6 groups of prohibited behaviors for Internet users in the Law on Cyber ​​Security

Ba Chiem - Huu Nhan - June 16, 2018 11:30
The Law on Cyber ​​Security specifically stipulates prohibited acts for Internet users, including slander, humiliation, and false information on social networks.
What does the Cyber ​​Security Law prohibit Internet users from doing?The Law on Cyber ​​Security specifically stipulates prohibited acts for Internet users, including slander, humiliation, and false information on social networks.

Article 8 of the Law on Cyber ​​Security (effective from January 1, 2019) stipulates 6 groups of prohibited acts in cyberspace, including:

1.

Using cyberspace, information technology, and electronic means to violate national security and social order and safety; activities against the Socialist Republic of Vietnam; distorting history, insulting religion, discriminating based on gender, racism; inciting riots, disrupting security, disturbing public order; providing false information, insulting, slandering; violating economic management order, prostitution, social evils, human trafficking, and inciting, enticing, and inciting others to commit crimes.

2.

Conducting cyber warfare, cyber attacks, cyber terrorism, cyber espionage, cyber crime; causing incidents, attacking, infiltrating, taking control, distorting, interrupting, stopping, paralyzing or destroying important information systems related to national security.

3.

Producing, using tools, means, software or engaging in acts that hinder or disrupt the operation of computer networks or telecommunications networks; disseminating computer programs that harm the operation of computer networks, telecommunications networks or electronic devices; illegally accessing other people's computer networks, telecommunications networks or electronic devices.

4.

Resisting or obstructing the activities of cybersecurity forces; illegally attacking or disabling cybersecurity measures.

5.

Taking advantage or abusing cybersecurity protection activities to infringe upon national sovereignty, interests, security, social order and safety, legitimate rights and interests of organizations and individuals, or for personal gain.

6.

Other acts using cyberspace to infringe upon national security, social order and safety, the legitimate rights and interests of organizations and individuals, or violate the provisions of this Law.

Share your opinion
POWERED BYONECMS- A PRODUCT OFNEKO