Categories
Business & Geopolitics Business Intelligence Technology

Document: Cybersecurity Law of the People’s Republic of China (中华人民共和国网络安全法)

Unofficial translation. Retrieved from the site of China’s Cyberspace Administration

Cybersecurity Law of the People’s Republic of China

(Adopted at the 24th meeting of the Standing Committee of the 12th National People’s Congress on November 7, 2016)

  table of Contents

  Chapter One General Provisions

  Chapter II Network Security Support and Promotion

  Chapter III Network Operation Security

  Section 1 General Provisions

  Section 2 Operational Security of Critical Information Infrastructure

  Chapter 4 Network Information Security

  Chapter V Monitoring, Early Warning and Emergency Response

  Chapter VI Legal Liability

  Chapter 7 Supplementary Provisions

  Chapter One General Provisions

  Article 1 This law is formulated in order to protect cyber security, safeguard cyberspace sovereignty, national security, and social public interests, protect the legitimate rights and interests of citizens, legal persons, and other organizations, and promote the healthy development of economic and social informatization.

  Article 2 This law applies to the construction, operation, maintenance, and use of networks within the territory of the People’s Republic of China, as well as the supervision and management of network security.

  Article 3 The state adheres to the equal emphasis on network security and informatization development, follows the policy of active utilization, scientific development, legal management, and security, promotes network infrastructure construction and interconnection, encourages network technology innovation and application, and supports the cultivation of network security talents. Establish and improve a network security protection system to improve network security protection capabilities.

  Article 4 The state formulates and continuously improves network security strategies, clarifies the basic requirements and main objectives of ensuring network security, and proposes network security policies, work tasks, and measures in key areas.

  Article 5: The state adopts measures to monitor, defend, and deal with cybersecurity risks and threats originating within and outside the People’s Republic of China, protect critical information infrastructure from attacks, intrusions, interference and damage, punish illegal and criminal activities on the Internet in accordance with the law, and maintain the Internet Space security and order.

  Article 6 The state advocates honest, trustworthy, healthy and civilized cyber behaviors, promotes the dissemination of core socialist values, and adopts measures to raise the awareness and level of cyber security of the entire society, and form a good environment for the entire society to participate in promoting cyber security.

  Article 7: The state actively carries out international exchanges and cooperation in cyberspace governance, cyber technology research and development and standard formulation, combating cyber crimes, etc., promotes the construction of a peaceful, safe, open, and cooperative cyberspace, and establishes a multilateral, democratic, and transparent network Governance system.

  Article 8: The national cybersecurity and informatization department is responsible for overall planning and coordination of cybersecurity work and related supervision and management. The competent telecommunications department of the State Council, the public security department and other relevant agencies shall be responsible for network security protection and supervision and management within the scope of their respective duties in accordance with the provisions of this Law and relevant laws and administrative regulations.

  The network security protection, supervision and management responsibilities of relevant departments of local people’s governments at or above the county level shall be determined in accordance with relevant state regulations.

  Article 9: When conducting business and service activities, network operators must abide by laws and administrative regulations, respect social ethics, observe business ethics, be honest and trustworthy, perform network security protection obligations, accept government and social supervision, and assume social responsibilities.

  Article 10: The construction and operation of networks or the provision of services through the network shall, in accordance with the provisions of laws, administrative regulations and mandatory requirements of national standards, adopt technical measures and other necessary measures to ensure network security and stable operation, and effectively respond to network security incidents. Prevent network illegal and criminal activities and maintain the integrity, confidentiality and availability of network data.

  Article 11: Network-related industry organizations shall strengthen industry self-discipline, formulate cybersecurity code of conduct, guide members to strengthen cybersecurity protection, improve the level of cybersecurity protection, and promote the healthy development of the industry in accordance with the articles of association.

  Article 12: The state protects citizens, legal persons, and other organizations’ rights to use the Internet in accordance with the law, promotes the popularization of Internet access, improves the level of Internet services, provides the society with safe and convenient Internet services, and guarantees the orderly and free flow of Internet information in accordance with the law.

  Any individual or organization using the Internet shall abide by the Constitution and laws, observe public order, respect social ethics, must not endanger network security, and must not use the Internet to endanger national security, honor and interests, instigate subversion of state power, overthrow the socialist system, incitement to split the country, Undermine national unity, promote terrorism, extremism, promote ethnic hatred, ethnic discrimination, spread violence, obscene and pornographic information, fabricate and spread false information to disrupt economic and social order, and infringe on the reputation, privacy, intellectual property rights and other legitimate rights and interests of others And other activities.

  Article 13 The state supports the research and development of online products and services that are conducive to the healthy growth of minors, punishes the use of the Internet to engage in activities that endanger the physical and mental health of minors in accordance with the law, and provides a safe and healthy online environment for minors.

  Article 14: Any individual or organization has the right to report to cybersecurity and informatization, telecommunications, public security and other departments for acts endangering network security. The department that receives the report shall promptly deal with it in accordance with the law; if it does not belong to the department’s responsibility, it shall promptly transfer it to the department authorized to handle it.

  Relevant departments shall keep confidential the relevant information of the whistleblower and protect the legitimate rights and interests of the whistleblower.

  Chapter II Network Security Support and Promotion

  Article 15: The state establishes and improves a network security standard system. The standardization administrative department of the State Council and other relevant departments of the State Council, in accordance with their respective responsibilities, organize the formulation and timely revision of national standards and industry standards related to network security management and network products, services, and operational security.

  The state supports enterprises, research institutions, colleges and universities, and network-related industry organizations to participate in the formulation of national and industry standards for network security.

  Article 16 The State Council and the people’s governments of provinces, autonomous regions, and municipalities directly under the Central Government shall make overall plans, increase investment, support key cybersecurity technology industries and projects, support the research, development and application of cybersecurity technologies, and promote safe and reliable network products and services. Protect the intellectual property rights of network technology, and support enterprises, research institutions and colleges and universities to participate in national network security technology innovation projects.

  Article 17 The state promotes the establishment of a network security social service system, and encourages relevant enterprises and institutions to provide security services such as network security certification, testing, and risk assessment.

  Article 18 The state encourages the development of network data security protection and utilization technologies, promotes the opening of public data resources, and promotes technological innovation and economic and social development.

  The state supports innovative network security management methods and the use of new network technologies to improve the level of network security protection.

  Article 19: People’s governments at all levels and their relevant departments shall organize and carry out regular cybersecurity publicity and education, and guide and urge relevant units to do a good job in cybersecurity publicity and education.

  The mass media should provide targeted publicity and education on network security to the society.

  Article 20: The state supports enterprises, institutions of higher learning, vocational schools and other education and training institutions to carry out cybersecurity-related education and training, adopt various methods to cultivate cybersecurity talents, and promote the exchange of cybersecurity talents.

Chapter III Network Operation Security

  Section 1 General Provisions

  Article 21 The state implements a hierarchical network security protection system. Network operators shall, in accordance with the requirements of the network security level protection system, perform the following security protection obligations to protect the network from interference, destruction or unauthorized access, and prevent network data from being leaked or stolen or tampered with:

  (1) Formulate internal security management systems and operating procedures, determine the person in charge of network security, and implement network security protection responsibilities;

  (2) Taking technical measures to prevent computer viruses, network attacks, network intrusions and other acts that endanger network security;

  (3) Take technical measures to monitor and record network operation status and network security incidents, and keep relevant network logs for not less than six months in accordance with regulations;

  (4) Taking measures such as data classification, important data backup and encryption;

  (5) Other obligations stipulated by laws and administrative regulations.

  Article 22 Network products and services shall meet the mandatory requirements of relevant national standards. Providers of network products and services must not set up malicious programs; when they discover that their network products and services have security flaws, loopholes, and other risks, they should immediately take remedial measures, notify users in a timely manner and report to relevant competent authorities in accordance with regulations.

  Providers of network products and services shall continue to provide security maintenance for their products and services; within the time limit stipulated or agreed by the parties, the security maintenance shall not be terminated.

  If network products and services have the function of collecting user information, their providers shall expressly indicate to users and obtain consent; where users’ personal information is involved, they shall also comply with the provisions of this Law and relevant laws and administrative regulations on the protection of personal information.

  Article 23: Critical network equipment and special network security products shall be sold or provided in accordance with the compulsory requirements of relevant national standards, and shall be sold or provided by a qualified organization after passing the security certification or the security testing requirements. The State Cyberspace Administration, in conjunction with relevant departments of the State Council, formulates and publishes a catalog of key network equipment and network security products, and promotes mutual recognition of safety certification and safety testing results to avoid repeated certification and testing.

  Article 24: Network operators handle network access and domain name registration services for users, handle network access procedures such as fixed telephones and mobile phones, or provide users with information release, instant messaging and other services, and sign agreements with users or confirm the provision of services At the time, users should be required to provide real identity information. If users do not provide real identity information, network operators shall not provide relevant services for them.

  The state implements a network trusted identity strategy, supports the research and development of safe and convenient electronic identity authentication technology, and promotes mutual recognition between different electronic identity authentication.

  Article 25: Network operators shall formulate emergency plans for network security incidents, and promptly deal with security risks such as system vulnerabilities, computer viruses, network attacks, and network intrusions; in the event of an incident that endangers network security, they shall immediately initiate emergency plans and take corresponding measures. Remedial measures, and report to relevant competent authorities in accordance with regulations.

  Article 26: Carrying out network security certification, testing, risk assessment and other activities, and disseminating network security information such as system vulnerabilities, computer viruses, network attacks, and network intrusions to the society, shall comply with relevant national regulations.

  Article 27: No individual or organization shall engage in activities that endanger network security such as illegal intrusion into another’s network, interference with the normal function of another’s network, stealing of network data, etc.; Network data and other programs and tools that endanger network security; those who know others are engaged in activities that endanger network security shall not provide them with technical support, advertising promotion, payment and settlement assistance.

  Article 28: Network operators shall provide technical support and assistance to public security organs and national security organs in maintaining national security and investigating crimes in accordance with the law.

  Article 29 The State supports cooperation among network operators in the collection, analysis, notification, and emergency response of network security information, so as to improve the security assurance capabilities of network operators.

  Relevant industry organizations have established and improved the industry’s cyber security protection norms and coordination mechanisms, strengthened the analysis and assessment of cyber security risks, regularly issued risk warnings to members, and supported and assisted members in coping with cyber security risks.

  Article 30: Information obtained by cybersecurity and informatization departments and relevant departments in the performance of cybersecurity protection duties can only be used for the needs of maintaining cybersecurity and may not be used for other purposes.

  Section 2 Operational Security of Critical Information Infrastructure

  Article 31 The state’s protection of important industries and fields such as public communications and information services, energy, transportation, water conservancy, finance, public services, e-government, and other important industries and fields, as well as other damages, loss of functions, or data leakage, may seriously endanger national security. The key information infrastructure of the national economy, people’s livelihood, and public interest is subject to key protection on the basis of the network security hierarchical protection system. The specific scope of critical information infrastructure and security protection measures shall be formulated by the State Council.

  The state encourages network operators outside the critical information infrastructure to voluntarily participate in the critical information infrastructure protection system.

  Article 32 In accordance with the division of responsibilities prescribed by the State Council, the departments responsible for the security protection of critical information infrastructure shall prepare and organize the implementation of critical information infrastructure security plans for the industry and this field, and guide and supervise the operation and security protection of critical information infrastructure. jobs.

  Article 33 The construction of critical information infrastructure shall ensure that it has the performance of supporting business stability and continuous operation, and ensure that security technical measures are planned, constructed, and used simultaneously.

  Article 34 In addition to the provisions of Article 21 of this Law, operators of critical information infrastructure shall also perform the following security protection obligations:

  (1) Establish a special safety management agency and a person in charge of safety management, and conduct a safety background review of the person in charge and personnel in key positions;

  (2) Regularly conduct network security education, technical training and skill assessment for practitioners;

  (3) Disaster recovery backup of important systems and databases;

  (4) Formulate emergency plans for network security incidents and conduct regular drills;

  (5) Other obligations stipulated by laws and administrative regulations.

  Article 35: Operators of critical information infrastructure purchasing network products and services that may affect national security shall pass the national security review organized by the State Cyberspace Administration of China in conjunction with relevant departments of the State Council.

  Article 36: Operators of critical information infrastructure purchasing network products and services shall sign security and confidentiality agreements with providers in accordance with regulations, clarifying security and confidentiality obligations and responsibilities.

  Article 37: Personal information and important data collected and generated by operators of critical information infrastructures in the territory of the People’s Republic of China shall be stored in the territory. If it is necessary to provide it overseas due to business needs, the security assessment shall be conducted in accordance with the measures formulated by the national cyberspace administration department in conjunction with the relevant departments of the State Council; where laws and administrative regulations provide otherwise, follow those provisions.

  Article 38: Operators of critical information infrastructure shall, on their own or entrust a network security service agency, to conduct inspections and assessments of the security and possible risks of their networks at least once a year, and report the inspections, assessments and improvement measures to relevant authorities. Department of critical information infrastructure security protection work.

  Article 39: The State Cyberspace Administration shall coordinate relevant departments to take the following measures for the security protection of critical information infrastructure:

  (1) Conduct spot checks on the security risks of critical information infrastructure, propose improvement measures, and, if necessary, entrust a network security service organization to detect and evaluate the security risks that exist on the network;

  (2) Regularly organize operators of critical information infrastructure to conduct cybersecurity emergency drills to improve the level of response to cybersecurity incidents and the ability to coordinate and cooperate;

  (3) Promote network security information sharing among relevant departments, key information infrastructure operators, and relevant research institutions, network security service agencies, etc.;

  (4) Provide technical support and assistance for emergency handling of network security incidents and restoration of network functions.

  Chapter 4 Network Information Security

  Article 40: Network operators shall strictly keep confidential the user information they collect, and establish and improve user information protection systems.

  Article 41: When collecting and using personal information, network operators shall follow the principles of lawfulness, fairness, and necessity, publicly collect and use rules, clearly state the purpose, method, and scope of information collection and use, and obtain the consent of the person being collected.

  Network operators shall not collect personal information irrelevant to the services they provide, and shall not collect and use personal information in violation of the provisions of laws, administrative regulations and the agreement between the parties, and shall handle its storage in accordance with the provisions of laws, administrative regulations and the agreement with users Personal information.

  Article 42: Network operators must not disclose, tamper with, or destroy the personal information they collect; they must not provide personal information to others without the consent of the person being collected. However, except for those that cannot be identified and cannot be recovered after processing.

  Network operators shall take technical measures and other necessary measures to ensure the safety of the personal information they collect and prevent information leakage, damage, or loss. When personal information leakage, damage, or loss occurs or may occur, remedial measures shall be taken immediately, and users shall be notified in a timely manner and reported to the relevant competent authority in accordance with regulations.

  Article 43: If an individual discovers that a network operator has collected and used his personal information in violation of laws, administrative regulations, or agreed by both parties, he has the right to request the network operator to delete his or her personal information; if he discovers that the network operator collects and stores his personal information If the information is wrong, the network operator has the right to correct it. Network operators should take measures to delete or correct them.

  Article 44: No individual or organization may steal or obtain personal information in other illegal ways, or illegally sell or illegally provide personal information to others.

  Article 45: Departments and their staff that are responsible for network security supervision and management in accordance with the law must strictly keep the personal information, privacy, and business secrets learned in the performance of their duties confidential, and must not disclose, sell, or illegally provide them to others.

  Article 46: Any individual or organization shall be responsible for their use of the Internet, and shall not set up websites or communication groups for fraudulent, imparting criminal methods, making or selling prohibited items, controlled items and other illegal and criminal activities, and shall not use Internet publishing involves the implementation of fraud, the production or sale of prohibited items, controlled items, and other illegal and criminal activities.

  Article 47: Network operators shall strengthen the management of the information released by their users, and if they find information that is prohibited by laws or administrative regulations from being released or transmitted, they shall immediately stop the transmission of the information and take measures such as elimination to prevent the spread of the information and save it. Relevant records and report to relevant competent authorities.

  Article 48 The electronic information sent by any individual or organization, or the application software provided by it, must not set up malicious programs, and must not contain information that is prohibited by laws or administrative regulations from being published or transmitted.

  Electronic information sending service providers and application software downloading service providers shall perform their security management obligations. If they know that their users have acted as prescribed in the preceding paragraph, they shall stop providing services, take disposal measures such as elimination, save relevant records, and report to relevant competent authorities report.

  Article 49: Network operators shall establish a network information security complaint and report system, publish information such as complaints and report methods, and promptly accept and handle complaints and reports related to network information security.

  Network operators shall cooperate with the supervision and inspection carried out by the network information department and relevant departments in accordance with the law.

  Article 50: National cybersecurity and informatization departments and relevant departments perform their duties of network information security supervision and management in accordance with the law and discover information that is prohibited by laws or administrative regulations from being released or transmitted, they shall require network operators to stop transmission, take measures such as elimination, and keep relevant records ; For the above-mentioned information originating from outside the People’s Republic of China, relevant agencies should be notified to take technical measures and other necessary measures to stop the spread.

Chapter V Monitoring, Early Warning and Emergency Response

  Article 51 The State establishes a network security monitoring, early warning and information notification system. The national cybersecurity and informatization department shall coordinate relevant departments to strengthen the collection, analysis and notification of cybersecurity information, and release cybersecurity monitoring and early warning information in a unified manner in accordance with regulations.

  Article 52: Departments responsible for the security protection of critical information infrastructures shall establish and improve the network security monitoring and early warning and information reporting systems in their respective industries and fields, and submit network security monitoring and early warning information in accordance with regulations.

  Article 53: The national cybersecurity and informatization department coordinates relevant departments to establish and improve cybersecurity risk assessment and emergency response mechanisms, formulate emergency plans for cybersecurity incidents, and organize drills on a regular basis.

  Departments responsible for the security protection of critical information infrastructure should formulate emergency plans for cyber security incidents in their respective industries and fields, and organize drills on a regular basis.

  The network security incident emergency plan shall classify network security incidents according to factors such as the degree of harm and scope of influence after the incident, and provide corresponding emergency response measures.

  Article 54: When the risk of a cyber security incident increases, the relevant departments of the people’s government at or above the provincial level shall, in accordance with the prescribed powers and procedures, and in accordance with the characteristics of cyber security risks and possible harm, take the following measures:

  (1) Require relevant departments, institutions and personnel to collect and report relevant information in a timely manner, and strengthen the monitoring of network security risks;

  (2) Organizing relevant departments, institutions, and professionals to analyze and evaluate cybersecurity risk information, and predict the possibility, scope of impact, and degree of harm of the incident;

  (3) Issue network security risk warnings to the public, and issue measures to avoid and mitigate harm.

  Article 55: In the event of a cyber security incident, the emergency plan for cyber security incidents shall be activated immediately, the cyber security incidents shall be investigated and evaluated, and network operators shall be required to take technical measures and other necessary measures to eliminate potential security hazards, prevent the expansion of hazards, and promptly Publish warning information related to the public to the society.

  Article 56: When the relevant departments of the people’s government at or above the provincial level find that the network has a major security risk or a security incident during the performance of network security supervision and management responsibilities, they may act as the legal representative of the network operator in accordance with the prescribed authority and procedures. Person or the main person in charge for an interview. Network operators should take measures in accordance with the requirements, carry out rectification and reform, and eliminate hidden dangers.

  Article 57: Due to cybersecurity incidents, emergencies or production safety accidents should be handled in accordance with the “Emergency Response Law of the People’s Republic of China”, “Production Safety Law of the People’s Republic of China” and other relevant laws and administrative regulations. .

  Article 58: Due to the need to maintain national security and social public order, and deal with major social security incidents, with the decision or approval of the State Council, temporary measures such as restrictions on network communications may be taken in specific areas.

  Chapter VI Legal Liability

  Article 59: If a network operator fails to perform the network security protection obligations stipulated in Articles 21 and 25 of this Law, the relevant competent authority shall order corrections and give warnings; refusal to make corrections or cause harm to network security, etc. In case of violation, a fine of not less than 10,000 yuan but not more than 100,000 yuan shall be imposed, and a fine of not less than 5,000 yuan but not more than 50,000 yuan shall be imposed on the person in charge who is directly responsible.

  If the operator of critical information infrastructure fails to perform the network security protection obligations stipulated in Articles 33, 34, 36, and 38 of this Law, the relevant competent authority shall order corrections and give warnings ; If it refuses to make corrections or causes harm to network security, a fine of 100,000 yuan to 1 million yuan shall be imposed, and a fine of 10,000 yuan but not more than 100,000 yuan shall be imposed on the person in charge who is directly responsible.

  Article 60 Anyone who violates the provisions of Article 22, paragraphs 1 and 2 and Article 48, paragraph 1 of this law by committing any of the following acts shall be ordered by the relevant competent authority to make corrections and give warnings; refusal to make corrections Or cause harm to network security and other consequences, a fine of 50,000 yuan to 500,000 yuan shall be imposed, and a fine of 10,000 yuan but not more than 100,000 yuan shall be imposed on the person directly in charge:

  (1) Setting up malicious programs;

  (2) Failing to take immediate remedial measures for the security defects, loopholes and other risks of its products or services, or failing to notify users in time and report to the relevant competent authorities in accordance with regulations;

  (3) Terminating the provision of security maintenance for its products and services without authorization.

  Article 61: If a network operator violates the first paragraph of Article 24 of this law by failing to require users to provide true identity information, or providing relevant services to users who do not provide true identity information, the relevant competent authority shall order corrections; Those who refuse to make corrections or the circumstances are serious, shall be fined not less than 50,000 yuan but not more than 500,000 yuan, and may be ordered by the relevant competent authority to suspend relevant business, suspend business for rectification, close the website, revoke relevant business licenses or revoke business licenses, and shall be directly responsible The person in charge and other persons directly responsible shall be fined 10,000 yuan up to 100,000 yuan.

  Article 62 Anyone who violates the provisions of Article 26 of this Law to carry out network security certification, testing, risk assessment and other activities, or releases network security information such as system vulnerabilities, computer viruses, network attacks, and network intrusions to the society, shall be authorized by the relevant The competent department shall order corrections and give warnings; if they refuse to make corrections or the circumstances are serious, a fine of 10,000 yuan up to 100,000 yuan shall be imposed, and the relevant competent department may order the suspension of relevant business, suspend business for rectification, close the website, revoke the relevant business license or The business license shall be revoked, and the directly responsible person in charge and other directly responsible persons shall be fined not less than 5,000 yuan but not more than 50,000 yuan.

  Article 63: Violating the provisions of Article 27 of this Law, engaging in activities that endanger network security, or providing programs and tools specifically for engaging in activities that endanger network security, or providing technical support for others to engage in activities that endanger network security, If advertising promotion, payment and settlement assistance does not constitute a crime, the public security organs shall confiscate the illegal income, impose a detention for not more than five days, and may also impose a fine of 50,000 yuan to 500,000 yuan; if the circumstances are more serious, the penalty shall be more than five days In detention for less than 15 days, a fine of 100,000 yuan up to 1 million yuan may be concurrently imposed.

  If a unit commits the acts mentioned in the preceding paragraph, the public security organ shall confiscate its illegal income, impose a fine of 100,000 yuan up to one million yuan, and the directly responsible persons in charge and other directly responsible persons shall be punished in accordance with the preceding paragraph.

  Violating the provisions of Article 27 of this Law and being punished by public security management, personnel shall not engage in cyber security management and network operations key positions within five years; those who have received criminal penalties shall not engage in critical cyber security management and network operations positions for life jobs.

  Article 64: Network operators, network product or service providers violate Article 22, paragraph 3, Article 41 to Article 43 of this law, and infringe on the right to protect personal information in accordance with the law , The relevant competent authority shall order corrections, and may, based on the circumstance, impose warnings, confiscate illegal income, and impose a fine of one to ten times the illegal income. If there is no illegal income, a fine of less than one million yuan shall be imposed, and the person directly responsible The person in charge and other directly responsible persons shall impose a fine of not less than 10,000 yuan but not more than 100,000 yuan; if the circumstances are serious, they may also be ordered to suspend relevant business, suspend business for rectification, close the website, revoke the relevant business license, or revoke the business license.

  In violation of the provisions of Article 44 of this Law, stealing or otherwise illegally acquiring, illegally selling, or illegally providing personal information to others does not constitute a crime, the illegal proceeds shall be confiscated by the public security organs, and the illegal proceeds shall be punishable by more than ten times the illegal proceeds. The following fines, if there is no illegal income, a fine of less than one million yuan shall be imposed.

  Article 65: If a key information infrastructure operator violates the provisions of Article 35 of this law by using network products or services that have not been reviewed or passed the security review, the relevant competent authority shall order them to stop the use and impose the purchase amount. A fine of not less than one time but not more than ten times; the directly responsible person in charge and other directly responsible persons shall be fined between 10,000 and 100,000 yuan.

  Article 66: If a key information infrastructure operator violates the provisions of Article 37 of this law by storing network data overseas or providing network data overseas, the relevant competent authority shall order corrections, give warnings, and confiscate illegal gains. Impose a fine of not less than 50,000 yuan but not more than 500,000 yuan, and can be ordered to suspend related businesses, suspend business for rectification, close the website, revoke related business licenses or revoke business licenses; impose 10,000 yuan on directly responsible persons in charge and other directly responsible persons Fines above 100,000 yuan.

  Article 67: In violation of the provisions of Article 46 of this Law, the establishment of websites or communication groups for the implementation of illegal and criminal activities, or the use of the Internet to publish information related to the implementation of illegal and criminal activities, which does not constitute a crime, the public security organs Detention for less than five days may be concurrently fined 10,000 yuan but not more than 100,000 yuan; if the circumstances are more serious, detention for not less than five days but not more than 15 days, and a fine of 50,000 yuan but not more than 500,000 yuan may be concurrently imposed. Close websites and communication groups used to implement illegal and criminal activities.

  If a unit commits the acts mentioned in the preceding paragraph, the public security organ shall impose a fine of 100,000 yuan up to 500,000 yuan, and the directly responsible persons in charge and other directly responsible persons shall be punished in accordance with the provisions of the preceding paragraph.

  Article 68: If a network operator violates the provisions of Article 47 of this Law, fails to stop the transmission of information that is prohibited by laws or administrative regulations from being released or transmitted, adopts disposal measures such as elimination, and keeps relevant records, the relevant competent department shall order corrections. , Give warnings and confiscate illegal gains; those who refuse to make corrections or the circumstances are serious, shall be fined 100,000 yuan up to 500,000 yuan, and may be ordered to suspend related businesses, suspend business for rectification, close the website, revoke related business licenses, or revoke business licenses , The directly responsible person in charge and other directly responsible persons shall be fined 10,000 yuan up to 100,000 yuan.

  Electronic information transmission service providers and application software download service providers who fail to perform the security management obligations stipulated in the second paragraph of Article 48 of this law shall be punished in accordance with the provisions of the preceding paragraph.

  Article 69: Network operators who violate the provisions of this law by committing one of the following acts shall be ordered by the relevant competent authority to make corrections; if they refuse to make corrections or the circumstances are serious, they shall be fined between RMB 50,000 and RMB 500,000 and shall be directly responsible The person in charge and other persons directly responsible shall be fined not less than 10,000 yuan but not more than 100,000 yuan:

  (1) Failing to follow the requirements of relevant departments to take measures to stop the transmission or eliminate the information that is prohibited by laws and administrative regulations from being released or transmitted;

  (2) Refusing or obstructing the supervision and inspection carried out by relevant departments according to law;

  (3) Refusing to provide technical support and assistance to public security organs and national security organs.

  Article 70 Anyone who publishes or transmits information that is prohibited by the second paragraph of Article 12 of this Law and other laws and administrative regulations shall be punished in accordance with the relevant laws and administrative regulations.

  Article 71: Where there is an illegal act as prescribed by this law, it shall be recorded in the credit file in accordance with the provisions of relevant laws and administrative regulations, and shall be publicized.

  Article 72: If the operator of the government network of a state agency fails to perform the network security protection obligations provided for in this Law, the higher-level agency or relevant agency shall order it to make corrections; the directly responsible persons in charge and other directly responsible persons shall be punished in accordance with the law.

  Article 73: Where cybersecurity and informatization departments and relevant departments violate the provisions of Article 30 of this law and use information obtained in the performance of cybersecurity protection duties for other purposes, the directly responsible persons in charge and other directly responsible persons shall be granted legally Sanction.

  If the staff of the cybersecurity and informatization department and relevant departments have neglected their duties, abused their powers, practiced malpractice for personal gain, and did not constitute a crime, they shall be punished according to law.

  Article 74 Anyone who violates the provisions of this law and causes damage to others shall bear civil liability in accordance with the law.

  Violation of the provisions of this law and constitutes a violation of public security management shall be given public security management penalties in accordance with the law; if a crime is constituted, criminal responsibility shall be investigated in accordance with the law.

  Article 75: Where foreign institutions, organizations, and individuals engage in activities that endanger the critical information infrastructure of the People’s Republic of China, such as attacks, intrusions, interference, or destruction, causing serious consequences, they shall be investigated for legal responsibility in accordance with the law; the public security department of the State Council and relevant departments shall not It may decide to freeze property or other necessary sanctions against the institution, organization, or individual.

  Chapter 7 Supplementary Provisions

  Article 76 The meaning of the following terms in this law:

  (1) Network refers to a system composed of computers or other information terminals and related equipment that collect, store, transmit, exchange, and process information in accordance with certain rules and procedures.

  (2) Network security refers to the adoption of necessary measures to prevent attacks, intrusions, interference, sabotage and illegal use of the network, as well as accidents, to keep the network in a stable and reliable operation state, and to ensure the integrity and confidentiality of network data , The ability of usability.

  (3) Network operator refers to the owner, manager and network service provider of the network.

  (4) Network data refers to all kinds of electronic data collected, stored, transmitted, processed and generated through the network.

  (5) Personal information refers to various information recorded electronically or in other ways that can identify a natural person’s personal identity alone or in combination with other information, including but not limited to the natural person’s name, date of birth, ID number, and personal biometric information , Residential address, telephone number, etc.

  Article 77: In addition to complying with this law, the operation security protection of networks that store and process state secret information shall also comply with the provisions of secrecy laws and administrative regulations.

  Article 78 The security protection of military networks shall be separately stipulated by the Central Military Commission.

  Article 79 This law shall come into force on June 1, 2017.

中华人民共和国网络安全法

(2016年11月7日第十二届全国人民代表大会常务委员会第二十四次会议通过)

  目 录

  第一章 总 则

  第二章 网络安全支持与促进

  第三章 网络运行安全

  第一节 一般规定

  第二节 关键信息基础设施的运行安全

  第四章 网络信息安全

  第五章 监测预警与应急处置

  第六章 法律责任

  第七章 附 则

  第一章 总 则

  第一条 为了保障网络安全,维护网络空间主权和国家安全、社会公共利益,保护公民、法人和其他组织的合法权益,促进经济社会信息化健康发展,制定本法。

  第二条 在中华人民共和国境内建设、运营、维护和使用网络,以及网络安全的监督管理,适用本法。

  第三条 国家坚持网络安全与信息化发展并重,遵循积极利用、科学发展、依法管理、确保安全的方针,推进网络基础设施建设和互联互通,鼓励网络技术创新和应用,支持培养网络安全人才,建立健全网络安全保障体系,提高网络安全保护能力。

  第四条 国家制定并不断完善网络安全战略,明确保障网络安全的基本要求和主要目标,提出重点领域的网络安全政策、工作任务和措施。

  第五条 国家采取措施,监测、防御、处置来源于中华人民共和国境内外的网络安全风险和威胁,保护关键信息基础设施免受攻击、侵入、干扰和破坏,依法惩治网络违法犯罪活动,维护网络空间安全和秩序。

  第六条 国家倡导诚实守信、健康文明的网络行为,推动传播社会主义核心价值观,采取措施提高全社会的网络安全意识和水平,形成全社会共同参与促进网络安全的良好环境。

  第七条 国家积极开展网络空间治理、网络技术研发和标准制定、打击网络违法犯罪等方面的国际交流与合作,推动构建和平、安全、开放、合作的网络空间,建立多边、民主、透明的网络治理体系。

  第八条 国家网信部门负责统筹协调网络安全工作和相关监督管理工作。国务院电信主管部门、公安部门和其他有关机关依照本法和有关法律、行政法规的规定,在各自职责范围内负责网络安全保护和监督管理工作。

  县级以上地方人民政府有关部门的网络安全保护和监督管理职责,按照国家有关规定确定。

  第九条 网络运营者开展经营和服务活动,必须遵守法律、行政法规,尊重社会公德,遵守商业道德,诚实信用,履行网络安全保护义务,接受政府和社会的监督,承担社会责任。

  第十条 建设、运营网络或者通过网络提供服务,应当依照法律、行政法规的规定和国家标准的强制性要求,采取技术措施和其他必要措施,保障网络安全、稳定运行,有效应对网络安全事件,防范网络违法犯罪活动,维护网络数据的完整性、保密性和可用性。

  第十一条 网络相关行业组织按照章程,加强行业自律,制定网络安全行为规范,指导会员加强网络安全保护,提高网络安全保护水平,促进行业健康发展。

  第十二条 国家保护公民、法人和其他组织依法使用网络的权利,促进网络接入普及,提升网络服务水平,为社会提供安全、便利的网络服务,保障网络信息依法有序自由流动。

  任何个人和组织使用网络应当遵守宪法法律,遵守公共秩序,尊重社会公德,不得危害网络安全,不得利用网络从事危害国家安全、荣誉和利益,煽动颠覆国家政权、推翻社会主义制度,煽动分裂国家、破坏国家统一,宣扬恐怖主义、极端主义,宣扬民族仇恨、民族歧视,传播暴力、淫秽色情信息,编造、传播虚假信息扰乱经济秩序和社会秩序,以及侵害他人名誉、隐私、知识产权和其他合法权益等活动。

  第十三条 国家支持研究开发有利于未成年人健康成长的网络产品和服务,依法惩治利用网络从事危害未成年人身心健康的活动,为未成年人提供安全、健康的网络环境。

  第十四条 任何个人和组织有权对危害网络安全的行为向网信、电信、公安等部门举报。收到举报的部门应当及时依法作出处理;不属于本部门职责的,应当及时移送有权处理的部门。

  有关部门应当对举报人的相关信息予以保密,保护举报人的合法权益。

  第二章 网络安全支持与促进

  第十五条 国家建立和完善网络安全标准体系。国务院标准化行政主管部门和国务院其他有关部门根据各自的职责,组织制定并适时修订有关网络安全管理以及网络产品、服务和运行安全的国家标准、行业标准。

  国家支持企业、研究机构、高等学校、网络相关行业组织参与网络安全国家标准、行业标准的制定。

  第十六条 国务院和省、自治区、直辖市人民政府应当统筹规划,加大投入,扶持重点网络安全技术产业和项目,支持网络安全技术的研究开发和应用,推广安全可信的网络产品和服务,保护网络技术知识产权,支持企业、研究机构和高等学校等参与国家网络安全技术创新项目。

  第十七条 国家推进网络安全社会化服务体系建设,鼓励有关企业、机构开展网络安全认证、检测和风险评估等安全服务。

  第十八条 国家鼓励开发网络数据安全保护和利用技术,促进公共数据资源开放,推动技术创新和经济社会发展。

  国家支持创新网络安全管理方式,运用网络新技术,提升网络安全保护水平。

  第十九条 各级人民政府及其有关部门应当组织开展经常性的网络安全宣传教育,并指导、督促有关单位做好网络安全宣传教育工作。

  大众传播媒介应当有针对性地面向社会进行网络安全宣传教育。

  第二十条 国家支持企业和高等学校、职业学校等教育培训机构开展网络安全相关教育与培训,采取多种方式培养网络安全人才,促进网络安全人才交流。

第三章 网络运行安全

  第一节 一般规定

  第二十一条 国家实行网络安全等级保护制度。网络运营者应当按照网络安全等级保护制度的要求,履行下列安全保护义务,保障网络免受干扰、破坏或者未经授权的访问,防止网络数据泄露或者被窃取、篡改:

  (一)制定内部安全管理制度和操作规程,确定网络安全负责人,落实网络安全保护责任;

  (二)采取防范计算机病毒和网络攻击、网络侵入等危害网络安全行为的技术措施;

  (三)采取监测、记录网络运行状态、网络安全事件的技术措施,并按照规定留存相关的网络日志不少于六个月;

  (四)采取数据分类、重要数据备份和加密等措施;

  (五)法律、行政法规规定的其他义务。

  第二十二条 网络产品、服务应当符合相关国家标准的强制性要求。网络产品、服务的提供者不得设置恶意程序;发现其网络产品、服务存在安全缺陷、漏洞等风险时,应当立即采取补救措施,按照规定及时告知用户并向有关主管部门报告。

  网络产品、服务的提供者应当为其产品、服务持续提供安全维护;在规定或者当事人约定的期限内,不得终止提供安全维护。

  网络产品、服务具有收集用户信息功能的,其提供者应当向用户明示并取得同意;涉及用户个人信息的,还应当遵守本法和有关法律、行政法规关于个人信息保护的规定。

  第二十三条 网络关键设备和网络安全专用产品应当按照相关国家标准的强制性要求,由具备资格的机构安全认证合格或者安全检测符合要求后,方可销售或者提供。国家网信部门会同国务院有关部门制定、公布网络关键设备和网络安全专用产品目录,并推动安全认证和安全检测结果互认,避免重复认证、检测。

  第二十四条 网络运营者为用户办理网络接入、域名注册服务,办理固定电话、移动电话等入网手续,或者为用户提供信息发布、即时通讯等服务,在与用户签订协议或者确认提供服务时,应当要求用户提供真实身份信息。用户不提供真实身份信息的,网络运营者不得为其提供相关服务。

  国家实施网络可信身份战略,支持研究开发安全、方便的电子身份认证技术,推动不同电子身份认证之间的互认。

  第二十五条 网络运营者应当制定网络安全事件应急预案,及时处置系统漏洞、计算机病毒、网络攻击、网络侵入等安全风险;在发生危害网络安全的事件时,立即启动应急预案,采取相应的补救措施,并按照规定向有关主管部门报告。

  第二十六条 开展网络安全认证、检测、风险评估等活动,向社会发布系统漏洞、计算机病毒、网络攻击、网络侵入等网络安全信息,应当遵守国家有关规定。

  第二十七条 任何个人和组织不得从事非法侵入他人网络、干扰他人网络正常功能、窃取网络数据等危害网络安全的活动;不得提供专门用于从事侵入网络、干扰网络正常功能及防护措施、窃取网络数据等危害网络安全活动的程序、工具;明知他人从事危害网络安全的活动的,不得为其提供技术支持、广告推广、支付结算等帮助。

  第二十八条 网络运营者应当为公安机关、国家安全机关依法维护国家安全和侦查犯罪的活动提供技术支持和协助。

  第二十九条 国家支持网络运营者之间在网络安全信息收集、分析、通报和应急处置等方面进行合作,提高网络运营者的安全保障能力。

  有关行业组织建立健全本行业的网络安全保护规范和协作机制,加强对网络安全风险的分析评估,定期向会员进行风险警示,支持、协助会员应对网络安全风险。

  第三十条 网信部门和有关部门在履行网络安全保护职责中获取的信息,只能用于维护网络安全的需要,不得用于其他用途。

  第二节 关键信息基础设施的运行安全

  第三十一条 国家对公共通信和信息服务、能源、交通、水利、金融、公共服务、电子政务等重要行业和领域,以及其他一旦遭到破坏、丧失功能或者数据泄露,可能严重危害国家安全、国计民生、公共利益的关键信息基础设施,在网络安全等级保护制度的基础上,实行重点保护。关键信息基础设施的具体范围和安全保护办法由国务院制定。

  国家鼓励关键信息基础设施以外的网络运营者自愿参与关键信息基础设施保护体系。

  第三十二条 按照国务院规定的职责分工,负责关键信息基础设施安全保护工作的部门分别编制并组织实施本行业、本领域的关键信息基础设施安全规划,指导和监督关键信息基础设施运行安全保护工作。

  第三十三条 建设关键信息基础设施应当确保其具有支持业务稳定、持续运行的性能,并保证安全技术措施同步规划、同步建设、同步使用。

  第三十四条 除本法第二十一条的规定外,关键信息基础设施的运营者还应当履行下列安全保护义务:

  (一)设置专门安全管理机构和安全管理负责人,并对该负责人和关键岗位的人员进行安全背景审查;

  (二)定期对从业人员进行网络安全教育、技术培训和技能考核;

  (三)对重要系统和数据库进行容灾备份;

  (四)制定网络安全事件应急预案,并定期进行演练;

  (五)法律、行政法规规定的其他义务。

  第三十五条 关键信息基础设施的运营者采购网络产品和服务,可能影响国家安全的,应当通过国家网信部门会同国务院有关部门组织的国家安全审查。

  第三十六条 关键信息基础设施的运营者采购网络产品和服务,应当按照规定与提供者签订安全保密协议,明确安全和保密义务与责任。

  第三十七条 关键信息基础设施的运营者在中华人民共和国境内运营中收集和产生的个人信息和重要数据应当在境内存储。因业务需要,确需向境外提供的,应当按照国家网信部门会同国务院有关部门制定的办法进行安全评估;法律、行政法规另有规定的,依照其规定。

  第三十八条 关键信息基础设施的运营者应当自行或者委托网络安全服务机构对其网络的安全性和可能存在的风险每年至少进行一次检测评估,并将检测评估情况和改进措施报送相关负责关键信息基础设施安全保护工作的部门。

  第三十九条 国家网信部门应当统筹协调有关部门对关键信息基础设施的安全保护采取下列措施:

  (一)对关键信息基础设施的安全风险进行抽查检测,提出改进措施,必要时可以委托网络安全服务机构对网络存在的安全风险进行检测评估;

  (二)定期组织关键信息基础设施的运营者进行网络安全应急演练,提高应对网络安全事件的水平和协同配合能力;

  (三)促进有关部门、关键信息基础设施的运营者以及有关研究机构、网络安全服务机构等之间的网络安全信息共享;

  (四)对网络安全事件的应急处置与网络功能的恢复等,提供技术支持和协助。

  第四章 网络信息安全

  第四十条 网络运营者应当对其收集的用户信息严格保密,并建立健全用户信息保护制度。

  第四十一条 网络运营者收集、使用个人信息,应当遵循合法、正当、必要的原则,公开收集、使用规则,明示收集、使用信息的目的、方式和范围,并经被收集者同意。

  网络运营者不得收集与其提供的服务无关的个人信息,不得违反法律、行政法规的规定和双方的约定收集、使用个人信息,并应当依照法律、行政法规的规定和与用户的约定,处理其保存的个人信息。

  第四十二条 网络运营者不得泄露、篡改、毁损其收集的个人信息;未经被收集者同意,不得向他人提供个人信息。但是,经过处理无法识别特定个人且不能复原的除外。

  网络运营者应当采取技术措施和其他必要措施,确保其收集的个人信息安全,防止信息泄露、毁损、丢失。在发生或者可能发生个人信息泄露、毁损、丢失的情况时,应当立即采取补救措施,按照规定及时告知用户并向有关主管部门报告。

  第四十三条 个人发现网络运营者违反法律、行政法规的规定或者双方的约定收集、使用其个人信息的,有权要求网络运营者删除其个人信息;发现网络运营者收集、存储的其个人信息有错误的,有权要求网络运营者予以更正。网络运营者应当采取措施予以删除或者更正。

  第四十四条 任何个人和组织不得窃取或者以其他非法方式获取个人信息,不得非法出售或者非法向他人提供个人信息。

  第四十五条 依法负有网络安全监督管理职责的部门及其工作人员,必须对在履行职责中知悉的个人信息、隐私和商业秘密严格保密,不得泄露、出售或者非法向他人提供。

  第四十六条 任何个人和组织应当对其使用网络的行为负责,不得设立用于实施诈骗,传授犯罪方法,制作或者销售违禁物品、管制物品等违法犯罪活动的网站、通讯群组,不得利用网络发布涉及实施诈骗,制作或者销售违禁物品、管制物品以及其他违法犯罪活动的信息。

  第四十七条 网络运营者应当加强对其用户发布的信息的管理,发现法律、行政法规禁止发布或者传输的信息的,应当立即停止传输该信息,采取消除等处置措施,防止信息扩散,保存有关记录,并向有关主管部门报告。

  第四十八条 任何个人和组织发送的电子信息、提供的应用软件,不得设置恶意程序,不得含有法律、行政法规禁止发布或者传输的信息。

  电子信息发送服务提供者和应用软件下载服务提供者,应当履行安全管理义务,知道其用户有前款规定行为的,应当停止提供服务,采取消除等处置措施,保存有关记录,并向有关主管部门报告。

  第四十九条 网络运营者应当建立网络信息安全投诉、举报制度,公布投诉、举报方式等信息,及时受理并处理有关网络信息安全的投诉和举报。

  网络运营者对网信部门和有关部门依法实施的监督检查,应当予以配合。

  第五十条 国家网信部门和有关部门依法履行网络信息安全监督管理职责,发现法律、行政法规禁止发布或者传输的信息的,应当要求网络运营者停止传输,采取消除等处置措施,保存有关记录;对来源于中华人民共和国境外的上述信息,应当通知有关机构采取技术措施和其他必要措施阻断传播。

第五章 监测预警与应急处置

  第五十一条 国家建立网络安全监测预警和信息通报制度。国家网信部门应当统筹协调有关部门加强网络安全信息收集、分析和通报工作,按照规定统一发布网络安全监测预警信息。

  第五十二条 负责关键信息基础设施安全保护工作的部门,应当建立健全本行业、本领域的网络安全监测预警和信息通报制度,并按照规定报送网络安全监测预警信息。

  第五十三条 国家网信部门协调有关部门建立健全网络安全风险评估和应急工作机制,制定网络安全事件应急预案,并定期组织演练。

  负责关键信息基础设施安全保护工作的部门应当制定本行业、本领域的网络安全事件应急预案,并定期组织演练。

  网络安全事件应急预案应当按照事件发生后的危害程度、影响范围等因素对网络安全事件进行分级,并规定相应的应急处置措施。

  第五十四条 网络安全事件发生的风险增大时,省级以上人民政府有关部门应当按照规定的权限和程序,并根据网络安全风险的特点和可能造成的危害,采取下列措施:

  (一)要求有关部门、机构和人员及时收集、报告有关信息,加强对网络安全风险的监测;

  (二)组织有关部门、机构和专业人员,对网络安全风险信息进行分析评估,预测事件发生的可能性、影响范围和危害程度;

  (三)向社会发布网络安全风险预警,发布避免、减轻危害的措施。

  第五十五条 发生网络安全事件,应当立即启动网络安全事件应急预案,对网络安全事件进行调查和评估,要求网络运营者采取技术措施和其他必要措施,消除安全隐患,防止危害扩大,并及时向社会发布与公众有关的警示信息。

  第五十六条 省级以上人民政府有关部门在履行网络安全监督管理职责中,发现网络存在较大安全风险或者发生安全事件的,可以按照规定的权限和程序对该网络的运营者的法定代表人或者主要负责人进行约谈。网络运营者应当按照要求采取措施,进行整改,消除隐患。

  第五十七条 因网络安全事件,发生突发事件或者生产安全事故的,应当依照《中华人民共和国突发事件应对法》、《中华人民共和国安全生产法》等有关法律、行政法规的规定处置。

  第五十八条 因维护国家安全和社会公共秩序,处置重大突发社会安全事件的需要,经国务院决定或者批准,可以在特定区域对网络通信采取限制等临时措施。

  第六章 法律责任

  第五十九条 网络运营者不履行本法第二十一条、第二十五条规定的网络安全保护义务的,由有关主管部门责令改正,给予警告;拒不改正或者导致危害网络安全等后果的,处一万元以上十万元以下罚款,对直接负责的主管人员处五千元以上五万元以下罚款。

  关键信息基础设施的运营者不履行本法第三十三条、第三十四条、第三十六条、第三十八条规定的网络安全保护义务的,由有关主管部门责令改正,给予警告;拒不改正或者导致危害网络安全等后果的,处十万元以上一百万元以下罚款,对直接负责的主管人员处一万元以上十万元以下罚款。

  第六十条 违反本法第二十二条第一款、第二款和第四十八条第一款规定,有下列行为之一的,由有关主管部门责令改正,给予警告;拒不改正或者导致危害网络安全等后果的,处五万元以上五十万元以下罚款,对直接负责的主管人员处一万元以上十万元以下罚款:

  (一)设置恶意程序的;

  (二)对其产品、服务存在的安全缺陷、漏洞等风险未立即采取补救措施,或者未按照规定及时告知用户并向有关主管部门报告的;

  (三)擅自终止为其产品、服务提供安全维护的。

  第六十一条 网络运营者违反本法第二十四条第一款规定,未要求用户提供真实身份信息,或者对不提供真实身份信息的用户提供相关服务的,由有关主管部门责令改正;拒不改正或者情节严重的,处五万元以上五十万元以下罚款,并可以由有关主管部门责令暂停相关业务、停业整顿、关闭网站、吊销相关业务许可证或者吊销营业执照,对直接负责的主管人员和其他直接责任人员处一万元以上十万元以下罚款。

  第六十二条 违反本法第二十六条规定,开展网络安全认证、检测、风险评估等活动,或者向社会发布系统漏洞、计算机病毒、网络攻击、网络侵入等网络安全信息的,由有关主管部门责令改正,给予警告;拒不改正或者情节严重的,处一万元以上十万元以下罚款,并可以由有关主管部门责令暂停相关业务、停业整顿、关闭网站、吊销相关业务许可证或者吊销营业执照,对直接负责的主管人员和其他直接责任人员处五千元以上五万元以下罚款。

  第六十三条 违反本法第二十七条规定,从事危害网络安全的活动,或者提供专门用于从事危害网络安全活动的程序、工具,或者为他人从事危害网络安全的活动提供技术支持、广告推广、支付结算等帮助,尚不构成犯罪的,由公安机关没收违法所得,处五日以下拘留,可以并处五万元以上五十万元以下罚款;情节较重的,处五日以上十五日以下拘留,可以并处十万元以上一百万元以下罚款。

  单位有前款行为的,由公安机关没收违法所得,处十万元以上一百万元以下罚款,并对直接负责的主管人员和其他直接责任人员依照前款规定处罚。

  违反本法第二十七条规定,受到治安管理处罚的人员,五年内不得从事网络安全管理和网络运营关键岗位的工作;受到刑事处罚的人员,终身不得从事网络安全管理和网络运营关键岗位的工作。

  第六十四条 网络运营者、网络产品或者服务的提供者违反本法第二十二条第三款、第四十一条至第四十三条规定,侵害个人信息依法得到保护的权利的,由有关主管部门责令改正,可以根据情节单处或者并处警告、没收违法所得、处违法所得一倍以上十倍以下罚款,没有违法所得的,处一百万元以下罚款,对直接负责的主管人员和其他直接责任人员处一万元以上十万元以下罚款;情节严重的,并可以责令暂停相关业务、停业整顿、关闭网站、吊销相关业务许可证或者吊销营业执照。

  违反本法第四十四条规定,窃取或者以其他非法方式获取、非法出售或者非法向他人提供个人信息,尚不构成犯罪的,由公安机关没收违法所得,并处违法所得一倍以上十倍以下罚款,没有违法所得的,处一百万元以下罚款。

  第六十五条 关键信息基础设施的运营者违反本法第三十五条规定,使用未经安全审查或者安全审查未通过的网络产品或者服务的,由有关主管部门责令停止使用,处采购金额一倍以上十倍以下罚款;对直接负责的主管人员和其他直接责任人员处一万元以上十万元以下罚款。

  第六十六条 关键信息基础设施的运营者违反本法第三十七条规定,在境外存储网络数据,或者向境外提供网络数据的,由有关主管部门责令改正,给予警告,没收违法所得,处五万元以上五十万元以下罚款,并可以责令暂停相关业务、停业整顿、关闭网站、吊销相关业务许可证或者吊销营业执照;对直接负责的主管人员和其他直接责任人员处一万元以上十万元以下罚款。

  第六十七条 违反本法第四十六条规定,设立用于实施违法犯罪活动的网站、通讯群组,或者利用网络发布涉及实施违法犯罪活动的信息,尚不构成犯罪的,由公安机关处五日以下拘留,可以并处一万元以上十万元以下罚款;情节较重的,处五日以上十五日以下拘留,可以并处五万元以上五十万元以下罚款。关闭用于实施违法犯罪活动的网站、通讯群组。

  单位有前款行为的,由公安机关处十万元以上五十万元以下罚款,并对直接负责的主管人员和其他直接责任人员依照前款规定处罚。

  第六十八条 网络运营者违反本法第四十七条规定,对法律、行政法规禁止发布或者传输的信息未停止传输、采取消除等处置措施、保存有关记录的,由有关主管部门责令改正,给予警告,没收违法所得;拒不改正或者情节严重的,处十万元以上五十万元以下罚款,并可以责令暂停相关业务、停业整顿、关闭网站、吊销相关业务许可证或者吊销营业执照,对直接负责的主管人员和其他直接责任人员处一万元以上十万元以下罚款。

  电子信息发送服务提供者、应用软件下载服务提供者,不履行本法第四十八条第二款规定的安全管理义务的,依照前款规定处罚。

  第六十九条 网络运营者违反本法规定,有下列行为之一的,由有关主管部门责令改正;拒不改正或者情节严重的,处五万元以上五十万元以下罚款,对直接负责的主管人员和其他直接责任人员,处一万元以上十万元以下罚款:

  (一)不按照有关部门的要求对法律、行政法规禁止发布或者传输的信息,采取停止传输、消除等处置措施的;

  (二)拒绝、阻碍有关部门依法实施的监督检查的;

  (三)拒不向公安机关、国家安全机关提供技术支持和协助的。

  第七十条 发布或者传输本法第十二条第二款和其他法律、行政法规禁止发布或者传输的信息的,依照有关法律、行政法规的规定处罚。

  第七十一条 有本法规定的违法行为的,依照有关法律、行政法规的规定记入信用档案,并予以公示。

  第七十二条 国家机关政务网络的运营者不履行本法规定的网络安全保护义务的,由其上级机关或者有关机关责令改正;对直接负责的主管人员和其他直接责任人员依法给予处分。

  第七十三条 网信部门和有关部门违反本法第三十条规定,将在履行网络安全保护职责中获取的信息用于其他用途的,对直接负责的主管人员和其他直接责任人员依法给予处分。

  网信部门和有关部门的工作人员玩忽职守、滥用职权、徇私舞弊,尚不构成犯罪的,依法给予处分。

  第七十四条 违反本法规定,给他人造成损害的,依法承担民事责任。

  违反本法规定,构成违反治安管理行为的,依法给予治安管理处罚;构成犯罪的,依法追究刑事责任。

  第七十五条 境外的机构、组织、个人从事攻击、侵入、干扰、破坏等危害中华人民共和国的关键信息基础设施的活动,造成严重后果的,依法追究法律责任;国务院公安部门和有关部门并可以决定对该机构、组织、个人采取冻结财产或者其他必要的制裁措施。

  第七章 附 则

  第七十六条 本法下列用语的含义:

  (一)网络,是指由计算机或者其他信息终端及相关设备组成的按照一定的规则和程序对信息进行收集、存储、传输、交换、处理的系统。

  (二)网络安全,是指通过采取必要措施,防范对网络的攻击、侵入、干扰、破坏和非法使用以及意外事故,使网络处于稳定可靠运行的状态,以及保障网络数据的完整性、保密性、可用性的能力。

  (三)网络运营者,是指网络的所有者、管理者和网络服务提供者。

  (四)网络数据,是指通过网络收集、存储、传输、处理和产生的各种电子数据。

  (五)个人信息,是指以电子或者其他方式记录的能够单独或者与其他信息结合识别自然人个人身份的各种信息,包括但不限于自然人的姓名、出生日期、身份证件号码、个人生物识别信息、住址、电话号码等。

  第七十七条 存储、处理涉及国家秘密信息的网络的运行安全保护,除应当遵守本法外,还应当遵守保密法律、行政法规的规定。

  第七十八条 军事网络的安全保护,由中央军事委员会另行规定。

  第七十九条 本法自2017年6月1日起施行。