ANT Lawyers

Vietnam Law Firm with English Speaking Lawyers

ANT Lawyers

Vietnam Law Firm with English Speaking Lawyers

ANT Lawyers

Vietnam Law Firm with English Speaking Lawyers

ANT Lawyers

Vietnam Law Firm with English Speaking Lawyers

ANT Lawyers

Vietnam Law Firm with English Speaking Lawyers

Hiển thị các bài đăng có nhãn Cyber security in Vietnam. Hiển thị tất cả bài đăng
Hiển thị các bài đăng có nhãn Cyber security in Vietnam. Hiển thị tất cả bài đăng

Thứ Năm, 9 tháng 5, 2019

What is cybersecurity?


We depend on technology heavily, which also translates to a rise in online hackers. The bigger the corporation is, the higher the risk of cyber attacks. This is when cybersecurity comes into the picture.
What is cybersecurity: Cybersecurity is the condition of being guarded against criminal and illegal activities that comprise of activities related to computer, information technology, and virtual reality. It also means the measures taken to acquire this condition. One must know the risks, threats, and consequences of cyber attacks.

- Who are the attackers: The attacker could be an external source like a hacker who gets into the system and steals files. The imposter could even be someone from the company itself, like an employee who has an access to confidential information.

- How are the attacks carried out: The attackers through viruses or botnets invade systems. It is even done by using a USB drive or clicking on an unknown link.

- When is the attack carried out: Cyber attacks mostly occur when your systems or the internal staff are vulnerable. There is no specific vulnerability and the attack can occur at any time.

- Which area is hit: Cyberspace is a limitless stretch so the attack can occur in any area.

- Why do these attacks occur: The external agents strike to leak or held captive crucial company data for earning ransom. And the internal sources like the employees do it for competitors in exchange for money. Some even do it as a revenge due to past unpleasant experiences.

- How to tackle cyber attacks: There are three ways of securing your website:

SSL Certificate: This certificate validates your website's identity and encrypts the information visitors send or receive from your site.

CodeGuard: It is a service that does an automatic backup of your website.

SiteLock: It scans your website for any threat and when it is detected, it works effectively to repair it. Also, you would be instantly notified about any attack.


Source : Quora - Jenny Webber, Web hosting expert
ANT Lawyers in a law firm in Vietnam, recognized by Legal500, IFLR1000. We are an exclusive Vietnam member of Prea Legal, the global law firm network covering more than 150 jurisdictions. The firm provides a range of legal services to multinational and domestic clients. For advice or services request, please contact us via email ant@antlawyers.vn, or call us +84 24 730 86 529.





Thứ Sáu, 10 tháng 8, 2018

What are Conditions to Meet for Trading civil cryptographic products and services?


According to Article 30 and 31, Law on Cyber Information Security,
Civil cryptographic products and services are:

1. Civil cryptographic products include cryptographic documents and technical and professional equipment used to protect information not classified as state secret.


2. Civil cryptographic services include services of protection of information using civil cryptographic products; inspection and assessment of civil cryptographic products; and counseling on cyber information confidentiality and security using civil cryptographic products.

Trading in civil cryptographic products and services requires:

1. An enterprise that wishes to trade in civil cryptographic products and services on the list of civil cryptographic products and services shall obtain a license for doing so.

2. An enterprise shall be granted a license for trading in civil cryptographic products and services when fully meeting the following conditions:

a/ Having managerial, administration and technical staff members who meet professional requirements on information confidentiality and security;

b/ Having equipment and physical foundations suitable to the scale of provision of civil cryptographic products and services;

c/ Having a technical plan conformable with standards and technical regulations;

d/ Having a cyber information confidentiality and security plan in the course of management and provision of civil cryptographic products and services;

e/ Having an appropriate business plan.

3. Civil cryptographic products shall be inspected and certified as conformable with regulations before being marketed.

4. To obtain a license for trading in civil cryptographic products and services, an enterprise shall pay a fee in accordance with the law on charges and fees.

5. The Government shall promulgate a list of civil cryptographic products and services and detail this Article.

Our cyber security lawyers always follow development of laws in Vietnam to provide the client with update. Please contact ANT Lawyers for service inquiries.





Thứ Tư, 11 tháng 7, 2018

What are Regulations on Collection and Use of Personal Information Under Cyber Information Law?


According to Article 17, Law on Cyber Information Security 2015, the collection and use of personal information are regulated as following:


1. Organizations and individuals that process personal information shall:

a/ Collect personal information only after obtaining the consent of its owners regarding the scope and purpose of collection and use of such information;

b/ Use the collected personal information for purposes other than the initial one only after obtaining the consent of its owners;

c/ Refrain from providing, sharing or spreading to a third party personal information they have collected, accessed or controlled, unless they obtain the consent of the owners of such personal information or at the request of competent state agencies.

2. State agencies shall secure and store personal information they have collected.

3. Owners of personal information may request personal information-processing organizations and individuals to provide their personal information collected and stored by the latter.
Our cyber security lawyers always follow development of laws in Vietnam to provide the client with update. Please contact ANT Lawyers for service inquiries.





What Are Prohibited Acts Under the Law on Cyber Information Security?


The Law on Cyber Information Security has been promulgated in 2015.   According to Article 7, Law on Cyber Information Security, prohibited acts are:


-Blocking the transmission of information in cyberspace, or illegally intervening, accessing, harming, deleting, altering, copying or falsifying information in cyberspace.

-Illegally affecting or obstructing the normal operation of information systems or the users’ accessibility to information systems.

-Illegally attacking, or nullifying cyberinformation security protection measures of, information systems; attacking, seizing the right to control, or sabotaging, information systems.

-Spreading spams or malware or establishing fake and deceitful information systems.

-Illegally collecting, utilizing, spreading or trading in personal information of others; abusing weaknesses of information systems to collect or exploit personal information.

-Hacking cryptographic secrets and lawfully enciphered information of agencies, organizations or individuals; disclosing information on civil cryptographic products or information on clients that lawfully use civil cryptographic products; using or trading in civil cryptographic products of unclear origin.

Our cyber lawyers always follow development of laws in Vietnam to provide the client with update.  Please contact ANT Lawyers for service inquiries.



Thứ Tư, 27 tháng 6, 2018

What Are Prohibited Acts Under the Law on Cyber Information Security?


The Law on Cyber Information Security has been promulgated in 2015.   According to Article 7, Law on Cyber Information Security, prohibited acts are:
1.Blocking the transmission of information in cyberspace, or illegally intervening, accessing, harming, deleting, altering, copying or falsifying information in cyberspace.


2.Illegally affecting or obstructing the normal operation of information systems or the users’ accessibility to information systems.

3.Illegally attacking, or nullifying cyberinformation security protection measures of, information systems; attacking, seizing the right to control, or sabotaging, information systems.

4.Spreading spams or malware or establishing fake and deceitful information systems.


5.Illegally collecting, utilizing, spreading or trading in personal information of others; abusing weaknesses of information systems to collect or exploit personal information.

6.Hacking cryptographic secrets and lawfully enciphered information of agencies, organizations or individuals; disclosing information on civil cryptographic products or information on clients that lawfully use civil cryptographic products; using or trading in civil cryptographic products of unclear origin.

Our cyber lawyers always follow development of laws in Vietnam to provide the client with update.  Please contact ANT Lawyers for service inquiries.