Focus on Cyber Security Law: how to avoid "Xu Yuyu tragedy"? According to Xinhua news agency Xinhua News Agency yesterday morning, the twelve session of the Standing Committee of the National People’s Congress, the twenty-fourth meeting of the vote, passed the People’s Republic of China network security law. This is the basic law in the field of network, strengthen the protection of personal information, to combat network fraud. This Law shall come into force as of June 1, 2017. It is understood that the introduction of network security law has passed the three meeting of the NPC Standing committee. June 2015, the twelve session of the Standing Committee of the National People’s Congress of the fifteenth meeting of the draft network security law for the first time. In June this year, the twelve session of the Standing Committee of the National People’s Congress, the twenty-first meeting of the draft network security law for the consideration of the second. The twelve session of the Standing Committee of the National People’s Congress held the twenty-fourth meeting of the second consideration of the third. In November 7th, the meeting voted by 154 votes in favor of the adoption of the network security act of 1. Deputy director of the Standing Committee of the NPC Law Committee of the law office Yang Heqing said at a news conference, network security contains 7 chapters 79, there are 6 aspects: first, highlight the content clear network space, the principle of sovereignty; second, clear the obligation of network security products and services provider; third, clear the security obligation of network operators; fourth, to further improve the personal information protection rules; fifth, establish the critical information infrastructure security protection system; sixth, establish the critical information infrastructure important cross-border data transmission rules. The current hot issues in China’s network security issues, the law has clearly defined. According to the disclosure of personal information, the provisions of the network security law: network products and services of the collection of user information function, the provider shall expressly consent to the user and network operators; shall not disclose, tampering, destruction of the collection of personal information; any individuals and not to steal or other illegal means to obtain personal information, not illegal sold or illegally providing personal information to others. And provides the corresponding legal responsibility. In view of the network fraud prone situation, the provisions of the network security law, any individual or organization may be established for the implementation of fraud, imparting criminal methods, production or sale of contraband goods, control and other illegal and criminal activities, website communication group, and shall publish the implementation of fraud involving the use of the network, making or selling contraband and other illegal items, control criminal activity information. And provides the corresponding legal responsibility. In addition, the network security act in the critical information infrastructure security, the establishment of network security monitoring and early warning and emergency response system and other aspects have made clear. How to avoid the tragedy of Xu Yuyu? Focus on network security law to curb the four major focus of network fraud focus on how to regulate the behavior of personal information collection? To protect the interests of consumers and establish the law [] boundary network security law the provisions of article fortieth, network operators should be kept strictly confidential to the collection of user information, and establish a sound system for the protection of user information. The provisions of article forty-first, network operators collect, use of personal credit cooperatives相关的主题文章: