期刊文献+

The Information Security Law of China(Abstract)

下载PDF
导出
摘要 Information Security is becoming a hot topic nowadays. The related cases such as virus spreading,hacker attacking, and electronic crime, which are frequently reported in mass media, has aroused wideattention of the masses and even the State Department of PRC. With the prevalence of computer systems andthe rapid growth of Internet user number, a series of rules concerning the information security are enacted bythe State Department and certain ministries to ensure the national sovereignty and people’s interests as wellas punish the offender. In this report, we will explain the following items in detail:. the clauses relative to the electronic crime in the new criminal law;. the ordinances of Internet security management and computer system protection, including theobject, content, the department in charge, the forbiddance and the compulsory items;. the license management of computer security products, including the processes of applying,checking and authorizing, which are important for the formation of a normalized market of computersecurity products. Information Security is becoming a hot topic nowadays. The related cases such as virus spreading,hacker attacking, and electronic crime, which are frequently reported in mass media, has aroused wideattention of the masses and even the State Department of PRC. With the prevalence of computer systems andthe rapid growth of Internet user number, a series of rules concerning the information security are enacted bythe State Department and certain ministries to ensure the national sovereignty and people's interests as wellas punish the offender. In this report, we will explain the following items in detail:. the clauses relative to the electronic crime in the new criminal law;. the ordinances of Internet security management and computer system protection, including theobject, content, the department in charge, the forbiddance and the compulsory items;. the license management of computer security products, including the processes of applying,checking and authorizing, which are important for the formation of a normalized market of computersecurity products.
作者 MiaoDaoqi
出处 《计算机工程》 CAS CSCD 北大核心 1999年第S1期14-14,共1页 Computer Engineering
  • 相关文献

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部