CONNECT WITH US

Subscribe our monthly newsletter, receive latest news and event information

News & Events

๐—ก๐—ฒ๐˜„ ๐—–๐—ฟ๐—ถ๐˜๐—ถ๐—ฐ๐—ฎ๐—น ๐—œ๐—ป๐—ณ๐—ฟ๐—ฎ๐˜€๐˜๐—ฟ๐˜‚๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—Ÿ๐—ฎ๐˜„
๐—ก๐—ฒ๐˜„ ๐—–๐—ฟ๐—ถ๐˜๐—ถ๐—ฐ๐—ฎ๐—น ๐—œ๐—ป๐—ณ๐—ฟ๐—ฎ๐˜€๐˜๐—ฟ๐˜‚๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—Ÿ๐—ฎ๐˜„

๐Ÿ” ๐—ช๐—ต๐—ผ ๐—œ๐˜€ ๐—œ๐—ป๐˜ƒ๐—ผ๐—น๐˜ƒ๐—ฒ๐—ฑ ๐—ถ๐—ป ๐—›๐—ผ๐—ป๐—ด ๐—ž๐—ผ๐—ป๐—ดโ€™๐˜€ ๐—ก๐—ฒ๐˜„ ๐—–๐—ฟ๐—ถ๐˜๐—ถ๐—ฐ๐—ฎ๐—น ๐—œ๐—ป๐—ณ๐—ฟ๐—ฎ๐˜€๐˜๐—ฟ๐˜‚๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—Ÿ๐—ฎ๐˜„?

Since ๐Ÿญ ๐—๐—ฎ๐—ป๐˜‚๐—ฎ๐—ฟ๐˜† ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ, the ๐˜—๐˜ณ๐˜ฐ๐˜ต๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ฐ๐˜ง ๐˜Š๐˜ณ๐˜ช๐˜ต๐˜ช๐˜ค๐˜ข๐˜ญ ๐˜๐˜ฏ๐˜ง๐˜ณ๐˜ข๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ถ๐˜ณ๐˜ฆ๐˜ด (๐˜Š๐˜ฐ๐˜ฎ๐˜ฑ๐˜ถ๐˜ต๐˜ฆ๐˜ณ ๐˜š๐˜บ๐˜ด๐˜ต๐˜ฆ๐˜ฎ๐˜ด) ๐˜–๐˜ณ๐˜ฅ๐˜ช๐˜ฏ๐˜ข๐˜ฏ๐˜ค๐˜ฆ (๐˜Š๐˜ข๐˜ฑ. 653) has come into force. The law establishes a comprehensive framework to protect essential services from cyber threats.

Under Cap. 653, designated ๐—–๐—ฟ๐—ถ๐˜๐—ถ๐—ฐ๐—ฎ๐—น ๐—œ๐—ป๐—ณ๐—ฟ๐—ฎ๐˜€๐˜๐—ฟ๐˜‚๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ (๐—–๐—œ) ๐—ข๐—ฝ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ผ๐—ฟ๐˜€ are organizations whose computer systems are essential to maintaining critical societal or economic activities in Hong Kong.

๐Ÿ— ๐—ฆ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜€ ๐——๐—ฒ๐—ณ๐—ถ๐—ป๐—ฒ๐—ฑ ๐—ฎ๐˜€ ๐—–๐—ฟ๐—ถ๐˜๐—ถ๐—ฐ๐—ฎ๐—น ๐—œ๐—ป๐—ณ๐—ฟ๐—ฎ๐˜€๐˜๐—ฟ๐˜‚๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ ๐—œ๐—ป๐—ฐ๐—น๐˜‚๐—ฑ๐—ฒ:
1. Energyโšก
2. Information Technology๐Ÿ’ป
3. Banking & Financial Services๐Ÿฆ
4. Air Transportโœˆ
5. Land Transport๐Ÿš†
6. Maritime Transportโš“
7. Healthcare Services๐Ÿฅ
8. Telecommunications & Broadcasting๐Ÿ“ก

In addition, any other infrastructure the damage, loss of functionality or data leakage of which may hinder or otherwise substantially affect the maintenance of critical societal or economic activities in Hong Kong may also fall within scope.

These operators are now legally required to establish cybersecurity governance frameworks โ€” from maintaining dedicated computer-system security management units to reporting incidents, conducting periodic risk assessments and audits, etc.

Besides the CI Operator, there are ๐˜€๐—ผ๐—บ๐—ฒ ๐—ผ๐˜๐—ต๐—ฒ๐—ฟ ๐—ž๐—ฒ๐˜† ๐—ฅ๐—ผ๐—น๐—ฒ๐˜€ ๐˜‚๐—ป๐—ฑ๐—ฒ๐—ฟ ๐—–๐—ฎ๐—ฝ. ๐Ÿฒ๐Ÿฑ๐Ÿฏ:๐Ÿ‘ฅ
๐Ÿ”น ๐—–๐—ผ๐—บ๐—ฝ๐˜‚๐˜๐—ฒ๐—ฟ-๐˜€๐˜†๐˜€๐˜๐—ฒ๐—บ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐— ๐—ฎ๐—ป๐—ฎ๐—ด๐—ฒ๐—บ๐—ฒ๐—ป๐˜ ๐—จ๐—ป๐—ถ๐˜
Responsible for managing and safeguarding critical computer systems and ensuring compliance with the Ordinance.

๐Ÿ”น ๐—ฆ๐˜‚๐—ฝ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐˜€๐—ผ๐—ฟ ๐—ผ๐—ณ ๐˜๐—ต๐—ฒ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐— ๐—ฎ๐—ป๐—ฎ๐—ด๐—ฒ๐—บ๐—ฒ๐—ป๐˜ ๐—จ๐—ป๐—ถ๐˜
An appointed employee with sufficient cybersecurity expertise, responsible for supervising the unit and notifying the regulating authority of the appointment.

๐Ÿ’ก ๐—–๐—ฎ๐—ฝ. ๐Ÿฒ๐Ÿฑ๐Ÿฏ ๐—บ๐—ฎ๐—ฟ๐—ธ๐˜€ ๐—ฎ ๐˜€๐—ถ๐—ด๐—ป๐—ถ๐—ณ๐—ถ๐—ฐ๐—ฎ๐—ป๐˜ ๐˜€๐—ต๐—ถ๐—ณ๐˜ ๐—ณ๐—ฟ๐—ผ๐—บ ๐—ฏ๐—ฒ๐˜€๐˜ ๐—ฝ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฒ ๐˜๐—ผ ๐—น๐—ฒ๐—ด๐—ฎ๐—น ๐—ผ๐—ฏ๐—น๐—ถ๐—ด๐—ฎ๐˜๐—ถ๐—ผ๐—ป.
If your organization operates within a potentially designated sector, early preparation is essential.

Posted: 2026-03-02 | By Ringus Full Article

๐Ÿšจ๐—˜๐—บ๐—ฝ๐—ผ๐˜„๐—ฒ๐—ฟ๐—ถ๐—ป๐—ด ๐—ฌ๐—ผ๐˜‚๐—ฟ ๐—ง๐—ฒ๐—ฎ๐—บ ๐—”๐—ด๐—ฎ๐—ถ๐—ป๐˜€๐˜ ๐—ฃ๐—ต๐—ถ๐˜€๐—ต๐—ถ๐—ป๐—ด ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜๐˜€๐Ÿšจ

Last week, Ringus, as part of the Hantec Group,

As the joyous Christmas season approaches, ther

Following our recent badminton game, Ringus Tab

An absolute delight to meet both new and old fr

Please be informed that our office will be relo

Ringus participated in a badminton competition