英文法律案例讲解模板

找了一下,看到前瞻网上直接通过谷歌翻译的版本:

Chapter I General Provisions

The first level of protection for the specification of information security management, improve the capacity and level of information security , to safeguard national security, social stability and public interests to safeguard and promote information technology, according to " Regulations on Protection of Computer Information System Security " and other relevant laws and regulations, the development of this approach.

Article 2 The State through the development of a uniform level of protection of information security management practices and technical standards , organizational citizens, legal persons and other organizations to implement information systems graded security protection , implementation of the work on the level of protection supervision and management.

Third level public security organs responsible for information security protection work supervision, inspection and guidance. State secret protection department is responsible for grading the work relating to confidentiality of supervision, inspection and guidance. National level password management department is responsible for the protection of the work relating to the password supervision, inspection and guidance. Involving other functional departments under the jurisdiction of the matter , the relevant departments in accordance with national laws and regulations to manage. Information Office of the State Council Informatization Leading Group and local level offices responsible for the protection of inter-departmental coordination .

Article information systems departments shall in accordance with the practices and related standards , supervise , inspect and guide the industry, the department or the regional information system operations , and use of the information security level protection.

Article operational information systems , the use of units should be in accordance with the scheme and its related standards , implementation of information security level protection obligations and responsibilities .

Chapter II classification and protection

Article National Information Security Protection adhere to independent grading, the principle of self- protection . Information system security protection should be based on information systems in national security, economic construction and social life the importance of the information system after the destruction of national security , public order , public interest and citizens , legal persons and other organizations of the legitimate rights and interests other factors to determine the degree of harm .

Article VII of information system security protection class is divided into the following five :

The first stage , information systems are destroyed, be citizens , legal persons and other organizations of the legitimate interests of damage , but does not harm national security, social order and public interests.

The second stage , after the destruction of information systems , will citizens , legal persons and other organizations of the legitimate interests of serious harm, or to social order and damage to public interests , but does not harm national security .

The third stage , the information systems are destroyed, the social order and public interests would cause serious damage , or damage to national security .

Fourth level , information systems are destroyed, would cause social order and public interests is particularly serious harm, or cause serious damage to national security .

Fifth grade , information systems are destroyed, would cause particularly serious damage to national security .

Article information systems operations, the use of units in accordance with the methods and technical standards for the protection of information systems , national regulatory authorities related to information security protection of their information security level of supervision and management .

The first -level information systems operations, the use of units should be based on relevant national management practices and technical standards for protection.

The second -level information systems operations, the use of units should be based on relevant national management practices and technical standards for protection. Safety supervision departments of the national -level information system security level information to guide conservation efforts .

The third -level information systems operations, the use of units should be based on relevant management practices and technical standards for protection. Safety supervision departments of the national -level information system information security level protection supervision and inspection.

The fourth level information systems operations, the use of units should be based on relevant management practices , technical standards and business specific needs for protection. Safety supervision departments of the national -level information system information security level of protection to mandatory supervision and inspection.

Fifth level information systems operations, the use of units should be based on national management standards, technical standards and business security needs special protection. Specifically designated by the State -level information systems departments of the level of information security protection for specialized supervision and inspection.

Chapter III Implementation and management level of protection

Article 9 - Information system operators , the use of units shall " Information System Security Protection Implementation Guide " embodiment level protection.

Article information systems operations, the use of units should be based on this approach and the " Information Systems Security Protection Grading Guide " to determine information system security protection. The competent authorities , shall be approved by the competent authorities for approval .

Interprovincial or unified national network of information systems can be run by the competent authority and determine the level of security protection .

Right to be identified as the fourth level above information systems , operations , and use of , or the competent authorities shall invite the national information security protection level expert committee review .(节选部分来自前瞻网资料)

楼主你自己直接把到中国公安部网站找到中文版,然后直译,希望对你有帮助。