The regulations aim to protect the security of the CII and impose more compliance obligations in support of the Network Security Law.
Key Points:
The regulations are designed to provide clarification and guidance on:
..Scope and designation of the critical information infrastructure (CII)
..Compliance obligations for operators of the CII
..Regulatory requirements on the protection of the CII
..Penalties (including high fines and severe consequences) on operators of the CII that fail to fulfill the compliance obligations and to meet regulatory requirements.
Please see full publication below for more information.