Home / Publications / JunHe Legal Updates / details of junhe law review

What course should cybersecurity vulnerability administration follow?——A brief analysis of the Provisions on the Administration of Cybersecurity Vulnerability (Draft for Comment)

2019.06.24 DONG, Xiao (Marissa)、ZHU. Tong、JIA Ziyu

On June 18, 2019, the Ministry for Industry and Information Technology (“MIIT”) released the Provisions on the Administration of Cybersecurity Vulnerability (Draft for Comment) (the “Provisions”), jointly drafted by the MIIT and relevant departments of the State Council, and which will be open for public comment until July 18, 2019. Whereas cybersecurity vulnerability had previously regulated by voluntary national standards, the Provisions now aim to clarify the regulatory objects and the competent authorities of cybersecurity vulnerability, as well as to provide procedural regulations for dealing with cybersecurity vulnerability.


I. Regulatory Objects and Competent Authorities


Article 22 of the Cybersecurity Law (the “CSL”) stipulates that “for any risk such as a security defect or vulnerability that is found, the provider concerned shall promptly take remedial measures, inform the users of the said risk, and report the case to the competent authority.”


The Provisions clarifies that the regulatory objects shall be providers of network products or services, network operators and organizations or individuals that carry out detection, assessment, collection and publication of cybersecurity vulnerability or hold relevant events such as competitions (“third-party organizations”) (Article 2), while the competent authorities shall be MIIT, the Ministry of Public Security (“MPS”) and relevant industry authorities (Article 4).


II. Procedures for Dealing with Cybersecurity Vulnerability


The Provisions requires that, upon discovery or having been informed of any vulnerability of its network products, services or systems, a concerned provider of network products or services or network operator shall, in a timely manner, take remedial or preventive measures, and release such cybersecurity information to its users or the public (Article 3).


Compared with the original national standards, the Provisions do not follow the same procedures for dealing with cybersecurity vulnerability in specifying the discovery, acceptance of vulnerability and other relevant issues. The Provisions have adjusted the processing schedule for taking remedial measures and preventive measures, and different time requirements are specified for providers of network products and for providers of network services or systems.


The specified procedures stipulated in the Provisions are as follows:


Procedures

Requirements

Verification

A provider of network products or services and a network operator shall promptly verify the vulnerability upon its discovery or having been informed of such vulnerability in its products, services or systems.

Remedial 

or 

Preventive Measures

Remedial or preventive measures shall be undertaken within 90 days for the relevant network products after the verification of the vulnerability.


Remedial or preventive measures shall be undertaken within 10 days for relevant network services or systems after the verification of the vulnerability.

Notification

When it is necessary for a user or technical partner to carry out remedial or preventive measures, the provider of network products, services or systems shall, within 5 days after it has taken measures, release to the public or notify all the potentially affected users or relevant technical partners of the risk of such vulnerability and the remedial or preventive measures that the user or technical partner shall take through customer service, and provide them with the necessary technical support, and such vulnerability shall also be reported to the MIIT’s Information Sharing Platform of Cybersecurity Threat as well.


III. Third-party Organizations Releasing Cybersecurity Information to the Public


Article 25 of the CSL stipulates that the release of cybersecurity information, such as system vulnerability, computer virus, network attacks and intrusions shall be carried out in compliance with applicable regulations of the State.


The Provisions further stipulates that third-party organizations and individuals shall adhere to the principles of being “necessary, authentic, objective, preventive and responsive to cybersecurity risks” when releasing information of cybersecurity vulnerability to the public through a website, a media conference, etc. (Article 6). Third-party organizations shall enhance their internal management, perform relevant administrative obligations, and prevent leaks of information about cybersecurity vulnerability, and prohibit its staff from releasing such information (Article 7). 


The China National Vulnerability Database of Information Security, which comes under the China Information Technology Security Evaluation Center, and the China National Vulnerability Database, which is under China National Internet Emergency Center, previously collected and published vulnerability information, according to the Provisions, they will be deemed as third-party organizations, and as such are required to observe relevant regulations (Article 10).


IV. Legal Liability


Article 8 of the Provisions stipulates that, for a network product or service provider or a network operator that fails to take remedial or preventive measures, and that releases vulnerability information to the public or its users, administrative penalties shall be imposed and interviews may be organized by the MIIT, MPS and other relevant authorities, according to Articles 56, 59 and 60 of the CSL.


Additionally, Article 9 of the Provisions stipulates that, for third-party organizations which illegally release vulnerability information to the public, interviews with the MIIT, MPS and other relevant authorities will be organized, and administrative penalties shall be imposed according to Articles 62 and 63 of the CSL; violations constituting crimes shall be subject to investigations on criminal liabilities; and civil liability shall be borne when the violations have caused economic loss or reputational damage to network product or service providers and network operators. 


V. Our Observation


The Provisions, as a regulatory document under the CSL, directly clarifies the legal requirements regarding cybersecurity vulnerability processing for network product or service providers, network operators and third-party organizations, and the legal liabilities of relevant subjects thereunder. We will continue to pay close attention to how enterprises will manage the legal aspects of cybersecurity vulnerability in practice.

JunHe is the only Chinese law firm to be admitted as a member of Lex Mundi and Multilaw, two international networks of independent law firms. JunHe and selected top law firms in major European and Asian jurisdictions are “best friends.” Through these connections, we provide high quality legal services to clients doing business throughout the world.
As the first carbon neutrality fund sponsored by a law firm in China, the BAF Carbon Neutrality Special Fund was jointly established by JunHe and the Beijing Afforestation Foundation (BAF) to promote carbon neutral initiatives, and encourage social collaboration based on the public fundraising platform to mobilize engagement in public welfare campaigns.