management, raise information security protection capabilities and levels, safeguard national security, social stability and the public interest, safeguard and stimulate informatization construction, on the basis of the “Computer Information Network Security Protection Regulations of the People’s Republic of China” and other such relevant laws and regulations, these Rules are formulated.

Article 2: Through formulating uniform information security multi-level protection management norms and technical standards, the State organizes citizens, legal persons and other organizations to implement security protection of information systems in a tiered manner, and conducts supervision and management of the implementation of multi-level protection work.

Article 3: Public security bodies are responsible for the supervision, inspection and guidance of information security multi-level protection work. The State secrecy protection work department is responsible for the supervision, inspection and guidance of secrecy protection-related work in multi-level protection work. The State encryption management department is responsible for the supervision, inspection and guidance of encryption-related work in multi-level protection work. Matters affecting other functional departments’ scope of jurisdiction will be managed by the relevant functional department according to the provisions of State laws and regulations. The State Council Informatization Work Office and local informatization leading group office bodies are responsible for the interdepartmental coordination of multi-level protection work.

Article 4: Departments in charge of information systems shall, according to these Rules and related norms and standards, supervise, inspect and guide information security multi-level protection work concerning work units operating and using information systems within their sector, their department or their locality.

Article 5: Work units operating and using information systems shall, according to these Rules and related norms and standards, fulfil information security multi-level protection duties and responsibilities.

Chapter II: Tier division and protection

Article 6: National information security multi-level protection upholds the principles of self-classification and self-protection. The security protection tier of an information system shall be determined on the basis of the degree of importance of the information system for national security, economic construction and social life, the degree of harm to national security, social order, the public interest as well as the lawful rights and interests of citizens, legal persons and other organizations if the information system is destroyed, and other such factors.

Article 7: Security protection tiers for information systems are divided into the following five levels:

The first tier, after the information system is destroyed, harm is inflicted upon the lawful rights and interests of citizens, legal persons and other organizations, but national security, social order and the public interest are not endangered;

The second tier, after the information system is destroyed, grave harm is done to the lawful rights and interests of citizens, legal persons and other organizations, or harm is inflicted upon social order and the public interest, but national security is not harmed.

The third tier, after the information system is destroyed, grave harm is done to social order and the public interest, or harm is inflicted upon national security.

The fourth tier, after the information system is destroyed, especially grave harm is inflicted upon social order and the public interest, or grave harm is inflicted upon national security

The fifth tier, after the information system is destroyed, especially grave harm is inflicted upon national security.

Article 8: Work units operating and using information systems implement protection of information systems on the basis of these Rules and related technical standards, relevant State information security supervision and management departments implement supervision and management of information security multi-level protection work.

Work units operating and using first-tier information systems shall implement protection on the basis of relevant State management norms and technical standards.

Work units operating and using second-tier information systems shall implement protection on the basis of relevant State management norms and technical standards. State information security supervision and management departments conduct guidance over information security multi-level protection work of information systems in this tier.

Work units operating and using third-tier information systems shall implement protection on the basis of relevant State management norms and technical standards. State information security supervision and management departments conduct supervision and inspection of information security multi-level protection work of information systems in this tier.

    Work units operating and using fourth-tier information systems shall implement protection on the basis of relevant State management norms, technical standards and special operational requirements. State information security supervision and management departments conduct mandatory supervision and inspection of information security multi-level protection work of information systems in this tier.

    Work units operating and using fifth-tier information systems shall implement protection on the basis of relevant State management norms, technical standards and special operational security requirements. State-appointed specialized bodies conduct specialized supervision and inspection of information security multi-level protection work of information systems in this tier.

Chapter III: Implementation and management of multi-level protection

Article 9: Work units operating and using information systems shall concretely implement multi-level protection work according to the “Information System Security Multi-Level Protection Implementation Guidelines.

Article 10: Work units operating and using information systems shall determine information systems’ security protection tier on the basis of these Rules and the “Information System Security Multi-Level Protection Implementation Guidelines”. Where there is a competent department, they shall undergo verification and approval by the competent department.

Information systems operating across provinces or uniformly nationwide may have their security protection tier determined uniformly by the competent department.

Where an information system is planned to be determined as fourth-tier or higher, operating and using work units or competent departments shall request the National Information Security Protection Tier Expert Assessment Committee to assess the matter.

    Article 11: After an information system’s security protection tier has been determined, the operating and using work unit shall use information technology products conform to relevant national regulations that satisfy the requirements of its information system security protection tier, according to State information security multi-level protection management norms and technical standards, and carry out information system security construction or reconstruction work.

    Article 12: In the process of information system construction, operating and using work units shall simultaneously construct information security facilities conform to the requirements of their tier according to the “Computer Information System Security Protection Tier Division Standards” (GB17859-1999), the “Basic Requirements for Information System Security Multi-Level Protection” and other such basic standards, and with reference to the “Information Security Technology – Common Security Technology Requirements for Information Systems” (GB/T20271-2006), “Information Security Technology – Basic Network Security Technology Requirements”(GB/T20270-2006), “Information Security Technology – Operating System Security Technology Requirements”(GB/T20272-2006), “Information Security Technology – Database Management System Security Technology Requirements”(GB/T20273-2006),“Information Security Technology – Server Technology Requirements”, “Information Security Technology – Terminal Computer System Security Multi-Level Technology Requirements” (GA/T671-2006) and other such technical standards.

    Article 13: Operating and using work units shall formulate and implement security management structures conform to the requirements of their system’s security protection tier, with reference to the “Information Security Technology – Information System Security Management Requirements” (GB/T20269-2006), “Information Security Technology – Information System Security Project Management Requirements” (GB/T20282-2006), “Basic Requirements for Information System Security Multi-Level Protection” and other such management standards.

    Article 14: After the construction of information systems is completed, operating and using work units or their competent departments shall choose an assessment body meeting the conditions provided in these Rules, to regularly conduct tier assessment of the information system’s security tier status on the basis of the “Information System Security Multi-Level Protection Assessment Requirements”. Third-tier information systems shall undergo tier assessment at least once every year, fourth-tier information systems shall undergo tier assessment at least once every half year, fifth-tier information systems shall undergo tier assessment on the basis of specialized security requirements.

Work units operating and using information systems and their competent departments shall regularly conduct inspections of information systems’ security status, security protection structures and the implementation status of measures. Third tier information systems shall undergo self-inspection at least once every year, fourth-tier information systems shall undergo self-inspection at least once every half year, fifth-tier information systems shall undergo self-inspection on the basis of specialized security requirements.

Where, through assessment or self-inspection, an information system’s security status does not meet their security protection tier’s requirements, operating and using work units shall formulate plans and rectify the matter.

Article 15: For already operating (running) second-tier and higher information systems their operating and using work unit shall, within 30 days after determination of the security protection tier, conduct filing formalities with the city-level or higher public security body of their locality.

For newly-built second-tier and higher information systems, their operating and using work unit shall, within 30 days after entering operations, conduct filing formalities with the city-level or higher public security bodies of their locality.

For work units subordinate to the Centre in Beijing, with information systems operating across provinces or in a national uniformly networked manner, whose tiers are uniformly determined by a competent department, the competent department conducts filing formalities with the Ministry of Public Security. For branch systems of information systems operating across provinces or in a nationwide uniformly networked manner that operate or are used in various localities, filing shall be submitted to the local city-level or higher public security body.

    Article 16: When conducting information security multi-level protection filing formalities an “Information System Security Multi-Level Protection Filing Form” shall be filled out, and the following materials shall simultaneously be submitted for third-tier and higher information systems: (1) system topologies, structures and explanations; (2) system security organization bodies and management structures; (3) system security protection equipment design and implementation plans and reconstruction implementation plans; (4) a list of information security products used on the system and their certification, and proof of sales licences; (5) a technical inspection and assessment report of post-assessment conformity to the system security protection tier; (6) an assessment opinion from the Information Security Protection Tier Expert Assessment Committee; (7) an opinion from the competent department on the examination, verification and approval of information system security protection tiers.

    Article 17: After information systems have been filed, public security bodies shall conduct examination and verification of the information system’s filing status, to those conforming to tier protection requirements, they shall issue an information system security multi-level protection filing certificate within ten working days after receiving the filing materials; where they discover [an information system] does not conform to these Rules and relevant standards, they shall notify the filing work unit within ten working days after receiving the filing materials and allow them to correct the matter; where they discover tier determination is inaccurate, they shall notify the filing work unit within ten working days after receiving the filing materials to examine and determine the matter again.

    Operating and using work units or competent departments shall, after determining an information system’s tier again, submit a new filing with the public security bodies according to these Rules.   

Article 18: Public security departments receiving filings shall conduct an inspection of the information security multi-level protection work status in work units operating and using third-tier and fourth-tier information systems. They shall inspect third-tier information systems at least once every year, and inspect fourth-tier information systems at least once every half year. The inspection of information systems operating across provinces or in a nationwide uniform manner, shall be conducted in coordination with its competent department. 

The inspection of fifth-tier information systems shall be conducted by a State-appointed specialized department.

    Public security bodies and state-appointed specialized departments shall inspect the following matters: (1) whether or not a change has occurred in the information system’s security needs, and the originally determined protection tier is still accurate; (2) the implementation status of the operating and using work unit’s security management structures and methods; (3) the inspection status by operating and using work units of information system security circumstances; (4) whether a system’s security tier assessment conforms to requirements;(5) whether the use of information security products conforms to requirements; (6) the status of information system security improvements; (7) the compliance status of filing materials with operating and using work units and information systems; (8) other matters that shall be subject to supervision and inspection.

    Article 19: Work units operating and using information systems shall accept security supervision, inspection and guidance from public security bodies and State-appointed specialized departments, and accurately provide the following relevant information materials and data files on information security protection to public security bodies and State-appointed specialized departments: (1) changes of status in an information system’s filing items; (2) changes of status in security organization and personnel; (3) changes of status in information security management structures and methods; (4) records of the information system’s operational status; (5) regular inspection records by operating and using work units and their competent departments of the security status of their information system; (6) technical assessment reports of tier assessments conducted on information systems;(7) changes of status in information security products used; (8) information security incident emergency response plans, information security incident emergency response deployment result reports; (9) information system security construction and reconstruction result reports.

    Article 20: Where public security inspections discover that an information system’s security protection status does not comply with information security multi-level protection-related management norms and technical standards, they shall issue a correction notice to operating and using work units. Operating and using work units shall, on the basis of the requirements of the correction notice, conduct correction according to management norms and technical standards. After the correction is completed, they shall file the correction reports with the public security bodies. When necessary, public security bodies may organize inspection of the correction status.

    Article 21: Third-tier and higher information systems shall choose and use information security products meeting the following conditions: (1) the work unit developing and producing the product is invested in by Chinese citizens or legal persons, or State-invested or controlled, and has autonomous legal person qualifications within the borders of the People’s Republic of China; (2) the core technologies and critical components of the product have our country’s indigenous intellectual property rights; (3) the work unit developing and manufacturing the product and the main operational and technical personnel have no criminal records; (4) the work unit developing and manufacturing the product states that they have not willfully left or installed loopholes, back doors, Trojans and other such programmes and functions; (5) it does not constitute a risk to national security, social order and the public interest; (6) where they are already listed in information security product certification catalogues, a certification letter issued by the national information security product certification body shall be obtained.

    Article 22: Third-tier or higher information systems shall choose a multi-level protection assessment body meeting the following conditions to conduct assessment: (1) being registered and established within the borders of the People’s Republic of China (except the Hong Kong, Macau and Taiwan regions); (2) being an enterprise or undertaking work unit invested in by Chinese citizens or Chinese legal persons, or be State-invested or State-controlled (except the Hong Kong, Macau and Taiwan regions); (3) having engaged in related assessment and monitoring work for two years or more, and not having a record of violations of the law; (4) work personnel is limited to Chinese citizens; (5) legal persons and the main operational and technical personnel have no criminal records; (6) technical equipment and facilities used shall conform to the requirements in these Rules on information security products; (7) having complete secrecy protection management, project management, quality management, personnel management, training management and other such security management structures; (8) not constituting a threat to national security, social order and the public interest.

    Article 23: Bodies engaging in information system security tier assessment shall implement the following duties: (1) abiding by relevant State laws and regulations, and technical standards, providing secure, objective and fair assessment and evaluation services, guaranteeing the quality and efficacy of assessment; (2) protecting the State secrets, commercial secrets and personal privacy they learn in the process of assessment activities; (3) conducting security and secrecy protection education for assessment personnel, signing security and secrecy protection letters of responsibility with them, and providing that they shall implement security and secrecy protection duties and bear legal liability, and are responsible for inspecting their implementation.

    Chapter IV: Tiered protection and management of State secret-related information systems

Article 14: Secrecy-related information systems shall be protected on the basis of the basic requirements of national information security multi-level protection, according to the management norms and technical standards of the State secrecy protection work department concerning tiered protection of secrecy-related information systems, and in integration with the actual status of the system. State secret information may not be processed on non-secrecy-related information systems.

Article 25: Secrecy-related information systems will, according to the highest classification level of the information they process, be divided into three tiers, from high to low: secret, top secret and absolute secret.

Work units constructing and using secrecy-related information systems shall determine system tiers on the basis of determining secrecy through information norms, on the basis of secrecy-related information system tiered protection management rules and the State secrecy protection standard BMB17-2006 “Technical Requirements for Tiered Protection of Computer Information Systems Involving State Secrets”. With regard to secrecy-related information systems containing multiple security areas, protection tiers may be determined separately for every security area.

    Secrecy protection work departments and bodies shall supervise and guide work units building and using secrecy-related information systems, and reasonably conduct system tier determination.

    Article 26: Work units constructing and using secrecy-related information systems shall timely report their secrecy-related information tier determination and construction and use status to their operational competent department’s secrecy protection work body and the secrecy protection work department responsible for system examination and approval for filing, and accept the supervision, inspection and guidance of secrecy protection departments.

    Article 27: Work units constructing and using secrecy-related information systems shall choose a work unit holding secrecy-related integration qualifications to undertake or participate in the design and implementation of secrecy-related information systems.

    Work units constructing and operating secrecy-related information systems shall conduct planning and design on the basis of secrecy-related information system tiered protection management norms and technical standards, according to the different requirements of the three tiers of secret, top secret and absolute secret, and in integration of systems’ reality, and implement tiered protection, their protection levels in general is not lower than the third-tier, fourth-tier and fifth-tier levels of national information security multi-level protection.

    Article 28: Domestic products shall, in principle, be chosen for information security secrecy protection products used in secrecy-related information systems, these shall pass inspections conducted by examination bodies authorized by the State Secrets Protection Bureau on the basis of State secret protection-related standards, products that have passed examination will be listed in a catalogue examined and published by the State Secrets Protection Bureau.

    Article 29: Work units constructing and using secrecy-related information systems shall, after the system’s project implementation is concluded, put forward an application with the secrecy protection work department, for a system assessment body authorized by the State Secrets Protection Bureau to conduct a secrecy protection assessment of the secrecy-related information system on the basis of national secrecy protection standard BMB22-2007 “Assessment Guidelines for the Tiered Protection of Computer Information Systems Involving State Secrets”.

    Work units constructing and using secrecy-related in information systems shall, before the system is put into use, apply with the city-level or higher secrecy protection work department for system examination and approval to be conducted according to the “Management Regulations for the Examination and Approval of Information Systems Involving State Secrets”, secrecy-related information systems may only be put into use after passing examination and approval. For secrecy-related information systems already put into use, their constructing and using work unit shall, after completing the system’s reconstruction according to tiered protection requirements, file the matter with the secrecy protection work department.

    Article 30: Work units constructing and using secrecy-related information systems shall, when applying for system examination and approval or filing, submit the following materials: (1) the system’s design, implementation plan and inspection analysis result; (2) certification materials of the qualifications of the work unit building the system; (3) a report of the system’s construction and project supervision status; (4) a report of the system’s security and secrecy protection inspection and assessment; (5) the status of system security and secrecy protection organization bodies and management structures; (6) other relevant materials.

    Article 31: When a change occurs in the secrecy tier, scope of connection, environmental facilities, main functioning, or responsible work units for security and secrecy protection management of secrecy-related information systems, the work units constructing or using them shall timely report the matter to the secrecy protection work department responsible for examination and approval. The secrecy protection work department shall, on the basis of the actual circumstances, decide whether or not to conduct assessment, examination and approval again.

    Article 32: Work units constructing and using secrecy-related information systems shall, on the basis of State secrecy protection standard BMB20-2007 “Management Norms for the Tiered Protection of Information Systems Involving State Secrets”, strengthen secrecy protection management in the operations of secrecy-related information systems, regularly conduct risk assessments, and eliminate leaks, vulnerabilities and loopholes.

Article 33: The national and all local levels’ secrecy protection work departments will implement supervision and management over tiered protection work of secrecy-related information systems of all localities and all departments, and complete the following work: (1) guiding, supervising and inspection the conduct of tiered protection work; (2) guiding work units operating and using secrecy-related information systems in standardizing information secrecy determination, and rationally determining systems’ protection tier; (3) participating in the analysis of secrecy-related information system tiered protection plans, guiding constructing and using work units to perform simultaneous planning and design of secrecy-protection equipment; (4) conducting supervision and management according to the law over work units with integration qualifications for secrecy-related information systems; (5) strictly conducting system assessment, examination and approval work, supervising and inspection the implementation status of tiered protection management structures and technical measures of work units constructing and using secrecy-related information system; (6) strengthening secrecy protection and inspection of secrecy-related information systems during operations. Secrecy protection inspection or system assessments are conducted at least once every two years for secret and top secret information systems, secrecy protection inspection or system assessments are conducted at least once every year for absolute secret information systems; (7)understanding and grasping the management and use status of secrecy-related information systems at all levels and of all categories, timely discovering, investigating and handling all kinds of acts violating laws and regulations and leakage incidents.

Chapter V: Encryption management in information security multi-level protection 

Article 34: The national encryption management department conducts categorized and tiered management of information security multi-level protection. On the basis of role and degree of importance of the protection counterpart in national security, social stability and economic construction, the protection counterpart’s security protection requirements and degree of involvement with secrets, the degree of harm after the destruction of the protection counterpart as well as the nature of encryption-using departments, etc., tiered protection norms for encryption are determined.

Work units operating and using information systems using encryption to conduct tiered protection shall abide by the “Information Security Multi-Level Protection Encryption Management Rules”, the “Technological Requirements for Commercial Encryption in Information Security Multi-Level Protection” and other such encryption management regulations and related standards.

Article 35: The installation, use and management of encryption in information system security multi-level protection shall strictly implement related State provisions concerning encryption management.

Article 36: Work units operating and using information systems shall fully use encryption technology to protect information systems. Where encryption is adopted to conduct protection of information and information systems involving State secrets, they shall report to the National Encryption Management Bureau for examination and approval, the design, implementation, use, operations, maintenance and daily management of encryption, etc., shall be executed according to State encryption management-related regulations and related standards; where encryption is adopted to protect information and information systems not involving State secrets, it must abide by the “Commercial Encryption Management Regulations” and regulations related to tiered and categorized encryption management and related standards, the installation and use status of encryption shall be reported to the national encryption management body for filing.

    Article 37: Where encryption technology is used to conduct tiered system protection construction or reconstruction of information systems, encryption products that passed approval for use approval for sale by the national encryption management departments must be adopted, foreign import or unauthorized, self-developed encryption products may not be used; without approval, it is prohibited to use imported information technology products containing encryption functions.

    Article 8: Assessment work of encryption in information systems and encryption equipment is conducted by an assessment body recognized by the State Encryption Management Bureau, no other department, work unit or individual may conduct encryption assessment or monitoring.

Article 39: All levels’ encryption management departments may, on a regular or non-regular basis, conduct inspections and assessments of the encryption installation, use and management status in information systems’ multi-level protection work, the encryption installation, use and management status of important secrecy-related information systems will be inspected and assessed at least once every two years. Where, in the process of supervision and inspection, the existence is discovered of security vulnerabilities, violations of encryption management-related regulations, or non-achievement of encryption-related standard requirements, the matters shall be handled according to State encryption management-related regulations.

    Chapter VI: Legal liability

Article 40: Where third-tier or higher work units operating and using information systems violating the provisions of these Rules, and one of the following acts is present, the public security body, State secrecy protection work department and State encryption work management department will, according to their respective duties and responsibilities, order them to correct the matter within a limited time; where they have not corrected the matter within this time, they will receive a warning, and the situation will be reported to their higher-level competent department, suggesting the directly responsible persons in charge and other directly responsible personnel is punished, and the punishment outcomes are to be timely reported back: (1) not having filed or undergone examination and approval according to these Rules; (2) not implementing security management structures and measures according to these Rules; (3) not conducting system security status inspections according to the provisions of these Rules; (4) not conducting system security technical monitoring according to the provisions of these Rules; (5) after receiving a correction notification, refusing to correct; (6) not choosing and using information security products and assessment bodies according to the provisions of these Rules; (7)not accurately providing relevant documents and certification materials according to the provisions of these Rules; (8) violating secrecy protection management regulations; (9) violating encryption management regulations; (10) violating other provisions of these Rules.

Where the violation of the provisions in the previous Paragraph results in grave harm, the relevant department imposes punishment according to relevant laws and regulations.

    Article 41: Where information security supervision and management departments and their work personnel, during the implementation of their supervision and management duties, commit dereliction of duties, abuse their powers, or engage in embezzlement or malpractice, they will be subject to administrative punishment according to the law; where it constitutes a crime, criminal liability is prosecuted according to the law. 

    Chapter VII: Supplementary provisions

Article 42: Operating and using work units already operating information systems will determine the security protection tier of the information system within 180 days after these Rules take effect; and determine the security protection tier of newly-built information in the design and planning phase.  

Article 43: “Or higher” as mentioned in these Rules includes the number (or tier) in question.

    Article 44: These Rules take effect on the date of promulgation, the “Information Security Multi-Level Protection Management Rules (Trial)” (GTZ No. [2006]7 are abolished at the same time.

关于印发《信息安全等级保护管理办法》的通知

各省、自治区、直辖市公安厅(局)、保密局、国家密码管理局(国家密码管理委员会办公室)、信息化领导小组办公室,新疆生产建设兵团公安局、保密局、国家密码管理局、信息化领导小组办公室,中央和国家机关各部委保密委员会办公室、密码工作领导小组办公室、信息化领导小组办公室,各人民团体保密委员会办公室:

    为加快推进信息安全等级保护,规范信息安全等级保护管理,提高信息安全保障能力和水平,维护国家安全、社会稳定和公共利益,保障和促进信息化建设,公安部、国家保密局、国家密码管理局、国务院信息化工作办公室制定了《信息安全等级保护管理办法》。现印发给你们,请认真贯彻执行。

公安部    国家保密局          

国家密码管理局   国务院信息工作办公室

 二〇〇七年六月二十二日            

信息安全等级保护管理办法

    第一章 总则

    第一条 为规范信息安全等级保护管理,提高信息安全保障能力和水平,维护国家安全、社会稳定和公共利益,保障和促进信息化建设,根据《中华人民共和国计算机信息系统安全保护条例》等有关法律法规,制定本办法。

    第二条 国家通过制定统一的信息安全等级保护管理规范和技术标准,组织公民、法人和其他组织对信息系统分等级实行安全保护,对等级保护工作的实施进行监督、管理。

    第三条 公安机关负责信息安全等级保护工作的监督、检查、指导。国家保密工作部门负责等级保护工作中有关保密工作的监督、检查、指导。国家密码管理部门负责等级保护工作中有关密码工作的监督、检查、指导。涉及其他职能部门管辖范围的事项,由有关职能部门依照国家法律法规的规定进行管理。国务院信息化工作办公室及地方信息化领导小组办事机构负责等级保护工作的部门间协调。

    第四条 信息系统主管部门应当依照本办法及相关标准规范,督促、检查、指导本行业、本部门或者本地区信息系统运营、使用单位的信息安全等级保护工作。

    第五条 信息系统的运营、使用单位应当依照本办法及其相关标准规范,履行信息安全等级保护的义务和责任。

    第二章 等级划分与保护

    第六条 国家信息安全等级保护坚持自主定级、自主保护的原则。信息系统的安全保护等级应当根据信息系统在国家安全、经济建设、社会生活中的重要程度,信息系统遭到破坏后对国家安全、社会秩序、公共利益以及公民、法人和其他组织的合法权益的危害程度等因素确定。

    第七条 信息系统的安全保护等级分为以下五级:

    第一级,信息系统受到破坏后,会对公民、法人和其他组织的合法权益造成损害,但不损害国家安全、社会秩序和公共利益。

    第二级,信息系统受到破坏后,会对公民、法人和其他组织的合法权益产生严重损害,或者对社会秩序和公共利益造成损害,但不损害国家安全。

    第三级,信息系统受到破坏后,会对社会秩序和公共利益造成严重损害,或者对国家安全造成损害。

    第四级,信息系统受到破坏后,会对社会秩序和公共利益造成特别严重损害,或者对国家安全造成严重损害。

    第五级,信息系统受到破坏后,会对国家安全造成特别严重损害。

    第八条 信息系统运营、使用单位依据本办法和相关技术标准对信息系统进行保护,国家有关信息安全监管部门对其信息安全等级保护工作进行监督管理。

    第一级信息系统运营、使用单位应当依据国家有关管理规范和技术标准进行保护。

    第二级信息系统运营、使用单位应当依据国家有关管理规范和技术标准进行保护。国家信息安全监管部门对该级信息系统信息安全等级保护工作进行指导。

    第三级信息系统运营、使用单位应当依据国家有关管理规范和技术标准进行保护。国家信息安全监管部门对该级信息系统信息安全等级保护工作进行监督、检查。

    第四级信息系统运营、使用单位应当依据国家有关管理规范、技术标准和业务专门需求进行保护。国家信息安全监管部门对该级信息系统信息安全等级保护工作进行强制监督、检查。

    第五级信息系统运营、使用单位应当依据国家管理规范、技术标准和业务特殊安全需求进行保护。国家指定专门部门对该级信息系统信息安全等级保护工作进行专门监督、检查。

    第三章 等级保护的实施与管理

    第九条 信息系统运营、使用单位应当按照《信息系统安全等级保护实施指南》具体实施等级保护工作。

    第十条 信息系统运营、使用单位应当依据本办法和《信息系统安全等级保护定级指南》确定信息系统的安全保护等级。有主管部门的,应当经主管部门审核批准。

    跨省或者全国统一联网运行的信息系统可以由主管部门统一确定安全保护等级。

    对拟确定为第四级以上信息系统的,运营、使用单位或者主管部门应当请国家信息安全保护等级专家评审委员会评审。

    第十一条 信息系统的安全保护等级确定后,运营、使用单位应当按照国家信息安全等级保护管理规范和技术标准,使用符合国家有关规定,满足信息系统安全保护等级需求的信息技术产品,开展信息系统安全建设或者改建工作。

    第十二条 在信息系统建设过程中,运营、使用单位应当按照《计算机信息系统安全保护等级划分准则》(GB17859-1999)、《信息系统安全等级保护基本要求》等技术标准,参照《信息安全技术 信息系统通用安全技术要求》(GB/T20271-2006)、《信息安全技术 网络基础安全技术要求》(GB/T20270-2006)、《信息安全技术 操作系统安全技术要求》(GB/T20272-2006)、《信息安全技术 数据库管理系统安全技术要求》(GB/T20273-2006)、《信息安全技术 服务器技术要求》、《信息安全技术 终端计算机系统安全等级技术要求》(GA/T671-2006)等技术标准同步建设符合该等级要求的信息安全设施。

    第十三条 运营、使用单位应当参照《信息安全技术 信息系统安全管理要求》(GB/T20269-2006)、《信息安全技术 信息系统安全工程管理要求》(GB/T20282-2006)、《信息系统安全等级保护基本要求》等管理规范,制定并落实符合本系统安全保护等级要求的安全管理制度。

    第十四条 信息系统建设完成后,运营、使用单位或者其主管部门应当选择符合本办法规定条件的测评机构,依据《信息系统安全等级保护测评要求》等技术标准,定期对信息系统安全等级状况开展等级测评。第三级信息系统应当每年至少进行一次等级测评,第四级信息系统应当每半年至少进行一次等级测评,第五级信息系统应当依据特殊安全需求进行等级测评。

    信息系统运营、使用单位及其主管部门应当定期对信息系统安全状况、安全保护制度及措施的落实情况进行自查。第三级信息系统应当每年至少进行一次自查,第四级信息系统应当每半年至少进行一次自查,第五级信息系统应当依据特殊安全需求进行自查。

    经测评或者自查,信息系统安全状况未达到安全保护等级要求的,运营、使用单位应当制定方案进行整改。

    第十五条 已运营(运行)的第二级以上信息系统,应当在安全保护等级确定后30日内,由其运营、使用单位到所在地设区的市级以上公安机关办理备案手续。

    新建第二级以上信息系统,应当在投入运行后30日内,由其运营、使用单位到所在地设区的市级以上公安机关办理备案手续。

    隶属于中央的在京单位,其跨省或者全国统一联网运行并由主管部门统一定级的信息系统,由主管部门向公安部办理备案手续。跨省或者全国统一联网运行的信息系统在各地运行、应用的分支系统,应当向当地设区的市级以上公安机关备案。

    第十六条 办理信息系统安全保护等级备案手续时,应当填写《信息系统安全等级保护备案表》,第三级以上信息系统应当同时提供以下材料:(一)系统拓扑结构及说明;(二)系统安全组织机构和管理制度;(三)系统安全保护设施设计实施方案或者改建实施方案; (四)系统使用的信息安全产品清单及其认证、销售许可证明; (五)测评后符合系统安全保护等级的技术检测评估报告;(六)信息系统安全保护等级专家评审意见;(七)主管部门审核批准信息系统安全保护等级的意见。

    第十七条 信息系统备案后,公安机关应当对信息系统的备案情况进行审核,对符合等级保护要求的,应当在收到备案材料之日起的10个工作日内颁发信息系统安全等级保护备案证明;发现不符合本办法及有关标准的,应当在收到备案材料之日起的10个工作日内通知备案单位予以纠正;发现定级不准的,应当在收到备案材料之日起的10个工作日内通知备案单位重新审核确定。

    运营、使用单位或者主管部门重新确定信息系统等级后,应当按照本办法向公安机关重新备案。

    第十八条 受理备案的公安机关应当对第三级、第四级信息系统的运营、使用单位的信息安全等级保护工作情况进行检查。对第三级信息系统每年至少检查一次,对第四级信息系统每半年至少检查一次。对跨省或者全国统一联网运行的信息系统的检查,应当会同其主管部门进行。

    对第五级信息系统,应当由国家指定的专门部门进行检查。

    公安机关、国家指定的专门部门应当对下列事项进行检查:(一) 信息系统安全需求是否发生变化,原定保护等级是否准确;(二) 运营、使用单位安全管理制度、措施的落实情况;(三) 运营、使用单位及其主管部门对信息系统安全状况的检查情况;(四) 系统安全等级测评是否符合要求;(五) 信息安全产品使用是否符合要求; (六) 信息系统安全整改情况;(七) 备案材料与运营、使用单位、信息系统的符合情况;(八) 其他应当进行监督检查的事项。

    第十九条 信息系统运营、使用单位应当接受公安机关、国家指定的专门部门的安全监督、检查、指导,如实向公安机关、国家指定的专门部门提供下列有关信息安全保护的信息资料及数据文件:(一) 信息系统备案事项变更情况;(二) 安全组织、人员的变动情况;(三) 信息安全管理制度、措施变更情况;(四) 信息系统运行状况记录;(五) 运营、使用单位及主管部门定期对信息系统安全状况的检查记录;(六) 对信息系统开展等级测评的技术测评报告; (七) 信息安全产品使用的变更情况;(八) 信息安全事件应急预案,信息安全事件应急处置结果报告; (九) 信息系统安全建设、整改结果报告。

    第二十条 公安机关检查发现信息系统安全保护状况不符合信息安全等级保护有关管理规范和技术标准的,应当向运营、使用单位发出整改通知。运营、使用单位应当根据整改通知要求,按照管理规范和技术标准进行整改。整改完成后,应当将整改报告向公安机关备案。必要时,公安机关可以对整改情况组织检查。

    第二十一条 第三级以上信息系统应当选择使用符合以下条件的信息安全产品:(一)产品研制、生产单位是由中国公民、法人投资或者国家投资或者控股的,在中华人民共和国境内具有独立的法人资格;(二)产品的核心技术、关键部件具有我国自主知识产权;(三)产品研制、生产单位及其主要业务、技术人员无犯罪记录; (四)产品研制、生产单位声明没有故意留有或者设置漏洞、后门、木马等程序和功能;(五)对国家安全、社会秩序、公共利益不构成危害;(六)对已列入信息安全产品认证目录的,应当取得国家信息安全产品认证机构颁发的认证证书。

    第二十二条 第三级以上信息系统应当选择符合下列条件的等级保护测评机构进行测评:(一) 在中华人民共和国境内注册成立(港澳台地区除外);(二) 由中国公民投资、中国法人投资或者国家投资的企事业单位(港澳台地区除外);(三) 从事相关检测评估工作两年以上,无违法记录;(四) 工作人员仅限于中国公民;(五) 法人及主要业务、技术人员无犯罪记录;(六) 使用的技术装备、设施应当符合本办法对信息安全产品的要求; (七) 具有完备的保密管理、项目管理、质量管理、人员管理和培训教育等安全管理制度;(八) 对国家安全、社会秩序、公共利益不构成威胁。

    第二十三条 从事信息系统安全等级测评的机构,应当履行下列义务:(一)遵守国家有关法律法规和技术标准,提供安全、客观、公正的检测评估服务,保证测评的质量和效果;(二)保守在测评活动中知悉的国家秘密、商业秘密和个人隐私,防范测评风险;(三)对测评人员进行安全保密教育,与其签订安全保密责任书,规定应当履行的安全保密义务和承担的法律责任,并负责检查落实。

    第四章 涉及国家秘密信息系统的分级保护管理

    第二十四条 涉密信息系统应当依据国家信息安全等级保护的基本要求,按照国家保密工作部门有关涉密信息系统分级保护的管理规定和技术标准,结合系统实际情况进行保护。非涉密信息系统不得处理国家秘密信息。

    第二十五条 涉密信息系统按照所处理信息的最高密级,由低到高分为秘密、机密、绝密三个等级。

    涉密信息系统建设使用单位应当在信息规范定密的基础上,依据涉密信息系统分级保护管理办法和国家保密标准BMB17-2006《涉及国家秘密的计算机信息系统分级保护技术要求》确定系统等级。对于包含多个安全域的涉密信息系统,各安全域可以分别确定保护等级。

    保密工作部门和机构应当监督指导涉密信息系统建设使用单位准确、合理地进行系统定级。

    第二十六条 涉密信息系统建设使用单位应当将涉密信息系统定级和建设使用情况,及时上报业务主管部门的保密工作机构和负责系统审批的保密工作部门备案,并接受保密部门的监督、检查、指导。

    第二十七条 涉密信息系统建设使用单位应当选择具有涉密集成资质的单位承担或者参与涉密信息系统的设计与实施。

    涉密信息系统建设使用单位应当依据涉密信息系统分级保护管理规范和技术标准,按照秘密、机密、绝密三级的不同要求,结合系统实际进行方案设计,实施分级保护,其保护水平总体上不低于国家信息安全等级保护第三级、第四级、第五级的水平。

    第二十八条 涉密信息系统使用的信息安全保密产品原则上应当选用国产品,并应当通过国家保密局授权的检测机构依据有关国家保密标准进行的检测,通过检测的产品由国家保密局审核发布目录。

    第二十九条 涉密信息系统建设使用单位在系统工程实施结束后,应当向保密工作部门提出申请,由国家保密局授权的系统测评机构依据国家保密标准BMB22-2007《涉及国家秘密的计算机信息系统分级保护测评指南》,对涉密信息系统进行安全保密测评。

    涉密信息系统建设使用单位在系统投入使用前,应当按照《涉及国家秘密的信息系统审批管理规定》,向设区的市级以上保密工作部门申请进行系统审批,涉密信息系统通过审批后方可投入使用。已投入使用的涉密信息系统,其建设使用单位在按照分级保护要求完成系统整改后,应当向保密工作部门备案。

    第三十条 涉密信息系统建设使用单位在申请系统审批或者备案时,应当提交以下材料:(一)系统设计、实施方案及审查论证意见;(二)系统承建单位资质证明材料;(三)系统建设和工程监理情况报告;(四)系统安全保密检测评估报告;(五)系统安全保密组织机构和管理制度情况;(六)其他有关材料。

    第三十一条 涉密信息系统发生涉密等级、连接范围、环境设施、主要应用、安全保密管理责任单位变更时,其建设使用单位应当及时向负责审批的保密工作部门报告。保密工作部门应当根据实际情况,决定是否对其重新进行测评和审批。

    第三十二条 涉密信息系统建设使用单位应当依据国家保密标准BMB20-2007《涉及国家秘密的信息系统分级保护管理规范》,加强涉密信息系统运行中的保密管理,定期进行风险评估,消除泄密隐患和漏洞。

    第三十三条 国家和地方各级保密工作部门依法对各地区、各部门涉密信息系统分级保护工作实施监督管理,并做好以下工作:(一)指导、监督和检查分级保护工作的开展;(二)指导涉密信息系统建设使用单位规范信息定密,合理确定系统保护等级;(三)参与涉密信息系统分级保护方案论证,指导建设使用单位做好保密设施的同步规划设计;(四)依法对涉密信息系统集成资质单位进行监督管理;(五)严格进行系统测评和审批工作,监督检查涉密信息系统建设使用单位分级保护管理制度和技术措施的落实情况;(六)加强涉密信息系统运行中的保密监督检查。对秘密级、机密级信息系统每两年至少进行一次保密检查或者系统测评,对绝密级信息系统每年至少进行一次保密检查或者系统测评;(七)了解掌握各级各类涉密信息系统的管理使用情况,及时发现和查处各种违规违法行为和泄密事件。

    第五章 信息安全等级保护的密码管理

    第三十四条 国家密码管理部门对信息安全等级保护的密码实行分类分级管理。根据被保护对象在国家安全、社会稳定、经济建设中的作用和重要程度,被保护对象的安全防护要求和涉密程度,被保护对象被破坏后的危害程度以及密码使用部门的性质等,确定密码的等级保护准则。

    信息系统运营、使用单位采用密码进行等级保护的,应当遵照《信息安全等级保护密码管理办法》、《信息安全等级保护商用密码技术要求》等密码管理规定和相关标准。

    第三十五条 信息系统安全等级保护中密码的配备、使用和管理等,应当严格执行国家密码管理的有关规定。

    第三十六条 信息系统运营、使用单位应当充分运用密码技术对信息系统进行保护。采用密码对涉及国家秘密的信息和信息系统进行保护的,应报经国家密码管理局审批,密码的设计、实施、使用、运行维护和日常管理等,应当按照国家密码管理有关规定和相关标准执行;采用密码对不涉及国家秘密的信息和信息系统进行保护的,须遵守《商用密码管理条例》和密码分类分级保护有关规定与相关标准,其密码的配备使用情况应当向国家密码管理机构备案。

    第三十七条 运用密码技术对信息系统进行系统等级保护建设和整改的,必须采用经国家密码管理部门批准使用或者准于销售的密码产品进行安全保护,不得采用国外引进或者擅自研制的密码产品;未经批准不得采用含有加密功能的进口信息技术产品。

    第三十八条 信息系统中的密码及密码设备的测评工作由国家密码管理局认可的测评机构承担,其他任何部门、单位和个人不得对密码进行评测和监控。

    第三十九条 各级密码管理部门可以定期或者不定期对信息系统等级保护工作中密码配备、使用和管理的情况进行检查和测评,对重要涉密信息系统的密码配备、使用和管理情况每两年至少进行一次检查和测评。在监督检查过程中,发现存在安全隐患或者违反密码管理相关规定或者未达到密码相关标准要求的,应当按照国家密码管理的相关规定进行处置。

    第六章 法律责任

    第四十条 第三级以上信息系统运营、使用单位违反本办法规定,有下列行为之一的,由公安机关、国家保密工作部门和国家密码工作管理部门按照职责分工责令其限期改正;逾期不改正的,给予警告,并向其上级主管部门通报情况,建议对其直接负责的主管人员和其他直接责任人员予以处理,并及时反馈处理结果: (一) 未按本办法规定备案、审批的;(二) 未按本办法规定落实安全管理制度、措施的;(三) 未按本办法规定开展系统安全状况检查的;(四) 未按本办法规定开展系统安全技术测评的;(五) 接到整改通知后,拒不整改的;(六) 未按本办法规定选择使用信息安全产品和测评机构的;(七) 未按本办法规定如实提供有关文件和证明材料的;(八) 违反保密管理规定的;(九) 违反密码管理规定的;(十) 违反本办法其他规定的。

    违反前款规定,造成严重损害的,由相关部门依照有关法律、法规予以处理。

    第四十一条 信息安全监管部门及其工作人员在履行监督管理职责中,玩忽职守、滥用职权、徇私舞弊的,依法给予行政处分;构成犯罪的,依法追究刑事责任。

    第七章 附则

    第四十二条 已运行信息系统的运营、使用单位自本办法施行之日起180日内确定信息系统的安全保护等级;新建信息系统在设计、规划阶段确定安全保护等级。

    第四十三条 本办法所称“以上”包含本数(级)。

    第四十四条 本办法自发布之日起施行,《信息安全等级保护管理办法(试行)》(公通字[2006]7号)同时废止。 

Notice concerning Strengthening Governance over Peddlers and Street Stalls Selling Pirated and Illegal Products and Unlicensed Operations and Activities

Posted on Updated on

All provincial, autonomous region and municipal “Sweeping Pornography and Striking Illegality” work leading small group offices, public security offices (bureaus), construction offices (committees), cultural offices (bureaus), press and publications bureaus, industry and commerce bureau, the Xinjiang Production-Construction Corps Public Security Bureaus: Read the rest of this entry »

Notice Concerning Launching a Concentrated Campaign Attacking Pirated Audiovisual and Computer Software Products

Posted on Updated on

All provincial, autonomous region and municipal “Sweeping Pornography and Striking Illegality” leading small group offices, Party Committee Propaganda Departments, Politico-legal committees, culture offices (bureaus), press and publications bureaus, copyright bureaus, industry and commerce bureaus, industry and commerce bureaus, public security offices (bureaus), construction offices (commissions), supervision offices (bureaus): Read the rest of this entry »

Announcement concerning Launching the Anti-Piracy Hundred Days Campaign

Posted on Updated on

All provincial, autonomous region and municipal “Sweeping Pornography and Striking Illegality” work leading small groups, culture offices (bureaus), press and publications bureaus, copyright bureaus, industry and commerce bureaus, public security offices(bureaus), construction offices (committees), supervision offices (bureaus):

Read the rest of this entry »

Public Security Bureau, National Copyright Administration Temporary Regulations Concerning Strengthening Cooperation and Coordination in the Attack Work on Unlawful and Criminal Copyright Infringement

Posted on Updated on

Promulgated on 26 March 2006

Article 1: In order to strengthen the coordination and cooperation of Public Security organs and the copyright administrative management entities (hereafter named “both parties”), to severely attack unlawful and criminal acts of copyright infringement, to protect the copyright and related rights of the authors of literary, artistic and scientific works, and to stimulate the development and prospering of cultural and scientific enterprises, these Regulations are formulated in accordance with the “Criminal Law of the People’s Republic of China”, the “Copyright Law of the People’s Republic of China”, the “Regulations on Transfer of Suspected Criminal Cases by Administrative Enforcement Entities” and related laws and regulations. Read the rest of this entry »

Coordinated Work Plan for Internet Site Management

Posted on Updated on

Notice concerning Printing and Issuing the “Coordinated Work Plan for Internet Site Management”

17 February 2006

All provincial, autonomous region and municipal Party Committee Propaganda Departments, telecommunications management bureaus, information offices, education offices (education commissions), cultural offices (bureaus), public security offices (bureaus), national security offices (bureaus), radio, film and television bureaus, press and publications bureaus, secrecy preservation bureaus, administrative industry and commerce management bureaus, food and drug supervision and management bureaus (drug supervision and management bureaus):

On the basis of the uniform deployment of the Centre, relevant departments launched joint and concentrated clean-up and rectification work of Internet sites between November 2004 and June 2005. In this concentrated campaign, all departments resolutely grasped implementation according to the “Plan for the Centralized Launch of Internet Site Clean-Up and Rectification Work”, acted vigorously, cooperated closely, accumulated certain experiences in coordinated work, and laid a firm basis for further doing daily supervision and management work of the Internet well. Read the rest of this entry »

Information Security Multi-Level Protection Management Rules (Trial)

Posted on Updated on

Ministry of Public Security, National Administration of State Secrets Protection, State Cryptography Administration, Staten Council Informatization Work Office

17 January 2006

(GTZ No. [2006]7)

Chapter I: General Provisions

Article 1: In order to strengthen information security multi-level protection, standardize information security multi-level protection management, raise information security protection capabilities and levels, safeguard national security, social stability and the public interest, ensure and stimulate informatization construction, on the basis of national relevant laws and regulations such as the “Computer and Information System Security Protection Regulations of the People’s Republic of China”, these Rules are formulated.

Article 2: Information security multi-level protection refers to implementing security protection in a tiered manner for national secrets information and proprietary information of citizens, legal persons and other organizations as well as the information systems storing, transmitting and processing this information, implementing tiered management of information security products used in information systems, and responding to and handling information security incidents occurring on information systems in a tiered manner. 

Article 3: Security protection tiers of information systems shall be determined on the basis of the degree of importance of the information and information system in national security, economic construction and social life, the degree of harm to national security, social order, the public interest as well as the lawful rights and interests of citizens, legal persons and other organizations if the information or information systems are destroyed, the basic security protection levels the information and information systems should reach, and other such factors.

Article 4: Security protection tiers for information systems are divided into the following five levels:

(1) The first tier is the self-protection tier, it applies to ordinary information system where, after they are destroyed, harm is created to the lawful rights and interests of citizens, legal persons and other organizations, but national security, social order and the public interest is not harmed.

(2) The second tier is the guided protection tier, it applies to ordinary information systems where, after they are destroyed, light harm is created to social order and the public interest, but national security is not harmed.

(3) The third tier is the supervised protection tier, it applies to important information systems involving national security, social order and the public interest where, after they are destroyed, harm is created to national security, social order and the public interest.

(4) The fourth tier is the mandatory protection tier, it applies to important information systems involving national security, social order and the public interest where, after they are destroyed, grave harm is created to national security, social order and the public interest.

(5) The fifth tier is the special control protection level, it applies to core sub-systems of important information systems involving national security, social order and the public interest where, after they are destroyed, especially grave harm is created to national security, social order and the public interest.

Article 5: Information system operating and using work units and individual conduct protection of information system according to these Rules and related technical standards, relevant State information security functional departments conduct supervision and management over information security multi-level protection work.

(1) First-tier information system operating and using work units or individuals may conduct protection on the basis of State management norms and technical standards.

(2) Second-tier information system operating and using work units or individuals shall conduct protection on the basis of State management norms and technical standards. When necessary, relevant State information security functional departments may conduct guidance over their information security multi-level protection work.

(3) Third-tier information system operating and using work units shall conduct protection on the basis of State management norms and technical standards, relevant State information security functional departments conduct supervision and inspection of their information security multi-level protection work.

(4) Fourth-tier information system operating and using work units shall conduct protection on the basis of State management norms and technical standards, relevant State information security functional departments conduct mandatory supervision and inspection of their information security multi-level protection work.

(5) Fifth-tier information system operating and using work units shall conduct protection on the basis of State management norms and technical standards, State-appointed specialized departments or specialized bodies conduct specialized supervision and inspection of their information security multi-level protection work.

Article 6: Public security bodies are responsible for the supervision, inspection and guidance of information security multi-level protection work. State secrecy protection work departments are responsible for the supervision, inspection and guidance of state secret-related work in information security multi-level protection work. State encryption management departments are responsible for the supervision, inspection and guidance of encryption-related work in information security multi-level protection work. 

Matters involving the scope of jurisdiction of other functional departments are managed by the relevant department according to the provisions of State laws and regulations.

The State Council Informatization Work Office and local informatization leading group office bodies are responsible for interdepartmental coordinating of multi-level protection work.

Chapter II: Information security multi-level protection work security management

Article 7: Information system operating and using work units shall, on the basis of these Rules and relevant standards, determine the security protection tier of information systems. Where they have a competent department, they shall report to the competent department for examination and approval.

Article 8: Information system operating and using work units shall conduct information system construction, on the basis of already determined security protection tiers, according to these Rules and relevant technical standards, and use information technology products that conform to relevant State regulations and satisfy information system security protection tier requirements.

Article 9: Information system operating and using work units shall implement the following security multi-level protection duties and responsibilities:

(1) Implementing responsible departments and personnel for information security multi-level protection, to be responsible for information system security multi-level protection management work;

(2) Establishing and completing security multi-level protection management structures;

(3) Implementing the requirements of security multi-level protection technical standards;

(4) Regularly conducting security state monitoring and risk assessment;

(5) Establishing information security incident tiered response and processing systems;

(6) Being responsible for security multi-level protection education and training of information system users;

(7) Other security multi-level protection duties and responsibilities they should fulfil.

Article 10: After information system constructions are complete, their operating and using work unit shall, on the basis of these Rules, select a monitoring work unit holding relevant State technical qualifications and security qualifications, to conduct security monitoring according to technical standards, and only when they conform to requirements, may they be put into use.

Article 11: Work units engaging in information security security tiered monitoring shall abide by the provisions of relevant State laws and regulations, and technical standards, protect State secrets, commercial secrets and personal privacy they learn during monitoring activities, and provide secure, objective and fair monitoring and assessment services.

Monitoring work unit qualification management rules will be formulated separately by relevant departments.

Article 12: Third-tier and higher information system operating and using work units shall, within 30 days from the day of starting the operation of a system, go to a receiving body appointed by the local provincial, autonomous region or municipal public security body to conduct filing procedures, and fill out an “Information System Security Protection Tier Filing Registration Form”. Except where the State has provided otherwise.

When a change occurs in the filed matter, the information system operating and using work unit or their competent department shall report the changed circumstances to the original filing body within 30 days after the day of change.

Article 13: Public security bodies shall grasp the filing situation of information system operating and using work units, establish file dossiers, and conduct filing management. Where someone is discovered not to follow these Regulations and other relevant standards, they shall notify them and order rectification.

Article 14: Public security bodies shall supervise and inspect the situation of security multi-level protection duties and responsibilities fulfilled by work units operating and using third-tier and fourth-tier information systems.

Information systems of a third-tier security protection level will be subject to at least one inspection per year, information system of a fourth-tier protection level shall be inspected at least once every half year.

Article 15: Where public security bodies discover an information system operating or using work unit has not fulfilled security multi-level protection duties and responsibilities, or has not met security protection requirements, they shall notify them in writing and have them rectify.

Chapter III: Secrecy protection management in information security multi-level protection

Article 16: Information systems involving state secrets shall conduct protection on the basis of the basic requirements of State information security multi-level protection, according to management regulations of the State secrecy protection work department on secret-related information systems’ tiered protection and technical standards, an in integration with the actual situation of the system. 

Information systems not involving State secrets may not process State secret information.

Article 17: Information systems involving State secrets will be divided into three levels from high to low, secret-level, top secret-level and absolute secret-level, according to the highest secrecy level of the information they process, their overall protection levels will respectively not be lower than the requirements for the third tier, fourth tier and fifth tier.

Work units constructing information systems involving State secrets shall determine the highest secrecy level of the information the system processes and the protection tier of the system according to the “Law for the Protection of State Secrets of the People’s Republic of China” and relevant State regulations concerning secrets and the concrete scope of their secrecy levels.

Article 18: The design and implementation, examination, approval and filing, operation and maintenance, and daily secrecy protection management of information systems involving State secrets will be implemented according to relevant State regulations on secrecy protection work and technical standards.

Article 19: All levels’ secrecy protection work departments shall organize inspection and assessment of information systems involving State secrets they put into use. Where they discover that security vulnerabilities exist on the system or technical protection measures to not conform to tiered protection management regulations and technical standards, they shall notify the system-using work unit and management department for rectification within a limited time.

Information systems of the secret or top secret-level will be subject to secrecy protection inspection or system assessment at least once per two years; absolute secret-level information systems will be subject to secrecy protection inspection or system assessment at least once per year.

Chapter IV: Information security multi-level protection encryption management

Article 20: The State encryption management department will conduct categorized and tiered management of information security multi-level protection encryption. On the basis of the role and degree of importance of the protected counterpart in national security, social stability and economic construction, the protected counterpart’s security protection requirements and degree of involvement with secrets, the degree of harm after the destruction of the protected counterpart as well as the nature of the encryption-using department, etc., encryption protection tiering norms will be determined.

Where an information system operating or using work units adopts encryption to conduct tiered protection, they shall abide by information security multi-level protection encryption management regulations and related standards.

Article 21: The provision, use and management of encryption in information security multi-level protection shall strictly implement relevant State regulations on encryption management.

Article 22: Encryption technology must be fully used to protect information systems. Where encryption is adopted to protect information and information systems involving State secrets, the design, implementation, use, operation, maintenance and daily management of the encryption shall be executed according to relevant State regulations on encryption management and technical standards; where encryption is used to protect information and information systems not involving State secrets, the “Commercial Encryption Management Regulations”, categorized and tiered encryption-related regulations and relevant technical standards must be followed.

Article 23: All levels’ encryption management departments may, at regular or irregular intervals, conduct inspection and assessment of the provision, use and management of encryption in information security multi-level protection work, they will conduct inspection and assessment of the provision, use and management of encryption on important secret-related information systems at least once every two years. Where they discover the existence of security vulnerabilities, violations of encryption management-related regulations or failure to meet the requirements of encryption-related standards in the process of supervision and inspection, the matter will be dealt with according to State encryption management-related regulations. 

Chapter V: Legal liability

Article 24: Where the competent departments and operating or using work units of third-tier or fourth-tier information systems and State secret-related information systems violate the provisions of these Rules, and one of the following acts is present, resulting in grave harm, the relevant department will handle the matter according to relevant laws and regulations:

(1) Not reporting for filing, examination and approval according to these Rules;

(2) Not conducting system security facility construction and structural construction according to the requirements of multi-level protection technology standards;

(3) Refusing rectification after receiving rectification notices;

(4) Violating secrecy protection management regulations;

(5) Violating encryption management regulations;

(6) Violating these Rules and other regulations.

Chapter VI: Supplementary provisions

Article 25: Military computer information system security protection work will be executed according to relevant military regulations

Article 26: These Management Rules take effect on 1 March 2006.

信息安全等级保护管理办法(试行)

  (公安部公通字[2006]7号文件颁布) 
  第一章 总则
  第一条 为加强信息安全等级保护,规范信息安全等级保护管理,提高信息安全保障能力和水平,维护国家安全、社会稳定和公共利益,保障和促进信息化建设,根据《中华人民共和国计算机信息系统安全保护条例》等国家有关法律法规,制定本办法。
  第二条 信息安全等级保护,是指对国家秘密信息及公民、法人和其他组织的专有信息以及公开信息和存储、传输、处理这些信息的信息系统分等级实行安全保护,对信息系统中使用的信息安全产品实行按等级管理,对信息系统中发生的信息安全事件分等级响应、处置。
  第三条 信息系统的安全保护等级应当根据信息和信息系统在国家安全、经济建设、社会生活中的重要程度,信息和信息系统遭到破坏后对国家安全、社会秩序、公共利益以及公民、法人和其他组织的合法权益的危害程度,信息和信息系统应当达到的基本的安全保护水平等因素确定。
  第四条 信息系统的安全保护等级分为以下五级:
  (一) 第一级为自主保护级,适用于一般的信息系统,其受到破坏后,会对公民、法人和其他组织的合法权益产生损害,但不损害国家安全、社会秩序和公共利益。
  (二) 第二级为指导保护级,适用于一般的信息系统,其受到破坏后,会对社会秩序和公共利益造成轻微损害,但不损害国家安全。
  (三) 第三级为监督保护级,适用于涉及国家安全、社会秩序和公共利益的重要信息系统,其受到破坏后,会对国家安全、社会秩序和公共利益造成损害。
  (四) 第四级为强制保护级,适用于涉及国家安全、社会秩序和公共利益的重要信息系统,其受到破坏后,会对国家安全、社会秩序和公共利益造成严重损害。
  (五) 第五级为专控保护级,适用于涉及国家安全、社会秩序和公共利益的重要信息系统的核心子系统,其受到破坏后,会对国家安全、社会秩序和公共利益造成特别严重损害。
  第五条 信息系统运营、使用单位及个人依据本办法和相关技术标准对信息系统进行保护,国家有关信息安全职能部门对其信息安全等级保护工作进行监督管理。
  (一) 第一级信息系统运营、使用单位或者个人可以依据国家管理规范和技术标准进行保护。
  (二) 第二级信息系统运营、使用单位应当依据国家管理规范和技术标准进行保护。必要时,国家有关信息安全职能部门可以对其信息安全等级保护工作进行指导。
  (三) 第三级信息系统运营、使用单位应当依据国家管理规范和技术标准进行保护,国家有关信息安全职能部门对其信息安全等级保护工作进行监督、检查。
  (四) 第四级信息系统运营、使用单位应当依据国家管理规范和技术标准进行保护,国家有关信息安全职能部门对其信息安全等级保护工作进行强制监督、检查。
  (五) 第五级信息系统运营、使用单位应当依据国家管理规范和技术标准进行保护,国家指定的专门部门或者专门机构对其信息安全等级保护工作进行专门监督、检查。
  第六条 公安机关负责信息安全等级保护工作的监督、检查、指导。国家保密工作部门负责等级保护工作中有关保密工作的监督、检查、指导。国家密码管理部门负责等级保护工作中有关密码工作的监督、检查、指导。
  涉及其他职能部门管辖范围的事项,由有关职能部门依照国家法律法规的规定进行管理。
  国务院信息化工作办公室及地方信息化领导小组办事机构负责等级保护工作的部门间协调。
  第二章 信息安全等级保护工作的安全管理
  第七条 信息系统的运营、使用单位应当依据本办法和有关标准,确定信息系统的安全保护等级。有主管部门的,应当报主管部门审核批准。
  第八条 信息系统的运营、使用单位应当根据据已确定的安全保护等级,依照本办法和有关技术标准,使用符合国家有关规定,满足信息系统安全保护等级需求的信息技术产品,进行信息系统建设。
  第九条 信息系统的运营、使用单位应当履行下列安全等级保护职责:
  (一) 落实信息安全等级保护的责任部门和人员,负责信息系统的安全等级保护管理工作;
  (二) 建立健全安全等级保护管理制度;
  (三) 落实安全等级保护技术标准要求;
  (四) 定期进行安全状况检测和风险评估;
  (五) 建立信息安全事件的等级响应、处置制度;
  (六) 负责对信息系统用户的安全等级保护教育和培训;
  (七) 其他应当履行的安全等级保护职责。
  第十条 信息系统建设完成后,其运营、使用单位应当依据本办法选择具有国家相关技术资质和安全资质的测评单位,按照技术标准进行安全测评,符合要求的,方可投入使用。
  第十一条 从事信息系统安全等级测评的单位,应当遵守国家有关法律法规和技术标准规定,保守在测评活动中知悉的国家秘密、商业秘密和个人隐私,提供安全、客观、公正的检测评估服务。
  测评单位资质管理办法由有关部门另行制定。
  第十二条 第三级以上信息系统的运营、使用单位应当自系统投入运行之日起三十日内,到所在地的省、自治区、直辖市公安机关指定的受理机构办理备案手续,填写《信息系统安全保护等级备案登记表》。国家另有规定的除外。
  备案事项发生变更时,信息系统运营、使用单位或其主管部门应当自变更之日起三十日内将变更情况报原备案机关。
  第十三条 公安机关应当掌握信息系统运营、使用单位的备案情况,建立备案档案,进行备案管理。发现不符合本办法及有关标准的,应通知其予以纠正。
  第十四条 公安机关应当监督、检查第三级和第四级信息系统运营、使用单位履行安全等级保护职责的情况。
  对安全保护等级为三级的信息系统每年至少检查一次,对安全保护等级为四级的信息系统每半年至少检查一次。
  第十五条 公安机关发现信息系统运营、使用单位未履行安全等级保护职责或未达到安全保护要求的,应当书面通知其整改。
  第三章 信息安全等级保护的保密管理
  第十六条 涉及国家秘密的信息系统应当依据国家信息安全等级保护的基本要求,按照国家保密工作部门涉密信息系统分级保护的管理规定和技术标准,结合系统实际情况进行保护。
  不涉及国家秘密的信息系统不得处理国家秘密信息。
  第十七条 涉及国家秘密的信息系统按照所处理信息的最高密级,由低到高划分为秘密级、机密级和绝密级三个级别,其总体防护水平分别不低于三级、四级、五级的要求。
  涉及国家秘密的信息系统建设单位应当依据《中华人民共和国保守国家秘密法》和国家有关秘密及其密级具体范围的规定,确定系统处理信息的最高密级和系统的保护级别。
  第十八条 涉及国家秘密的信息系统的设计实施、审批备案、运行维护和日常保密管理,按照国家保密工作部门的有关规定和技术标准执行。
  第十九条 各级保密工作部门应当对已投入使用的涉及国家秘密的信息系统组织检查和测评。发现系统存在安全隐患或系统保护措施不符合分级保护管理规定和技术标准的,应当通知系统使用单位和管理部门限期整改。
  对秘密级、机密级信息系统,每两年至少进行一次保密检查或系统测评;对绝密级信息系统,每年至少进行一次保密检查或系统测评。
  第四章 信息安全等级保护的密码管理
  第二十条 国家密码管理部门对信息安全等级保护的密码实行分类分级管理。根据被保护对象在国家安全、社会稳定、经济建设中的作用和重要程度,被保护对象的安全防护要求和涉密程度,被保护对象被破坏后的危害程度以及密码使用部门的性质等,确定密码的等级保护准则。
  信息系统运营、使用单位采用密码进行等级保护的,应当遵照信息安全等级保护密码管理规定和相关标准。
  第二十一条 信息系统安全等级保护中密码的配备、使用和管理等,应严格执行国家密码管理的有关规定。
  第二十二条 要充分运用密码技术对信息系统进行保护。采用密码对涉及国家秘密的信息和信息系统进行保护的,密码的设计、实施、使用、运行维护和日常管理等,应当按照国家密码管理有关规定和技术标准执行;采用密码对不涉及国家秘密的信息和信息系统进行保护的须遵照《商用密码管理条例》和密码分类分级保护有关规定与相关标准。
  第二十三条 各级密码管理部门可以定期或者不定期对信息系统等级保护工作中密码配备、使用和管理的情况进行检查和测评,对重要涉密信息系统的密码配备、使用和管理情况每两年至少进行一次检查和测评。 在监督检查过程中,发现存在安全隐患或违反密码管理相关规定或者未达到密码相关标准要求的,按照国家密码管理的相关规定进行处置。
  第五章 法律责任
  第二十四条 三级、四级信息系统和涉及国家秘密的信息系统的主管部门和运营、使用单位违反本办法规定,有下列行为之一,造成严重损害的,由相关部门依照有关法律、法规予以处理:
  (一) 未按本办法规定报请备案、审批的;
  (二) 未按等级保护技术标准要求进行系统安全设施建设和制度建设的;
  (三) 接到整改通知后,拒不整改的;
  (四) 违反保密管理规定的;
  (五) 违反密码管理规定的;
  (六) 违反本办法和其他规定的。
  第六章 附则
  第二十五条 军队的计算机信息系统安全保护工作,按照军队的有关法规执行。
  第二十六条 本管理办法自2006年3月1日起施行。

Regulations on Internet Security Protection Technology Measures

Posted on Updated on

Ministry of Public Security Decree

No. 82

The “Regulations on Internet Security Protection Technology Measures” have been passed on the Ministerial Business Meeting of the Ministry of Public Security on 23 November 2005, are hereby promulgated, and take effect on 1 March 2006.

13 December 2005

Regulations on Internet Security Protection Technology Measures Read the rest of this entry »

Notice Concerning Further Deepening Internet Cafe Management Work

Posted on Updated on

Ministry of Culture

State Administration of Industry and Commerce

Ministry of Public Security

Ministry of Information Industry

Ministry of Education

Ministry of Finance

State Council

Legal System Office

Central Civilization Office

Communist Youth League Centre Read the rest of this entry »

Implementation Opinions concerning the Information Security Multi-Level Protection System

Posted on Updated on

Notice concerning Issuance of the “Implementation Opinions concerning the Information Security Multi-Level Protection System”

(GTZ No. [2004]66)

All provincial, autonomous region and municipal public security offices (bureaus), secrecy protection bureaus, the Office of the National Encryption Management Committee, the Office of the Leading Group for Informatization, the Xinjiang Production-Construction Corps Public Security Bureau, Secrecy Protection Bureau, Office of the National Encryption Management Committee and the Office of the Leading Group for Informatization, the offices of secrecy protection committees in all Centre and State bodies’ ministries and commissions, all people’s organizations’ secrecy protection committee offices:

The “Implementation Opinions concerning Information Security Multi-Level Protection Work” were passed at the 3rd Meeting of the National Coordination Group for Network and Information Security, and are hereby issued to you, please implement them earnestly. 

Ministry of Public Security of the People’s Republic of China

National Secrecy Protection Bureau

Office of the National Encryption Management Committee

State Council Informatization Work Office

Implementation Opinions concerning the Information Security Multi-Level Protection System

The information security multi-level protection system is a basic system for, in the development process of informatization in the national economy and society, raising information security protection capabilities and levels, safeguarding national security, social stability and the public interest, safeguarding and stimulating the healthy development of informatization construction. Implementing the information security multi-level protection system will enable the full mustering of vigour of the State, legal persons and other organizations, as well as citizens, let every side play a role, achieve the goal of effective protection, strengthen the integrity, focus and efficacy of security protection, enable information system security construction to become ever more focused on prominent points, unified and standardized, scientific and rational, this will play an important driving role in the development of our country’s information security.

In order to further raise information security protection capabilities and defence levels, safeguard national security, the public interest and social stability, ensure and stimulate the healthy development of informatization construction, the “Computer and Information System Security Protection Regulations of the People’s Republic of China”, promulgated by the State Council in 1994, provide that “tiered protection is implemented for computer and information system, security grading plans and standards, as well as concrete rules for tiered security protection will be formulated by the Ministry of Public Security together with relevant departments.” In 2003, the Centre Office and State Council Office transmitted the “Leading Group for National Informatization Opinions concerning Strengthening Information Security Protection  Work” (ZBF No. [2003]27), which clearly puts forward that “A focal point is protecting basic information networks and important information system related to national security, economic lifelines, social stability and other such aspects, grasp the establishment of an information security multi-level protection system, formulate management rules and technical guidelines for the information security multi-level protection system.”

I, The importance of conducting information security multi-level protection work

In recent years, as the Party Centre and State Council have given it high regard, and all stakeholders have coordinated, cooperated, and made joint efforts our country’s information security protection work has seen great progress. But looking from the general picture, our country’s information security protection work is still in the early stages, its basis is weak, its levels are low, and the following prominent problems exist: information security awareness and security protection capabilities are weak, information security lags behind informatization development; information systems security construction and management objectives are not clear; information security protection work focus points are not prominent; information security supervision and management lacks a basis and standards, supervision and management measures remain meeting goals, supervision and management systems remain to be perfected. Following the rapid development of information technologies and the speedy popularization of network applications, our country’s national economic and social informatization progress is comprehensively accelerating, the basic and whole-picture roles of information systems are strengthening day by day, information resources have become an important strategic resource for national economic construction and social development. Protecting information security, safeguarding national security, the public interest and social stability, are major issues that urgently need to be resolved in the present development of informatization. 

Implementing information security multi-level protection will enable an effective increase in the overall levels of our country’s information and information system security construction, it will benefit the construction of information security facilities simultaneously with the process of information construction, and the coordination of information security protection with informatization construction; it will benefit the provision of systematic, focused and feasible guidance over and service to information system security construction and management, and the effective control of information security construction costs; it will benefit the optimization of information security resource allocation, implementing tiered protection of information system means the focus lies on ensuring the security of basic information networks and important information systems related to national security, economic lifelines, social stability and other such areas; it will benefit the clarification of information security responsibilities of the state, legal persons and other organizations, as well as citizens, strengthening information security management; it will benefit the promotion of the development of the information security industry, progressively exploring a line of information security models suited to the development of the Socialist market economy.

II, The principles of the information security multi-level protection system

The core of information security multi-level protection is division of information security levels, and conducting construction, management and supervision according to standards. The information security multi-level protection system respects the following basic principles:

(1) Clarifying responsibilities, joint protection. Through tiered protection, organize and mobilize the state, legal persons, other organizations and citizens to jointly participate in information security protection work; subjects on all sides will bear corresponding, clear and concrete information security protection responsibilities according to norms and standards.

(2) Relying on standards, protecting oneself. The State uses mandatory norms and standards to require information and information systems to grade themselves and protect themselves according to corresponding construction and management requirements.

(3) Simultaneous construction, dynamic adjustment. Information systems shall, when being newly built, improved or expanded, simultaneously construct information security facilities, ensuring that information security and informatization construction are matched. Where, due to changing conditions such as the application category or scope of information and information systems, and other such reasons, security protection grading needs to be changed, the security protection grade of an information system shall be determined again on the basis of the requirements of tiered protection management standards and technology standards. Tiered protection management standards and technology standards shall be revised timely according to the actual circumstances in the development of tiered protection work.

(4) Guidance and supervision, protection of focus points. The State appoints information security supervision and management functional departments to conduct guidance and supervision of information security protection work of important information and information systems through means such as filing, guidance, inspection, supervision, rectification, etc. The State focuses on protecting basic information networks and important information systems affecting national security, economic lifelines and social stability, mainly including: State affairs processing information networks (Party and government entities’ business systems); information systems related to the national economy and the people’s livelihoods such as the financial administration, the financial sector, taxation, Customs, auditing, industry and commerce, social security, energy, traffic and transportation, national defence industry, etc.; information systems in educational, national science and technology and other such work units; information systems in basic information networks such as public telecommunications, radio and television transmission, etc.; and important information systems in network management centres and important websites as well as important information systems in other areas.

III, The basic content of the information security multi-level protection system

Information security multi-level protection  implements security protection over State secret information, the proprietary information of legal persons, other organizations and citizens, as well as public information, and information systems storing, transmitting and processing this information in a tiered manner, it implements tier-based management over information security products used in information systems, and responds to and processes information security incidents occurring in information system in a tiered manner.

Information systems refers to systems or networks composed of computers and related supplementary equipment and facilities, which conduct information storage, transmission and processing according to specific application goals or norms; information refers to digitized information stored, transmitted or processed on information systems. 

On the basis of the degree of importance of information and information systems in national security, economic construction and social life; the degree of harm to national security, social order, the public interest as well as the lawful rights and interests of citizens, legal persons and other organizations in case of destruction; with regard to the secrecy, integrity and usability requirements of information and the basic security protection levels that information systems must achieve, and other such factors, information and information systems’ security protection grades are divided into five tiers in total:

1: The first tier is the self-protection tier, which applies to common information and information systems, whose destruction may bring a certain influence on the rights and interest of citizens, legal persons or other organizations, but no harm to national security, social order, economic construction or the public interest.

2. The second tier is the guided protection tier, which applies to common information and information systems that affect national security, social order, economic construction and the public interest to a certain degree, and whose destruction may result in certain harm to national security, social order, economic construction and the public interest.

3. The third tier is the supervised protection tier, which applies to information and information systems involving national security, social order, economic construction and the public interest, whose destruction may result in relatively large harm to national security, social order, economic construction and the public interest. 

4. The fourth tier is the mandatory protection tier, which applies to important information and information systems involving national security, social order, economic construction and the public interest, whose destruction may result in grave harm to national security, social order, economic construction and the public interest. 

5. The fifth tier is the specially controlled protection tier, which applies to the core systems of  important information and information systems involving national security, social order, economic construction and the public interest, whose destruction may result in especially grave harm to national security, social order, economic construction and the public interest. 

The State, through formulating uniform management norms and technical standards, organizes administrative bodies, citizens, legal persons and other organizations to conduct focused protection work on the basis of the differing degrees of importance of information and information systems. The State exercises supervision and management policies of different degrees of strength for information and information systems in different security protection tiers. The first tier will implement self-protection according to State management norms and technical standards; the second tier will conduct self-protection under the guidance of information security supervision and management functional departments, according to State management norms and technical standards; the third tier will conduct self-protection according to state management norms and technical standards, and information security supervision and management functional departments will conduct supervision and inspection of them; the fourth tier will conduct self-protection according to State management norms and technical standards, and information security supervision and management functional departments will conduct mandatory supervision and management over them; the fifth tier will conduct self-protection according to State management norms and technical standards, and State-appointed specialized departments and specialized bodies will conduct specialized supervision. 

The state will conduct tiered management of the use of information security products.

For information security incidents, a tiered response and processing system will be implemented. On the basis of the destructive degree of information security incidents concerning information and information systems, the resulting social influence as well as the scope of involvement, the incident’s tier will be determined. Corresponding advance plans will be formulated on the basis of the different tiers of incidents occurring on information systems of different security protection tiers, clarifying the scope and degree of incident response and processing, as well as the applicable management system. After an information security incident occurs, response and processing will occur according to advance plans and tier classification.

IV, Information security multi-level protection work and responsibility divisions

Public security bodies are responsible for information security multi-level protection work supervision, inspection and guidance. State secrecy protection work departments are responsible for supervision, inspection and guidance of secrecy protection-related work in multi-level protection work. State encryption management departments are responsible for supervision, inspection and guidance of encryption-related work in multi-level protection work. 

In information security multi-level protection work, matters involving the scope of jurisdiction of other functional departments, will be managed by the relevant functional departments according to State laws and regulations. 

The competent department for information and information systems as well as operating and using work units conduct information security construction and management according to multi-level protection management norms and technology standards.

The State Council Informatization Work Office is responsible for interdepartmental coordination in information security multi-level protection work.

V, Requirements for implementing information security multi-level protection work

Information security multi-level protection work must give prominence to focus points, divide tiers of responsibility, guide according to categories, and implement in different steps, according to the requirements that who is in charge is responsible, and who operates is responsible, clarify the security responsibilities of competent departments as well as work units and individuals constructing, operating, maintaining and using information systems, who respectively will implement multi-level protection measures. For implementation of information security multi-level protection, work in the following six areas shall be done well:

(1) Perfecting standards, categorized guidance. Formulate systemic and integrated information security multi-level protection management norms and technical standards, and incessantly supplement and perfect them on the basis of actual circumstances in the conduct of work. Information security supervision and management functional departments will issue corresponding guidance on information security multi-level protection work to information and information systems of different degrees of importance, and ensure the smooth conduct of information security multi-level protection work.

(2) Scientific classification, strict filing. The work units operating and using information and information systems will, according to multi-level protection management norms and technical standards, determine the security protection tier of their information and information systems, and report to their competent department for examination and approval.

Concerning information systems containing many sub-systems, under the preconditions of ensuring the secure interoperability of information systems and effective information sharing, a security protection tier shall be respectively determined on the basis of the multi-level protection management regulations, technology standards and the degree of importance of the various sub-systems in an information system. For large interregional systems, a method is implemented that integrates vertical protection and localized protection.

The State Council Informatization Work Office organizes domestic information security experts to establish an information security multi-level expert review committee. The work units operating or using important information and information systems and their competent departments shall, when determining the security protection tier of information and information systems, request the information security protection multi-level expert review committee to provide consulting and comments.

For information systems with a security protection tier of three or higher, the operating or using work unit will report to the local district / city-level public security bureau for filing. Interregional information systems will be subject to general filing by their competent authority with the local public security bureau of the same level, sub-systems are reported respectively by the local operating or using work unit with the local district / city-level public security body.

Rules for the classification management of information security products as well as the management of tiered information security incident response and processing will be promulgated by the Ministry of Public Security together with the Secrecy Protection Bureau, the State Cryptography Office, the Ministry of Information Industry, the Certification and Accreditation Administration and other such departments.

(3) Construction and renovation, implementation measures. With regard to existing information systems, their operating and using work units will, on the basis of already determined information security protection levels, and according to the management norms and technical standards for multi-level protection, purchase and use correspondingly tiered information security products, build security infrastructure, implement technical security measures, and complete system improvements. For newly built, rebuilt and extended information systems, information system planning, design and construction shall be conducted according to multi-level protection management norms and technical standards.

(4) Self-inspection and self-rectification, implementing requirements. Work units operating and using information and information systems and their competent authorities will conduct inspection and assessment of information systems who have completed security multi-level protection construction according to multi-level protection management norms and technical standards, timely correct problems they discover, strengthen and perfect the construction of their own information security multi-level protections, and strengthen self-protection.

(5) Constructing structures, strengthening management. Work units operating and using information and information systems will regularly conduct monitoring and assessment of their security state according to the requirements of management norms corresponding to the security protection tier of that system and technical standards, timely eliminate security vulnerabilities and leaks, establish security systems, formulate security incident response ad management preparation plans for different tiers of information, and strengthen the security management of information systems. Competent departments of information and information systems shall, according to the requirements of multi-level protection management norms and technical standards, conduct supervision and management work, and when they discover problems, timely urge their correction.

(6) Supervision and inspection, perfecting protection. Public security departments will focus on conducting supervision and inspection of the tiered security protection of third and fourth-tier information and information systems according to multi-level protection management norms and technical standards. Where they discover that the determined security protection tier does not conform to multi-level protection management norms and technical standards, they shall notify the competent department of the information and information system and the operating and using work unit, to conduct rectification; where they discover the existence of security risks or non-achievement of the requirements of multi-level protection management norms or technical standards, they must correct them within a limited time, and ensure the perfection of security protection measures of information and information systems. Supervision and inspection shall be conducted of information security products used in information systems.

Supervision and inspection of fifth-tier information and information systems will be conducted by State-designated special departments and special bodies according to relevant regulations.

The national secrecy protection work department, encryption management department as well as other functional departments will guide, supervise and inspect according to their duties and the division of work.

VI, Information security multi-level protection work implementation planning

It is planned the implement to use around three years of time to implement the information security multi-level protection system at a nationwide scale in three stages.

(1) Preparatory stage. In order to ensure the smooth implementation of the information security multi-level protection system, before comprehensively implementing the multi-level protections, around one year of time is used to complete the following preparatory work:

1. Strengthening leadership, implementing responsibilities. Under the leadership of the National Network and Information Security Coordination Group, all levels’ local People’s Governments, information security supervision and management functional departments, competent departments of information systems and operating and using work units must determined their own security responsibilities, establish coordination and cooperation mechanisms, respectively formulate detailed implementation plans, vigorously advance the establishment of the information security multi-level protection system, and promote the establishment and perfection of operational mechanisms for information security management.

2. Accelerating the perfection of laws, regulation and standards systems. Legal norms and technical standards are the legal basis and technical safeguards for the broadening and implementation of information security multi-level protection work. To this end, the formulation must be sped up of regulations and norms such as the “Information Security Multi-Level Protection Management Rules”, the “Information Security Multi-Level Protection Implementation Guidelines”, the “Information Security Multi-Level Protection Assessment Guidelines”, etc., so they are published as quickly as possible.

3. Establishing information security multi-level protection supervision and management teams and technical support systems. Information security supervision and management functional departments must establish dedicated information security multi-level protection supervision and inspection bodies, give them full strength, strengthen construction, grasp training, ensure that supervision and inspection personnel is able to comprehensively grasp legal norms, management norms and technical standards related to information security multi-level protection, is proficient in using technical tools, and realistically undertake information security multi-level protection guidance, supervision and inspection duties and responsibilities. At the same time, it is also necessary to establish technical support systems for information security multi-level protection supervision and inspection work, organize the research, manufacture and exploitation of scientific and applied inspection and assessment tools.

4. Further conducting multi-level protection trial work. Select focus work units in e-government, e-commerce as well as other areas to launch multi-level protection trial work, and further perfect multi-level protection implementation guidelines and related supplementary norms, standards and tools on the basis of trial work, accumulate information security multi-level protection work implementation methods and experiences.

5. Strengthening propaganda and training work. All levels’ local People’s Governments, information security supervision and management functional departments and information system competent departments must vigorously propagate information security multi-level protection-related regulations, standards and policies, organize and launch related training, raise the understanding of and importance given to information security multi-level protection work, vigorously promote relevant departments and work units’ early performance of information security multi-level protection work preparations

(2) Focus implementation phase. On the basis of completing early preparation work, use around one year of time to implement the multi-level protections basic information networks and important information systems with national focus protection, involving national security, economic lifelines and social stability. Through one year of construction, enable basic information networks and important information systems’ core vital parts to gain effective protection, the protection status of basic information networks and information systems involving national security, economic lifelines and social stability to gain a relatively great improvement, concluding the present situation where there basically are no protection measures or protection measures are insufficient.

(3). Comprehensive implementation phase. On the basis of trial work, use around one year of time to roll out the information security multi-level protection system nationwide. Information and information system operating and using work units already implementing the multi-level protections and their competent departments must further perfect information security protection measures. Where the multi-level protection is not implemented, implementation must be organized earnestly according to multi-level protection management norms and technical standards.

Through three years of efforts, progressively implement the information security multi-level protection system in all segments of information security planning, construction, assessment, operations and maintenance, and enable our country’s information security protection state to gain a fundamental improvement.

关于信息安全等级保护工作的实施意见
信息安全等级保护制度是国家在国民经济和社会信息化的发 展过程中,提高信息安全保障能力和水平,维护国家安全、社会稳 定和公共利益,保障和促进信息化建设健康发展的一项基本制度。 实行信息安全等级保护制度,能够充分调动国家、法人和其他组织 及公民的积极性,发挥各方面的作用,达到有效保护的目的,增强 安全保护的整体性、针对性和实效性,使信息系统安全建设更加突 出重点、统一规范、科学合理,对促进我国信息安全的发展将起到 重要推动作用。
为了进一步提高信息安全的保障能力和防护水平,维护国家安 全、公共利益和社会稳定,保障和促进信息化建设的健康发展,1994 年国务院颁布的《中华人民共和国计算机信息系统安全保护条例》 规定,“计算机信息系统实行安全等级保护,安全等级的划分标准和 安全等级保护的具体办法,由公安部会同有关部门制定”。2003 年 中央办公厅、国务院办公厅转发的《国家信息化领导小组关于加强 信息安全保障工作的意见》(中办发[2003]27 号)明确指出,“要重 点保护基础信息网络和关系国家安全、经济命脉、社会稳定等方面 的重要信息系统,抓紧建立信息安全等级保护制度,制定信息安全 等级保护的管理办法和技术指南”。
一、开展信息安全等级保护工作的重要意义
近年来,党中央、国务院高度重视,各有关方面协调配合、共 同努力,我国信息安全保障工作取得了很大进展。但是从总体上看,我国的信息安全保障工作尚处于起步阶段,基础薄弱,水平不高, 存在以下突出问题:信息安全意识和安全防范能力薄弱,信息安全 滞后于信息化发展;信息系统安全建设和管理的目标不明确;信息 安全保障工作的重点不突出;信息安全监督管理缺乏依据和标准, 监管措施有待到位,监管体系尚待完善。随着信息技术的高速发展 和网络应用的迅速普及,我国国民经济和社会信息化进程全面加 快,信息系统的基础性、全局性作用日益增强,信息资源已经成为 国家经济建设和社会发展的重要战略资源之一。保障信息安全,维 护国家安全、公共利益和社会稳定,是当前信息化发展中迫切需要 解决的重大问题。
实施信息安全等级保护,能够有效地提高我国信息和信息系统 安全建设的整体水平,有利于在信息化建设过程中同步建设信息安 全设施,保障信息安全与信息化建设相协调;有利于为信息系统安 全建设和管理提供系统性、针对性、可行性的指导和服务,有效控 制信息安全建设成本;有利于优化信息安全资源的配置,对信息系 统分级实施保护,重点保障基础信息网络和关系国家安全、经济命 脉、社会稳定等方面的重要信息系统的安全;有利于明确国家、法 人和其他组织、公民的信息安全责任,加强信息安全管理;有利于 推动信息安全产业的发展,逐步探索出一条适应社会主义市场经济 发展的信息安全模式。
二、信息安全等级保护制度的原则
信息安全等级保护的核心是对信息安全分等级、按标准进行建 设、管理和监督。信息安全等级保护制度遵循以下基本原则:
(一)明确责任,共同保护。通过等级保护,组织和动员国家、法人和其他组织、公民共同参与信息安全保护工作;各方 主体按照规范和标准分别承担相应的、明确具体的信息安全保护责 任。
(二)依照标准,自行保护。国家运用强制性的规范及 标准,要求信息和信息系统按照相应的建设和管理要求,自行定级、 自行保护。
(三)同步建设,动态调整。信息系统在新建、改建、 扩建时应当同步建设信息安全设施,保障信息安全与信息化建设相 适应。因信息和信息系统的应用类型、范围等条件的变化及其他原 因,安全保护等级需要变更的,应当根据等级保护的管理规范和技 术标准的要求,重新确定信息系统的安全保护等级。等级保护的管 理规范和技术标准应按照等级保护工作开展的实际情况适时修订。
(四)指导监督,重点保护。国家指定信息安全监管职 能部门通过备案、指导、检查、督促整改等方式,对重要信息和信 息系统的信息安全保护工作进行指导监督。国家重点保护涉及国家 安全、经济命脉、社会稳定的基础信息网络和重要信息系统,主要 包括:国家事务处理信息系统(党政机关办公系统);财政、金融、 税务、海关、审计、工商、社会保障、能源、交通运输、国防工业 等关系到国计民生的信息系统;教育、国家科研等单位的信息系统; 公用通信、广播电视传输等基础信息网络中的信息系统;网络管理 中心、重要网站中的重要信息系统和其他领域的重要信息系统。
三、信息安全等级保护制度的基本内容
信息安全等级保护是指对国家秘密信息、法人和其他组织及公民的专有信息以及公开信息和存储、传输、处理这些信息的信息系 统分等级实行安全保护,对信息系统中使用的信息安全产品实行按 等级管理,对信息系统中发生的信息安全事件分等级响应、处置。
信息系统是指由计算机及其相关和配套的设备、设施构成的, 按照一定的应用目标和规则对信息进行存储、传输、处理的系统或 者网络;信息是指在信息系统中存储、传输、处理的数字化信息。
根据信息和信息系统在国家安全、经济建设、社会生活中的重 要程度;遭到破坏后对国家安全、社会秩序、公共利益以及公民、 法人和其他组织的合法权益的危害程度;针对信息的保密性、完整 性和可用性要求及信息系统必须要达到的基本的安全保护水平等 因素,信息和信息系统的安全保护等级共分五级:

  1. 第一级为自主保护级,适用于一般的信息和信息系统,其 受到破坏后,会对公民、法人和其他组织的权益有一定影响,但不 危害国家安全、社会秩序、经济建设和公共利益。
  2. 第二级为指导保护级,适用于一定程度上涉及国家安全、 社会秩序、经济建设和公共利益的一般信息和信息系统,其受到破 坏后,会对国家安全、社会秩序、经济建设和公共利益造成一定损 害。
  3. 第三级为监督保护级,适用于涉及国家安全、社会秩序、 经济建设和公共利益的信息和信息系统,其受到破坏后,会对国家 安全、社会秩序、经济建设和公共利益造成较大损害。
  4. 第四级为强制保护级,适用于涉及国家安全、社会秩序、 经济建设和公共利益的重要信息和信息系统,其受到破坏后,会对 国家安全、社会秩序、经济建设和公共利益造成严重损害。
  5. 第五级为专控保护级,适用于涉及国家安全、社会秩序、 经济建设和公共利益的重要信息和信息系统的核心子系统,其受到 破坏后,会对国家安全、社会秩序、经济建设和公共利益造成特别 严重损害。
    国家通过制定统一的管理规范和技术标准,组织行政机关、公 民、法人和其他组织根据信息和信息系统的不同重要程度开展有针 对性的保护工作。国家对不同安全保护级别的信息和信息系统实行 不同强度的监管政策。第一级依照国家管理规范和技术标准进行自 主保护;第二级在信息安全监管职能部门指导下依照国家管理规范 和技术标准进行自主保护;第三级依照国家管理规范和技术标准进 行自主保护,信息安全监管职能部门对其进行监督、检查;第四级 依照国家管理规范和技术标准进行自主保护,信息安全监管职能部 门对其进行强制监督、检查;第五级依照国家管理规范和技术标准 进行自主保护,国家指定专门部门、专门机构进行专门监督。
    国家对信息安全产品的使用实行分等级管理。
    信息安全事件实行分等级响应、处置的制度。依据信息安全事 件对信息和信息系统的破坏程度、所造成的社会影响以及涉及的范 围,确定事件等级。根据不同安全保护等级的信息系统中发生的不 同等级事件制定相应的预案,确定事件响应和处置的范围、程度以 及适用的管理制度等。信息安全事件发生后,分等级按照预案响应 和处置。
    四、信息安全等级保护工作职责分工
    公安机关负责信息安全等级保护工作的监督、检查、指导。国 家保密工作部门负责等级保护工作中有关保密工作的监督、检查、指导。国家密码管理部门负责等级保护工作中有关密码工作的监 督、检查、指导。
    在信息安全等级保护工作中,涉及其他职能部门管辖范围的事 项,由有关职能部门依照国家法律法规的规定进行管理。
    信息和信息系统的主管部门及运营、使用单位按照等级保护的 管理规范和技术标准进行信息安全建设和管理。
    国务院信息化工作办公室负责信息安全等级保护工作中部门 间的协调。
    五、实施信息安全等级保护工作的要求
    信息安全等级保护工作要突出重点、分级负责、分类指导、分 步实施,按照谁主管谁负责、谁运营谁负责的要求,明确主管部门 以及信息系统建设、运行、维护、使用单位和个人的安全责任,分 别落实等级保护措施。实施信息安全等级保护应当做好以下六个方 面工作:
    (一)完善标准,分类指导。制定系统完整的信息安全 等级保护管理规范和技术标准,并根据工作开展的实际情况不断补 充完善。信息安全监管职能部门对不同重要程度的信息和信息系统 的安全等级保护工作给予相应的指导,确保等级保护工作顺利开 展。
    (二)科学定级,严格备案。信息和信息系统的运营、 使用单位按照等级保护的管理规范和技术标准,确定其信息和信息 系统的安全保护等级,并报其主管部门审批同意。
    对于包含多个子系统的信息系统,在保障信息系统安全互联和 有效信息共享的前提下,应当根据等级保护的管理规定、技术标准和信息系统内各子系统的重要程度,分别确定安全保护等级。跨地 域的大系统实行纵向保护和属地保护相结合的方式。
    国务院信息化工作办公室组织国内有关信息安全专家成立信 息安全保护等级专家评审委员会。重要的信息和信息系统的运营、 使用单位及其主管部门在确定信息和信息系统的安全保护等级时, 应请信息安全保护等级专家评审委员会给予咨询评审。
    安全保护等级在三级以上的信息系统,由运营、使用单位报送 本地区地市级公安机关备案。跨地域的信息系统由其主管部门向其 所在地的同级公安机关进行总备案,分系统分别由当地运营、使用 单位向本地地市级公安机关备案。
    信息安全产品使用的分等级管理以及信息安全事件分等级响 应、处置的管理办法由公安部会同保密局、国密办、信息产业部和 认监委等部门制定。
    (三)建设整改,落实措施。对已有的信息系统,其运 营、使用单位根据已经确定的信息安全保护等级,按照等级保护的 管理规范和技术标准,采购和使用相应等级的信息安全产品,建设 安全设施,落实安全技术措施,完成系统整改。对新建、改建、扩 建的信息系统应当按照等级保护的管理规范和技术标准进行信息 系统的规划设计、建设施工。
    (四)自查自纠,落实要求。信息和信息系统的运营、 使用单位及其主管部门按照等级保护的管理规范和技术标准,对已 经完成安全等级保护建设的信息系统进行检查评估,发现问题及时 整改,加强和完善自身信息安全等级保护制度的建设,加强自我保 护。(五)建立制度,加强管理。信息和信息系统的运营、 使用单位按照与本系统安全保护等级相对应的管理规范和技术标
    准的要求,定期进行安全状况检测评估,及时消除安全隐患和漏洞, 建立安全制度,制定不同等级信息安全事件的响应、处置预案,加 强信息系统的安全管理。信息和信息系统的主管部门应当按照等级 保护的管理规范和技术标准的要求做好监督管理工作,发现问题, 及时督促整改。
    (六)监督检查,完善保护。公安机关按照等级保护的 管理规范和技术标准的要求,重点对第三、第四级信息和信息系统 的安全等级保护状况进行监督检查。发现确定的安全保护等级不符 合等级保护的管理规范和技术标准的,要通知信息和信息系统的主 管部门及运营、使用单位进行整改;发现存在安全隐患或未达到等 级保护的管理规范和技术标准要求的,要限期整改,使信息和信息 系统的安全保护措施更加完善。对信息系统中使用的信息安全产品 的等级进行监督检查。
    对第五级信息和信息系统的监督检查,由国家指定的专门部 门、专门机构按照有关规定进行。
    国家保密工作部门、密码管理部门以及其他职能部门按照职责 分工指导、监督、检查。
    六、信息安全等级保护工作实施计划
    计划用三年左右的时间在全国范围内分三个阶段实施信息安 全等级保护制度。
    (一)准备阶段。为了保障信息安全等级保护制度的顺利实施,在全面实施等级保护制度之前,用一年左右的时间做好下列 准备工作:
    1.加强领导,落实责任。在国家网络与信息安全协调小组的领 导下,地方各级人民政府、信息安全监管职能部门、信息系统的主 管部门和运营、使用单位要明确各自的安全责任,建立协调配合机 制,分别制定详细的实施方案,积极推进信息安全等级保护制度的 建立,推动信息安全管理运行机制的建立和完善。
    2.加快完善法律法规和标准体系。法律规范和技术标准是推广 和实施信息安全等级保护工作的法律依据和技术保障。为此,《信 息安全等级保护管理办法》和《信息安全等级保护实施指南》、《信 息安全等级保护评估指南》等法规、规范要加紧制定,尽快出台。
    加快信息安全等级保护管理与技术标准的制定和完善,其他现 行的相关标准规范中与等级保护管理规范和技术标准不相适应的, 应当进行调整。
    3.建设信息安全等级保护监督管理队伍和技术支撑体系。信息 安全监管职能部门要建立专门的信息安全等级保护监督检查机构, 充实力量,加强建设,抓紧培训,使监督检查人员能够全面掌握信 息安全等级保护相关法律规范和管理规范及技术标准,熟练运用技 术工具,切实承担信息安全等级保护的指导、监督、检查职责。同 时,还要建立信息安全等级保护监督、检查工作的技术支撑体系, 组织研制、开发科学、实用的检查、评估工具。
    4.进一步做好等级保护试点工作。选择电子政务、电子商务以 及其他方面的重点单位开展等级保护试点工作,并在试点工作的基 础上进一步完善等级保护实施指南等相关的配套规范、标准和工具,积累信息安全等级保护工作实施的方法和经验。 5.加强宣传、培训工作。地方各级人民政府、信息安全监管职 能部门和信息系统的主管部门要积极宣传信息安全等级保护的相 关法规、标准和政策,组织开展相关培训,提高对信息安全等级保 护工作的认识和重视,积极推动各有关部门、单位做好开展信息安
    全等级保护工作的前期准备。
    (二)重点实行阶段。在做好前期准备工作的基础上, 用一年左右的时间,在国家重点保护的涉及国家安全、经济命脉、 社会稳定的基础信息网络和重要信息系统中实行等级保护制度。经 过一年的建设,使基础信息网络和重要信息系统的核心要害部位得 到有效保护,涉及国家安全、经济命脉、社会稳定的基础信息网络 和重要信息系统的保护状况得到较大改善,结束目前基本没有保护 措施或保护措施不到位的状况。
    在工作中,如发现等级保护的管理规范和技术标准以及检查评 估工具等存在问题,及时组织有关部门进行调整和修订。
    (三)全面实行阶段。在试行工作的基础上,用一年左 右的时间,在全国全面推行信息安全等级保护制度。已经实施等级 保护制度的信息和信息系统的运营、使用单位及其主管部门,要进 一步完善信息安全保护措施。没有实施等级保护制度的,要按照等 级保护的管理规范和技术标准认真组织落实。
    经过三年的努力,逐步将信息安全等级保护制度落实到信息安 全规划、建设、评估、运行维护等各个环节,使我国信息安全保障 状况得到基本改善。