{"id":3616,"date":"2021-01-05T01:32:28","date_gmt":"2021-01-05T01:32:28","guid":{"rendered":"https:\/\/lenguyenlawfirm.com\/?p=3616"},"modified":"2021-01-05T01:32:28","modified_gmt":"2021-01-05T01:32:28","slug":"guidelines-on-response-to-cybersecurity-emergencies","status":"publish","type":"post","link":"https:\/\/lenguyenlawfirm.com\/en\/guidelines-on-response-to-cybersecurity-emergencies\/","title":{"rendered":"Guidelines on response to cybersecurity emergencies"},"content":{"rendered":"<p>According to Clause 14 of Article 2 of Law on Cybersecurity 2018, Cybersecurity emergency means an event in cyberspace that seriously violates national security, public order or the lawful rights and interests of an organization or individual<\/p>\n<p>Cybersecurity emergencies include:<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Provoking information in cyberspace that might lead to riots, disruption of public order or terrorism;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Attack on a national security information system;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Large-scale and intense attacks on multiple information systems;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cyberattack meant to destroy a national security work or target;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cyber attack that seriously violates national security, national interest, sovereignty, social order or the lawful rights and interests of an organization or individual.<\/p>\n<p>According to Clause 3 of Article 21 of Law on Cybersecurity 2018, actions to be taken in response to a cybersecurity emergency including:<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Promptly implement the cybersecurity emergency prevention and response plan; avoid, eliminate or minimize damage caused by the cybersecurity emergency;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Inform relevant organizations and individuals;<\/p>\n<p>&#8211;\u00a0\u00a0 \u00a0\u00a0\u00a0\u00a0 \u00a0Collect relevant information; continuously monitor the cybersecurity emergency;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Analyze information; estimate damage and impacts caused by the cybersecurity emergency;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Stop providing cyber information within a certain area or disconnect from the international internet gateway;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3617\" src=\"https:\/\/lenguyenlawfirm.com\/wp-content\/uploads\/2021\/01\/Guidelines_on_response_to_cybersecurity_emergencies.jpg\" alt=\"\" width=\"650\" height=\"406\" srcset=\"https:\/\/lenguyenlawfirm.com\/wp-content\/uploads\/2021\/01\/Guidelines_on_response_to_cybersecurity_emergencies.jpg 650w, https:\/\/lenguyenlawfirm.com\/wp-content\/uploads\/2021\/01\/Guidelines_on_response_to_cybersecurity_emergencies-300x187.jpg 300w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Provide forces and equipment for prevention and elimination of the cybersecurity emergency:<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Other measures specified in the Law on National security.<\/p>\n<p>When the cybersecurity emergencies occur, the response of such emergencies is implemented as follows:<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The organization or individual that detects a cybersecurity emergency must promptly inform a professional cybersecurity force and implement the measures: Promptly implement the cybersecurity emergency prevention and response plan; avoid, eliminate or minimize damage caused by the cybersecurity emergency; Inform relevant organizations and individuals;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The Prime Minister shall make decisions or authorize the Minister of Public Security to make decisions regarding cybersecurity emergencies that occur nationwide or locally or to a specific target. The Prime Minister shall make decisions or authorize the Minister of National Defense to make decisions regarding cybersecurity emergencies that occur to cryptography of Vietnam Government Certificate Authority;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Professional cybersecurity forces shall take charge and cooperate with relevant organizations and individuals in implementing the measures mentioned above to respond to cybersecurity emergencies;<\/p>\n<p>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Relevant organizations and individuals shall cooperate with professional cybersecurity forces in implementing measures for prevention and response to cybersecurity emergencies.\/.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to Clause 14 of Article 2 of Law on Cybersecurity 2018, Cybersecurity emergency means an event in cyberspace that seriously violates national security, public order or the lawful rights and interests of an organization or individual Cybersecurity emergencies include: &#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Provoking information in cyberspace that might lead to riots, disruption of public order or [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[52],"tags":[],"class_list":["post-3616","post","type-post","status-publish","format-standard","hentry","category-legal-guidelines"],"acf":[],"_links":{"self":[{"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/posts\/3616\/"}],"collection":[{"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/posts\/"}],"about":[{"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/types\/post\/"}],"author":[{"embeddable":true,"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/users\/1\/"}],"replies":[{"embeddable":true,"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/comments\/?post=3616"}],"version-history":[{"count":1,"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/posts\/3616\/revisions\/"}],"predecessor-version":[{"id":3620,"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/posts\/3616\/revisions\/3620\/"}],"wp:attachment":[{"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/media\/?parent=3616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/categories\/?post=3616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lenguyenlawfirm.com\/en\/wp-json\/wp\/v2\/tags\/?post=3616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}