What are the contents of information security laws and regulations?

The appearance of the Internet has had a great impact on human society. The Internet has completely changed the way people live, work and communicate. Although the Internet brings many benefits, there are also many problems, the biggest of which is security. What are the laws and regulations about information network security? The following is a small series to answer the relevant knowledge for readers.

What are the laws and regulations about information network security?

1, Law of People's Republic of China (PRC) on Guarding State Secrets.

2. National Security Law of People's Republic of China (PRC)

3. People's Republic of China (PRC) Electronic Signature Law

4, the computer information system international networking security management regulations "

5 measures for the administration of hierarchical protection of computer information systems involving state secrets

6. Measures for the Administration of Internet Information Services

7 measures for the administration of filing of non-operating Internet information services

8, "computer information network international networking security protection management measures"

9 People's Republic of China (PRC) computer information system security protection regulations

10, Measures for the Administration of Information Security Level Protection

1 1, Code for Protection and Inspection of Information Security Levels of Public Security Organs (for Trial Implementation)

12. Our office and the State Council forwarded the Opinions of the National Leading Group for Strengthening Information Security (No.27 [2003] of our office).

13, Opinions on Further Strengthening Internet Management issued by China Office and State Council (China Office [2004] No.32)

14. Notice of the Central Network Information Office on Strengthening the Safety Management of the Websites of Party and Government Organs (China Network Information Office 1No.)

15, Central Network Information Office "On Printing and Distributing"

Notice (No.[20 14]5 issued by China Internet Information Office)

16, Notice of Five Ministries of National Development and Reform Commission on Further Strengthening the Construction and Application of National E-government Network (No.[20 12] 1986)

17, the Ministry of industry and information technology "on the issuance of

Letter (Xie Han [2013] No.259, Ministry of Industry and Information Technology)

18, Regulations of Guangdong Province on Informatization Promotion

19, Regulations of Guangdong Province on Security Protection of Computer Information Systems.

20 Guangdong Public Security Network Security Information Security Inspection Rules

2 1, Notice of the Provincial Public Security Department on Continuing to Do a Good Job in Information Security Level Protection in Our Province (Guangdong Gong Tong Zi [20 1 1]No. 124)

22 opinions on strengthening foreign-related security and confidentiality in our province (Guangdong Office [2005]12)

23. Opinions on Further Strengthening Internet Management (Guangdong Office [2005] No.25)

24. Opinions on Strengthening and Improving Internet Management in Our Province (Guangdong Office [2012] No.38)

25. Opinions on strengthening information security management of industrial control system in our province (Guangdong Letter Office [2012] No.3)

26, the Provincial Secrecy Bureau, the Provincial Public Security Department, the Provincial Security Department, the Provincial Economic and Information Technology Commission, and the Provincial Communications Administration jointly carry out the information security and confidentiality inspection system.

27. Measures for the Administration of Communication Network Security Protection (OrderNo.: Ministry of Industry and Information Technology 1 1)

Provisions on the Protection of Personal Information of Telecommunications and Internet Users (Decree No.24 of the Ministry of Industry and Information Technology)

Second, the types of network security

There are different types of network security due to different environments and applications. There are mainly the following types:

System security: refers to the security of operating system, that is, to ensure the security of information processing and transmission system. Its key point is to ensure the normal operation of the system. Avoid the destruction and loss of messages stored, processed and transmitted by the system due to the crash and damage of the system. Avoid information leakage, interference or interference from others caused by electromagnetic leakage.

Network security: refers to the security of system information on the network. Including user password authentication, user access control, data access control, mode control, security audit, security problem follow-up, computer virus prevention, data encryption, etc.

Information dissemination security: the security of information dissemination on the network, that is, the security of the consequences of information dissemination, including information filtering. The key point is to prevent and control the consequences caused by the spread of illegal and harmful information, and to avoid the uncontrolled information circulating freely on public networks.

Information content security: the security of information content on the network. It focuses on protecting the confidentiality, authenticity and integrity of information. Avoid attackers using the security vulnerabilities of the system to eavesdrop, impersonate, cheat and other behaviors harmful to legitimate users. Its essence is to protect the interests and privacy of users.

If you need legal help, you are welcome to seek legal advice.