๐ก๐ฎ๐๐ถ๐ด๐ฎ๐๐ถ๐ป๐ด ๐๐ผ๐ป๐ด ๐๐ผ๐ป๐ด'๐ ๐ก๐ฒ๐ ๐๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ฎ๐: ๐๐ฎ๐ฝ. ๐ฒ๐ฑ๐ฏ ๐ฃ๐ฟ๐ผ๐๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐ผ๐ณ ๐๐ฟ๐ถ๐๐ถ๐ฐ๐ฎ๐น ๐๐ป๐ณ๐ฟ๐ฎ๐๐๐ฟ๐๐ฐ๐๐๐ฟ๐ฒ๐ (๐๐ผ๐บ๐ฝ๐๐๐ฒ๐ฟ ๐ฆ๐๐๐๐ฒ๐บ๐) ๐ข๐ฟ๐ฑ๐ถ๐ป๐ฎ๐ป๐ฐ๐ฒ ๐ก
As of January 1, 2026, Hong Kong has taken step forward in safeguarding essential services with the implementation of Cap. 653, Protection of Critical Infrastructures (Computer Systems) Ordinance. This legislation ensures designated operators of critical infrastructures (CI) adopt appropriate measures to protect their computer systems from cyber threats. In today's increasingly digital world, understanding these obligations is crucial for compliance and resilience.
Here are some of the requirements with three categories of statutory obligations:
1๏ธโฃ ๐๐๐ก๐๐๐๐ฉ๐๐ค๐ฃ๐จ ๐๐๐ก๐๐ฉ๐๐ฃ๐ ๐ฉ๐ค ๐๐ง๐๐๐ฃ๐๐ฏ๐๐ฉ๐๐ค๐ฃ ๐ค๐ ๐พ๐ ๐๐ฅ๐๐ง๐๐ฉ๐ค๐ง๐จ
๐ Notify regulating authority for Hong Kong office location.
๐Notifying the regulating authorities for any operatorsโ changes.
๐Maintaining computer-system security management unit.
2๏ธโฃ ๐๐๐ก๐๐๐๐ฉ๐๐ค๐ฃ๐จ ๐๐๐ก๐๐ฉ๐๐ฃ๐ ๐ฉ๐ค ๐๐ง๐๐ซ๐๐ฃ๐ฉ๐๐ค๐ฃ ๐ค๐ ๐๐๐ง๐๐๐ฉ๐จ ๐๐ฃ๐ ๐๐ฃ๐๐๐๐๐ฃ๐ฉ๐จ
๐Notifying the regulating authority of any material changes to their critical computer systems within required timeframes.
๐Submit and implement a comprehensive computer-system security management plan.
๐Conduct computer-system security risk assessments and security audits regularly and submit reports within required timeframes.
3๏ธโฃ ๐๐๐ก๐๐๐๐ฉ๐๐ค๐ฃ๐จ ๐๐๐ก๐๐ฉ๐๐ฃ๐ ๐ฉ๐ค ๐๐ฃ๐๐๐๐๐ฃ๐ฉ ๐๐๐ฅ๐ค๐ง๐ฉ๐๐ฃ๐ ๐๐ฃ๐ ๐๐๐จ๐ฅ๐ค๐ฃ๐จ๐
๐Conduct computer-system security drills to test the readiness.
๐Submit and implement an emergency response plan.
๐Notify computer-system security incidents to the regulating authority with written records under reasonable timeframes.
Our cybersecurity and privacy consultation team is here to help organizations navigate these complex requirements, and ensure computer systems meet compliance requirements.