What is the legislative purpose of the cyber security law?

These Regulations are formulated to ensure network security, safeguard the sovereignty of cyberspace, national security and social interests, protect the legitimate rights and interests of citizens, legal persons and other organizations, and promote the healthy development of economic and social informatization.

The purpose of network security law:

1 clarifies the rights, obligations and responsibilities of departments, enterprises, social organizations and individuals;

2. The basic principles, main tasks, main guiding ideology and concept of national network security work are stipulated;

3. To promote mature policies, regulations and measures into law, which provides a legal basis for the work of government departments and embodies the requirements of administration and rule of law;

4. A series of national cyber security basic systems have been established, which have overall and basic characteristics and are necessary conditions for promoting work, consolidating capabilities and preventing major risks.

Network security is a legal weapon to govern the network according to law and resolve network risks, and it is an important guarantee for the healthy operation of the Internet on the track of rule of law.

It is mainly applicable to the construction, operation, maintenance and use of networks in People's Republic of China (PRC), as well as the supervision and management of network security.

When was the Cyber Security Law of the People's Republic of China passed?

The Network Security Law of the People's Republic of China was passed on 20 16. The Network Security Law of the People's Republic of China is a law formulated to ensure network security, safeguard cyberspace sovereignty, national security and social interests, protect the legitimate rights and interests of citizens, legal persons and other organizations, and promote the healthy development of economic and social informatization. The Cyber Security Law of the People's Republic of China was adopted at the 24th meeting of the Standing Committee of the 12th NPC of People's Republic of China (PRC) on 20 16 1.07, and came into effect on 201.07.

I hope the above questions can help you. If you have other legal questions, please consult a professional lawyer.

Legal basis: network security law

first

This Law is formulated in order to ensure network security, safeguard the sovereignty of cyberspace, national security and public interests, protect the legitimate rights and interests of citizens, legal persons and other organizations, and promote the healthy development of economic and social informatization.

Article 63

Whoever, in violation of the provisions of Article 27 of this Law, engages in activities endangering network security, or provides programs and tools specially used for engaging in activities endangering network security, or provides technical support, advertising, payment and settlement for others engaging in activities endangering network security, which does not constitute a crime, shall be confiscated by the public security organ, detained for not more than five days, and may also be fined not less than 50,000 yuan but not more than 500,000 yuan; If the circumstances are serious, they shall be detained for not less than five days but not more than fifteen days, and may also be fined not less than one hundred thousand yuan but not more than one million yuan.

If a unit commits the acts mentioned in the preceding paragraph, the illegal income shall be confiscated by the public security organ, and a fine of100000 yuan or more1000000 yuan or less shall be imposed, and the directly responsible person in charge and other directly responsible personnel shall be punished in accordance with the provisions of the preceding paragraph.

Persons who violate the provisions of Article 27 of this Law and are punished by public security administration shall not engage in key positions in network security management and network operation within five years; Persons subject to criminal punishment shall not engage in key positions in network security management and network operation for life.