2019.06.24 DONG, Xiao (Marissa)、ZHU. Tong、JIA Ziyu
On June 18, 2019, the Ministry for Industry and Information Technology (“MIIT”) released the Provisions on the Administration of Cybersecurity Vulnerability (Draft for Comment) (the “Provisions”), jointly drafted by the MIIT and relevant departments of the State Council, and which will be open for public comment until July 18, 2019. Whereas cybersecurity vulnerability had previously regulated by voluntary national standards, the Provisions now aim to clarify the regulatory objects and the competent authorities of cybersecurity vulnerability, as well as to provide procedural regulations for dealing with cybersecurity vulnerability.
Article 22 of the Cybersecurity Law (the “CSL”) stipulates that “for any risk such as a security defect or vulnerability that is found, the provider concerned shall promptly take remedial measures, inform the users of the said risk, and report the case to the competent authority.”
The Provisions clarifies that the regulatory objects shall be providers of network products or services, network operators and organizations or individuals that carry out detection, assessment, collection and publication of cybersecurity vulnerability or hold relevant events such as competitions (“third-party organizations”) (Article 2), while the competent authorities shall be MIIT, the Ministry of Public Security (“MPS”) and relevant industry authorities (Article 4).
The Provisions requires that, upon discovery or having been informed of any vulnerability of its network products, services or systems, a concerned provider of network products or services or network operator shall, in a timely manner, take remedial or preventive measures, and release such cybersecurity information to its users or the public (Article 3).
Compared with the original national standards, the Provisions do not follow the same procedures for dealing with cybersecurity vulnerability in specifying the discovery, acceptance of vulnerability and other relevant issues. The Provisions have adjusted the processing schedule for taking remedial measures and preventive measures, and different time requirements are specified for providers of network products and for providers of network services or systems.
The specified procedures stipulated in the Provisions are as follows:
Article 25 of the CSL stipulates that the release of cybersecurity information, such as system vulnerability, computer virus, network attacks and intrusions shall be carried out in compliance with applicable regulations of the State.
The Provisions further stipulates that third-party organizations and individuals shall adhere to the principles of being “necessary, authentic, objective, preventive and responsive to cybersecurity risks” when releasing information of cybersecurity vulnerability to the public through a website, a media conference, etc. (Article 6). Third-party organizations shall enhance their internal management, perform relevant administrative obligations, and prevent leaks of information about cybersecurity vulnerability, and prohibit its staff from releasing such information (Article 7).
The China National Vulnerability Database of Information Security, which comes under the China Information Technology Security Evaluation Center, and the China National Vulnerability Database, which is under China National Internet Emergency Center, previously collected and published vulnerability information, according to the Provisions, they will be deemed as third-party organizations, and as such are required to observe relevant regulations (Article 10).
Article 8 of the Provisions stipulates that, for a network product or service provider or a network operator that fails to take remedial or preventive measures, and that releases vulnerability information to the public or its users, administrative penalties shall be imposed and interviews may be organized by the MIIT, MPS and other relevant authorities, according to Articles 56, 59 and 60 of the CSL.
Additionally, Article 9 of the Provisions stipulates that, for third-party organizations which illegally release vulnerability information to the public, interviews with the MIIT, MPS and other relevant authorities will be organized, and administrative penalties shall be imposed according to Articles 62 and 63 of the CSL; violations constituting crimes shall be subject to investigations on criminal liabilities; and civil liability shall be borne when the violations have caused economic loss or reputational damage to network product or service providers and network operators.
The Provisions, as a regulatory document under the CSL, directly clarifies the legal requirements regarding cybersecurity vulnerability processing for network product or service providers, network operators and third-party organizations, and the legal liabilities of relevant subjects thereunder. We will continue to pay close attention to how enterprises will manage the legal aspects of cybersecurity vulnerability in practice.