计算机信息网络国际联网安全保护管理办法 中英文对照

合集下载

《電腦資訊網路國際聯網安全保護管理辦法》

《電腦資訊網路國際聯網安全保護管理辦法》

《電腦資訊網路國際聯網安全保護管理辦法》(1997年12月11日國務院批准1997年12月30日公安部發佈)第一章總則第一條為了加強對電腦資訊網路國際聯網的安全保護,維護公共秩序和社會穩定,根據《中華人民共和國電腦資訊系統安全保護條例》、《中華人民共和國電腦資訊網路國際聯網管理暫行規定》和其他法律、行政法規的規定,制定本辦法。

第二條中華人民共和國境內的電腦資訊網路國際聯網安全保護管理,適用本辦法。

第三條公安部電腦管理監察機構負責電腦資訊網路國際聯網的安全保護管理工作。

公安機關電腦管理監察機構應當保護電腦資訊網路國際聯網的公共安全,維護從事國際聯網業務的單位和個人的合法權益和公眾利益。

第四條任何單位和個人不得利用國際聯網危害國家安全、洩露國家秘密,不得侵犯國家的、社會的、集體的利益和公民的合法權益,不得從事違法犯罪活動。

第五條任何單位和個人不得利用國際聯網製作、複製、查閱和傳播下列資訊:(一)煽動抗拒、破壞憲法和法律、行政法規實施的;(二)煽動顛覆國家政權,推翻社會主義制度的;(三)煽動分裂國家、破壞國家統一的;(四)煽動民族仇恨、民族歧視,破壞民族團結的;(五)捏造或者歪曲事實,散佈謠言,擾亂社會秩序的;(六)宣揚封建迷信、淫穢、色情、賭博、暴力、兇殺、恐怖,教唆犯罪的;(七)公然侮辱他人或者捏造事實誹謗他人的;(八)損害國家機關信譽的;(九)其他違反憲法和法律、行政法規的。

第六條任何單位和個人不得從事下列危害電腦資訊網路安全的活動:(一)未經允許,進入電腦資訊網路或者使用電腦資訊網路資源的;(二)未經允許,對電腦資訊網路功能進行刪除、修改或者增加的;(三)未經允許,對電腦資訊網路中存儲、處理或者傳輸的資料和應用程式進行刪除、修改或者增加的;(四)故意製作、傳播電腦病毒等破壞性程式的;(五)其他危害電腦資訊網路安全的。

第七條用戶的通信自由和通信秘密受法律保護。

任何單位和個人不得違反法律規定,利用國際聯網侵犯用戶的通信自由和通信秘密。

计算机信息系统国际联网保密管理规定

计算机信息系统国际联网保密管理规定

计算机信息系统国际联网保密管理规定(1999年12月29日国家保密局发布)第一章总则第一条为了加强计算机信息系统国际联网的保密管理,确保国家秘密的安全,根据《中华人民共和国保守国家秘密法》和国家有关法规的规定,制定本规定。

第二条计算机信息系统国际联网,是指中华人民共和国境内的计算机信息系统为实现信息的国际交流,同外国的计算机信息网络相联接。

第三条凡进行国际联网的个人、法人和其他组织(以下统称用户),互联单位和接入单位,都应当遵守本规定。

第四条计算机信息系统国际联网的保密管理,实行控制源头、归口管理、分级负责、突出重点、有利发展的原则。

第五条国家保密工作部门主管全国计算机信息系统国际联网的保密工作。

县级以上地方各级保密工作部门,主管本行政区域内计算机信息系统国际联网的保密工作。

中央国家机关在其职权范围内,主管或指导本系统计算机信息系统国际联网的保密工作。

第二章保密制度第六条涉及国家秘密的计算机信息系统,不得直接或间接地与国际互联网或其它公共信息网络相联接,必须实行物理隔离。

第七条涉及国家秘密的信息,包括在对外交往与合作中经审查、批准与境外特定对象合法交换的国家秘密信息,不得在国际联网的计算机信息系统中存储、处理、传递。

第八条上网信息的保密管理坚持“谁上网谁负责”的原则。

凡向国际联网的站点提供或发布信息,必须经过保密审查批准。

保密审批实行部门管理,有关单位应当根据国家保密法规,建立健全上网信息保密审批领导责任制。

提供信息的单位应当按照一定的工作程序,健全信息保密审批制度。

第九条凡以提供网上信息服务为目的而采集的信息,除在其它新闻媒体上已公开发表的,组织者在上网发布前,应当征得提供信息单位的同意;凡对网上信息进行扩充或更新,应当认真执行信息保密审核制度。

第十条凡在网上开设电子公告系统、聊天室、网络新闻组的单位和用户,应由相应的保密工作机构审批,明确保密要求和责任。

任何单位和个人不得在电子公告系统、聊天室、网络新闻组上发布、谈论和传播国家秘密信息。

Chinese Cyber Laws

Chinese Cyber Laws

中国网络法律:Chinese Cyber Laws:1. 《全国人大常委会关于维护互联网安全的决定》Decision of the National People’s Congress Standing Committee on safeguarding Internet Security(2000年12月28日);这是我国第一部关于互联网安全的法律。

该法分别从(1)保障互联网的运行安全;Ensure safe operation of the Internet;(2)维护国家安全和社会稳定;To safeguard national security and social stability;(3)维护社会主义市场经济秩序和社会管理秩序;Maintain order in the socialist market economy and social management order;(4)保护个人、法人和其他组织的人身、财产等合法权利等四个方面,共15款,明确规定了对构成犯罪的行为,依照刑法有关规定追究刑事责任。

与网络安全有关的行政法规主要有:1. 国务院令147号:《中华人民共和国计算机信息系统安全保护条例》Regulations of the People’s Republic of China for Safety Protection of Computer Information System ;这是我国第一部涉及计算机信息系统安全的行政法规。

The first administration regulation in our country relating to the security of computer information system. 《条例》赋予“公安部主管全国计算机信息系统安全保护工作”的职能。

主管权体现在:(1)监督、检查、指导权;Supervision, inspection, guidance right;(2)计算机违法犯罪案件查处权;Computer crime case investigation;(3)其他监督职权。

管理制度计算机信息网络国际联网安全保护管理办法

管理制度计算机信息网络国际联网安全保护管理办法

管理制度计算机信息网络国际联网安全保护管理办法随着计算机和互联网的发展,网络安全问题日益凸显。

为了保护国家信息安全,加强计算机信息网络国际联网的安全管理,制定了《管理制度计算机信息网络国际联网安全保护管理办法》。

本文将对该管理办法进行详细讨论,包括背景、内容要点、实施措施和推动措施。

背景随着信息技术的飞速发展,计算机网络成为人们生活和工作中不可或缺的一部分。

然而,与此同时,网络安全问题也日益增多。

黑客攻击、网络病毒、信息泄露等问题给国家安全和个人隐私带来了巨大威胁。

为了应对这些问题,国家制定了《管理制度计算机信息网络国际联网安全保护管理办法》。

内容要点1. 网络安全保护责任:该办法明确了网络安全保护的各方责任和义务。

网络服务提供者应当加强对网络安全的管理,建立健全的安全保护制度。

用户也应当自觉遵守网络安全法律法规,主动保护自己的账号和隐私信息。

2. 信息网络安全审查制度:针对信息网络安全审查制度的要求,网络服务提供者应当建立完善的审核机制,对外链接、流量监控等进行审查,确保不会传播违法信息或危害网络安全的内容。

同时,加强对网络设备的安全检查和审计工作。

3. 数据安全保护制度:办法对数据安全保护提出了具体要求。

网络服务提供者应当采取技术措施,确保用户数据的安全。

用户的个人信息也应该得到很好地保护,不得非法采集或滥用。

4. 网络攻击和漏洞的防范与应对:办法鼓励网络服务提供者积极开展网络攻击和漏洞的发现、预防、分析和应急处置工作。

同时,对于国家网络安全事件进行及时报告和通告,并配合相关调查工作。

5. 国际联网和信息共享:办法提出了加强国际合作和信息共享的原则。

国家鼓励和支持网络服务提供者与国际组织、外国政府、企业和科研机构保持联系与合作,共同应对跨国网络安全威胁。

实施措施1. 加强组织领导:各级政府和相关部门应加强对网络安全工作的组织领导,建立健全网络安全保护的领导机构和工作机制。

2. 建立信息共享平台:国家应建立信息共享平台,实现网络安全相关信息的快速传递和共享,提高网络安全的及时性和有效性。

互联网安全管理制度英译

互联网安全管理制度英译

I. IntroductionThe Internet Security Management System (ISMS) is a comprehensive set of policies, procedures, and guidelines designed to ensure the confidentiality, integrity, and availability of information within an organization. This system is essential for protecting sensitive data from unauthorized access, modification, or destruction. The following document outlines the key components and principles of our Internet Security Management System.II. ObjectivesThe primary objectives of our Internet Security Management System are as follows:1. To establish a secure and reliable network environment for all users.2. To protect sensitive data from unauthorized access, disclosure, alteration, or destruction.3. To ensure compliance with applicable laws, regulations, and industry standards.4. To promote a culture of security awareness and responsibility among all employees.III. ScopeThe Internet Security Management System applies to all employees, contractors, and visitors within the organization. It covers all information systems, networks, and devices that are used to process, store, or transmit data.IV. Policies and ProceduresA. Access Control1. User Authentication: All users must authenticate themselves using a unique username and password. Strong password policies are enforced to ensure secure access.2. Authorization: Access to sensitive information is restricted based on the principle of least privilege, ensuring that users have access only to the information necessary for their job functions.3. Multi-Factor Authentication: Additional layers of security, such as two-factor authentication, may be required for accessing critical systems or sensitive data.B. Data Protection1. Encryption: Sensitive data is encrypted both in transit and at rest to prevent unauthorized access.2. Data Loss Prevention (DLP): Policies and technologies are implemented to prevent the unauthorized disclosure of sensitive information.3. Data Backup: Regular backups of critical data are performed to ensure data recovery in the event of data loss or corruption.C. Network Security1. Firewalls: Network firewalls are configured to monitor and control incoming and outgoing network traffic, protecting against unauthorized access and potential threats.2. Intrusion Detection and Prevention Systems (IDPS): IDPS solutions are implemented to detect and respond to suspicious activities and potential attacks.3. Vulnerability Management: Regular vulnerability assessments and patch management processes are conducted to identify and mitigate security risks.D. Security Awareness and Training1. Regular Security Training: Employees are required to undergo regular security training to understand their responsibilities and the importance of following security policies.2. Security Awareness Campaigns: Periodic campaigns are conducted to promote security awareness and educate employees about the latest threats and best practices.V. Compliance and Auditing1. Compliance Monitoring: Regular audits and assessments are conducted to ensure compliance with the Internet Security Management System and applicable regulations.2. Incident Response: A formal incident response plan is in place to handle security incidents promptly and effectively.VI. ConclusionThe Internet Security Management System is a critical component of our organization's overall security strategy. By implementing and maintaining this system, we aim to protect our information assets, maintain the trust of our customers, and ensure the continuity of our business operations. It is the responsibility of every employee to adhere to the policies and procedures outlined in this system and to contribute to a secure and resilient information environment.。

网络安全制度范文英文版

网络安全制度范文英文版

In the rapidly evolving digital landscape, cybersecurity has become a critical concern for individuals, businesses, and governments alike. The increasing sophistication of cyber threats necessitates robust cybersecurity regulations to protect sensitive information and ensure the integrity of digital systems. This framework outlines a comprehensive set of cybersecurity regulations designed to safeguard against various cyber risks.I. IntroductionThe advent of the internet has revolutionized the way we communicate, conduct business, and access information. However, with this digital transformation comes a host of cybersecurity challenges. Cyber attacks, data breaches, and unauthorized access to sensitive information have become increasingly prevalent, posing significant risks to individuals, organizations, and society as a whole.This framework aims to provide a comprehensive set of cybersecurity regulations that address the diverse range of cyber threats. By implementing these regulations, we can enhance the security of digital systems, protect sensitive information, and ensure the continuity of critical services.II. Objectives of Cybersecurity RegulationsThe primary objectives of cybersecurity regulations are as follows:1. Protect Personal Information: Ensure the confidentiality, integrity, and availability of personal information stored and processed in digital systems.2. Prevent Cyber Attacks: Implement measures to detect, prevent, and respond to cyber attacks, including malware, phishing, and ransomware.3. Ensure Business Continuity: Minimize the impact of cyber incidents on business operations and critical infrastructure.4. Foster Trust in Digital Systems: Enhance public trust in the security and reliability of digital systems and services.5. Promote International Collaboration: Encourage cooperation among governments, organizations, and individuals to combat cyber threats effectively.III. Key Components of Cybersecurity Regulations1. Risk Assessment and ManagementOrganizations must conduct regular risk assessments to identify potential cybersecurity threats and vulnerabilities. Based on these assessments, they should implement appropriate risk management measures, including:- Technical Controls: Use firewalls, intrusion detection systems, and antivirus software to protect against cyber attacks.- Physical Controls: Secure physical access to computer systems and data centers.- Administrative Controls: Implement policies and procedures to govern the handling of sensitive information and the use of digital systems.2. Access ControlAccess control measures should be implemented to ensure that only authorized individuals have access to sensitive information and critical systems. This includes:- User Authentication: Use strong passwords, multi-factor authentication, and other authentication mechanisms to verify the identity of users.- User Authorization: Assign appropriate access levels to users based on their role and responsibilities.- Least Privilege Principle: Grant users only the minimum level of access necessary to perform their tasks.3. Data ProtectionOrganizations must implement measures to protect the confidentiality, integrity, and availability of data. This includes:- Encryption: Use encryption to protect data at rest and in transit.- Data Backup: Regularly back up data to prevent data loss in the event of a cyber attack or system failure.- Data Retention and Disposal: Implement policies for the retention and disposal of data to ensure compliance with legal and regulatory requirements.4. Incident ResponseOrganizations should develop and implement an incident response plan to effectively manage and mitigate the impact of cyber incidents. This plan should include:- Detection and Analysis: Implement mechanisms to detect and analyze cyber incidents in real-time.- Containment and Eradication: Take steps to contain and eradicate the cyber attack.- Recovery and Restoration: Develop plans to restore affected systems and data.- Post-Incident Analysis: Conduct a thorough analysis of the incident to identify lessons learned and improve future response efforts.5. Training and AwarenessOrganizations should provide regular cybersecurity training and awareness programs for employees to ensure they are aware of potential cyber threats and understand their role in protecting the organization's digital assets.IV. Compliance and Enforcement1. Compliance RequirementsOrganizations must comply with the cybersecurity regulations outlined in this framework. This includes implementing the necessary controls, conducting risk assessments, and maintaining records of compliance efforts.2. Enforcement MechanismsGovernments should establish a regulatory body responsible for enforcing cybersecurity regulations. This body should have the authority to:- Conduct audits and inspections to ensure compliance with regulations.- Issue fines and penalties for non-compliance.- Provide guidance and support to organizations in achieving compliance.V. ConclusionCybersecurity regulations are essential to protect individuals, organizations, and society from the growing threat of cyber attacks. By implementing the comprehensive framework outlined in this document, we can enhance the security of digital systems, protect sensitive information, and ensure the continuity of critical services. It is the collective responsibility of governments, organizations, and individuals to prioritize cybersecurity and work together to create a safer and more secure digital world.。

计算机信息网络国际联网安全管理办法(3篇)

计算机信息网络国际联网安全管理办法(3篇)范文为教学中作为模范的文章,也常常用来指写作的模板。

常常用于文秘写作的参考,也可以作为演讲材料编写前的参考。

写范文的时候需要注意什么呢?有哪些格式需要注意呢?以下是我为大家搜集的优质范文,仅供参考,一起来看看吧计算机信息网络国际联网安全管理办法篇一乙方:_________________________甲乙双方依据《中华人民共和国合同法》,经友好协商,就甲方购买乙方网络实名服务及涉及的相关事宜签订合同书如下:一、甲方向乙方购买服务项目及相关事宜如下:服务项目:_________________________服务年限:_________________________费用:____________________________实名名称:_________________________对应网址:_________________________二、合同款及付款方式(1)本合同规定的网络实名总服务费用为___________元整,大写___________________元整。

(2)协议正式签定生效后,甲方须在本合同签订之日起一次性以现金或银行转帐方式向乙方缴付实名全部服务费。

三、网络实名生效周期乙方在收到甲方全部费用后两个工作日内生效实名。

注册者未在服务期届满前续费,____________有权自服务期届满之日的第二日终止提供服务并注销有关网络实名。

四、未尽事宜,双方协商解决。

五、本合同一式二份,双方各执一份,签字盖章后生效!甲方(公章):_________乙方(公章):_________法定代表人(签字):_________法定代表人(签字):__________________年____月____日_________年____月____日计算机信息网络国际联网安全管理办法篇二授权方(甲方):地址:电话:被授权方(乙方):地址:电话:签订此协议书即表明,乙方同意遵守此委托书的行为限制,甲方同意乙方对甲方所有权网站(含页面、网站数据库及内网)进行非恶意测试包括模拟入侵,模拟植入病毒、模拟盗取资料等等。

计算机信息网络国际联网安全保护管理办法 中英文对照

计算机信息网络国际联网安全保护管理办法Computer Information Network and Internet Security, Protectionand Management Regulations(1997年12月11日国务院批准, 1997年12月30日公安部发布)(Approved by the State Council on December 11, 1997 and promulgated by the Ministry of Public Security on December 30, 1997)第一章总则Chapter I. Comprehensive Regulations第一条为了加强对计算机信息网络国际联网的安全保护,维护公共秩序和社会稳定,根据《中华人民共和国计算机信息系统安全保护条例》、《中华人民共和国计算机信息网络国际联网管理暂行规定》和其他法律、行政法规的规定,制定本办法。

Article 1.In order to strengthen the security and the protection of computer information networks and of the Internet, and to preserve the social order and social stability, these regulations have been established on the basis of the "PRC Computer Information Network Protection Regulations", the "PRC Temporary Regulations on Computer Information Networks and the Internet" and other laws and administrative regulations.第二条中华人民共和国境内的计算机信息网络国际联网安全保护管理,适用本办法。

中华人民共和国计算机信息网络国际联网管理暂行规定实施办法中英对照

中华人民共和国计算机信息网络国际联网管理暂行规定实施办法中英对照中华人民共和国计算机信息网络国际联网管理暂行规定实施办法Implementation rules for provisional regulations of the administration of international networkingof computer information in China第一条为了加强对计算机信息网络国际联网的管理,保障国际计算机信息交流的健康发展,根据《中华人民共和国计算机信息网络国际联网管理暂行规定》 (以下简称《暂行规定》 ),制定本办法。

Article 1 In accordance with Provisional Regulations of the Administration of international networking of Computer Information in the People's Republic of China (hereinafter referred to as Provisional Regulations), these Rules are formulated for the purpose of strengthening the administration of the international networking of computer information and ensuring the healthy development of the exchange of international information through computers.第二条中华人民共和国境内的计算机信息网络进行国际联网,依照本办法办理。

Article 2 These Rules shall apply to the connection of computer information networks within the territory of the People's Republic of China with international networks.第三条本办法下列用语的含义是:Article 3 Following are the definitions of terms used in these Rules:1.国际联网,是指中华人民共和国境内的计算机互联网络、专业计算机信息网络、企业计算机信息网络 ,以及其他通过专线进行国际联网的计算机信息网络同外国的计算机信息网络相联接。

网络安全中英文词汇对照

网络安全中英文词汇对照Access Control List(ACL)访问控制列表access token 访问令牌account lockout 帐号封锁account policies 记帐策略accounts 帐号adapter 适配器adaptive speed leveling 自适应速率等级调整Address Resolution Protocol(ARP) 地址解析协议Administrator account 管理员帐号ARPANET 阿帕网(internet的前身)algorithm 算法alias 别名allocation 分配、定位alias 小应用程序allocation layer 应用层API 应用程序编程接口anlpasswd 一种与Passwd+相似的代理密码检查器applications 应用程序ATM 异步传递模式attack 攻击audio policy 审记策略auditing 审记、监察back-end 后端borde 边界borde gateway 边界网关breakabie 可破密的breach 攻破、违反cipher 密码ciphertext 密文CAlass A domain A类域CAlass B domain B类域CAlass C domain C类域classless addressing 无类地址分配cleartext 明文CSNW Netware客户服务client 客户,客户机client/server 客户机/服务器code 代码COM port COM口(通信端口)CIX 服务提供者computer name 计算机名crack 闯入cryptanalysis 密码分析DLC 数据链路控制decryption 解密database 数据库dafault route 缺省路由dafault share 缺省共享denial of service 拒绝服务dictionary attack 字典式攻击directory 目录directory replication 目录复制domain 域domain controller 域名控制器domain name 域名DNS 域名服务器DNS(Domain Name System,域名系统)是指在Internet上查询域名或IP地址的目录服务系统。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

计算机信息网络国际联网安全保护管理办法Computer Information Network and Internet Security, Protectionand Management Regulations(1997年12月11日国务院批准, 1997年12月30日公安部发布)(Approved by the State Council on December 11, 1997 and promulgated by the Ministry of Public Security on December 30, 1997)第一章总则Chapter I. Comprehensive Regulations第一条为了加强对计算机信息网络国际联网的安全保护,维护公共秩序和社会稳定,根据《中华人民共和国计算机信息系统安全保护条例》、《中华人民共和国计算机信息网络国际联网管理暂行规定》和其他法律、行政法规的规定,制定本办法。

Article 1.In order to strengthen the security and the protection of computer information networks and of the Internet, and to preserve the social order and social stability, these regulations have been established on the basis of the "PRC Computer Information Network Protection Regulations", the "PRC Temporary Regulations on Computer Information Networks and the Internet" and other laws and administrative regulations.第二条中华人民共和国境内的计算机信息网络国际联网安全保护管理,适用本办法。

Article 2.The security, protection and management of all computer information networks within the borders of the PRC fall under these regulations.第三条公安部计算机管理监察机构负责计算机信息网络国际联网的安全保护管理工作。

Article 3.The computer management and supervision organization of the Ministry of Public Security is responsible for the security, protection and management of computer information networks and the Internet.公安机关计算机管理监察机构应当保护计算机信息网络国际联网的公共安全,维护从事国际联网业务的单位和个人的合法权益和公众利益。

The Computer Management and Supervision organization of the Ministry of Public Security should protect the public security of computer information networks and the Internet as well as protect the legal rights of Internet service providing units and individuals as well as the public interest.第四条任何单位和个人不得利用国际联网危害国家安全、泄露国家秘密,不得侵犯国家的、社会的、集体的利益和公民的合法权益,不得从事违法犯罪活动。

Article 4.No unit or individual may use the Internet to harm national security, disclose state secrets, harm the interests of the State, of society or of a group, the legal rights of citizens, or to take part in criminal activities.第五条任何单位和个人不得利用国际联网制作、复制、查阅和传播下列信息:Article 5.No unit or individual may use the Internet to create, replicate, retrieve, or transmit the following kinds of information:(一) 煽动抗拒、破坏宪法和法律、行政法规实施的;(1) Inciting to resist or breaking the Constitution or laws or the implementation of administrative regulations;(二) 煽动颠覆国家政权,推翻社会主义制度的;(2) Inciting to overthrow the government or the socialist system;(三) 煽动分裂国家、破坏国家统一的;(3) Inciting division of the country, harming national unification;(四) 煽动民族仇恨、民族歧视,破坏民族团结的;(4) Inciting hatred or discrimination among nationalities or harming the unity of the nationalities;(五) 捏造或者歪曲事实,散布谣言,扰乱社会秩序的;(5) Making falsehoods or distorting the truth, spreading rumors, destroying the order of society;(六) 宣扬封建迷信、淫秽、色情、赌博、暴力、凶杀、恐怖,教唆犯罪的;(6) Promoting feudal superstitions, sexually suggestive material, gambling, violence, murder;(七) 公然侮辱他人或者捏造事实诽谤他人的;(7) Terrorism or inciting others to criminal activity; openly insulting other people or distorting the truth to slander people;(八) 损害国家机关信誉的;(8) Injuring the reputation of state organs;(九) 其他违反宪法和法律、行政法规的。

(9) Other activities against the Constitution, laws or administrative regulations.第六条任何单位和个人不得从事下列危害计算机信息网络安全的活动:Article 6.No unit or individual may engage in the following activities which harm the security of computer information networks:(一) 未经允许,进入计算机信息网络或者使用计算机信息网络资源的;(1) No-one may use computer networks or network resources without getting proper prior approval(二) 未经允许,对计算机信息网络功能进行删除、修改或者增加的;(2) No-one may without prior permission may change network functions or to add or delete information(三) 未经允许,对计算机信息网络中存储、处理或者传输的数据和应用程序进行删除、修改或者增加的;(3) No-one may without prior permission add to, delete, or alter materials stored, processed or being transmitted through the network.(四) 故意制作、传播计算机病毒等破坏性程序的;(4) No-one may deliberately create or transmit viruses.(五) 其他危害计算机信息网络安全的。

(5) Other activities which harm the network are also prohibited.第七条用户的通信自由和通信秘密受法律保护。

任何单位和个人不得违反法律规定,利用国际联网侵犯用户的通信自由和通信秘密。

Article 7.The freedom and privacy of network users is protected by law. No unit or individual may, in violation of these regulations, use the Internet to violate the freedom and privacy of network users.第二章安全保护责任Chapter II. Responsibility for Security and Protection第八条从事国际联网业务的单位和个人应当接受公安机关的安全监督、检查和指导,如实向公安机关提供有关安全保护的信息、资料及数据文件,协助公安机关查处通过国际联网的计算机信息网络的违法犯罪行为。

Article 8.Units and individuals engaged in Internet business must accept the security supervision, inspection, and guidance of the Public Security organization. This includes providing to the Public Security organization information, materials and digital document, and assisting the Public Security organization to discover and properly handle incidents involving law violations and criminal activities involving computer information networks.第九条国际出入口信道提供单位、互联单位的主管部门或者主管单位,应当依照法律和国家有关规定负责国际出入口信道、所属互联网络的安全保护管理工作。

相关文档
最新文档