Key Highlights of the Protection of Critical Infrastructures (Computer Systems) Bill

  • Insight Articles 2025年2月19日 2025年2月19日
  • 亚太地区

  • Tech & AI evolution

This article delves into some major highlights of the recently gazetted Protection of Critical Infrastructures (Computer Systems) Bill (the “Bill”), [1] which was introduced into the Legislative Council for First Reading and Second Reading on 11 December 2024.

The Bill aims to impose statutory requirements to strengthen the security of the computer systems of critical infrastructures (“CIs”) in Hong Kong, regulate the critical infrastructure operators (“CIOs”) and provide for the investigation into, and response to, computer-system security threats and incidents. 

1.     Who will be the Regulatory Authorities?

The Security Bureau will set up a New Commissioner’s Office headed by a Commissioner [2] appointed by the Chief Executive, supported by the Designated Authorities, including:

(i) the Monetary Authority for regulating the banking and financial services sector; and,
(ii). the Communications Authority for regulatory for regulating the communications and broadcasting sector.

2.     What does the Bill intend to regulate?

Only those expressly designated as CIs, CIOs and critical computer systems (“CCSs”) will be regulated and subject to statutory obligations.

What are CIs? Under the Bill, it is proposed that CIs should cover:

(i) infrastructure that is essential to the continuous provision in Hong Kong of an essential service in the following 8 sectors: energy, information technology, banking and financial services, air transport, land transport, maritime transport, healthcare services, and telecommunications and broadcasting services, or
(ii) any other infrastructure the damage, loss of functionality or data leakage of which may hinder or otherwise substantially affect the maintenance of critical societal or economics activities in Hong Kong.

When ascertaining whether an infrastructure is a CI, the regulatory authority will consider factors such as the services provided by that infrastructure, and what practical implications there could be if the infrastructure were damaged, lost functionality or suffered any data leakage.

Who are the CIOs? CIOs are organisations designated under section 12. When designating or revoking a CIO, the regulatory authority may consider factors such as how dependent the core function of the CI concerned is on the computer systems, the sensitivity of the digital data controlled by the organisation in respect of the infrastructure, and the extent of control the organisation has over the operation and management of the infrastructure. Generally speaking, CIOs will mostly be large organisations, where small and medium enterprises and the general public will not be affected.

What are CCSs? CCSs are computer systems that are accessible by CIO in and from Hong Kong and are essential to the core functions of a CI, where, if such systems were interrupted or damaged, it would seriously impact the normal functioning of a CI. When designating or revoking a CCS, the regulatory authority may consider  matters, such as the role of the system in respect of the core function of the CI concerned, how such a core function would be impacted if the system were disrupted or destroyed, and the extent to which the system is related to any other computer systems of the CIO concerned.

3.     Which obligations are to be imposed on the CIOs?

Organisational Obligations
  • Maintaining an address and office in Hong Kong and notifying the regulatory authority of any subsequent changes.
  • Updating the regulatory authority on changes in ownership and operation. 
  • Setting up and maintaining a computer system security management unit with professional knowledge, either by itself or via a service provider.
Prevention of Threats and Incidents
  • Informing the regulatory authority of material changes to their CCSs.
  • Formulating and implementing a computer security management plan.
  • Conducting an annual computer system security risk assessment.
  • Conducting a biennial independent computer system security audit.
Incident Reporting and Response Obligations
  • Participating in computer system security drills.
  • Implementing an emergency response plan for computer system security incidents and submitting the plan to the Commissioner. 
  • Notifying computer system security incidents regarding CCSs to the Commissioner within the specific time frame
    • Serious incidents (i.e. an incident that disrupts or is likely to disrupt the core function of the CIs) – within 12 hours
    • Other incidents – within 48 hours
  • Following the notification above, the CIOs must further submit a written report of the incident within 14 days after the CIO becomes aware of the incident concerned.
Reporting Obligations
  • CIOs are only required to report to their respective Designated Authorities matters related to their performance of organisational obligations, and obligations to prevent threats and incidents, and CIOs do not need to submit further reports to the Commissioner’s Office. 
  • If computer security incidents occur, CIOs must report these to the Commissioner’s Office in addition to reporting them to Designated Authorities.
  • During an investigation, and upon written request by the Commissioner’s Office, CIOs must submit all relevant documents in their possession or under their control, located in or outside Hong Kong.
     

4.     What are the penalties for non-compliance?

In principle, penalties will be imposed on an organisational basis and will be monetary fines. For instance, CIOs may be liable to a maximum fine of HK$5 million for failure to participate in computer-system security drills or notify computer-system security incidents. That said, if the relevant violation involves infringement of existing criminal legislation, such as making false statements, committing other fraud related offences, etc., the officers involved could be held criminally liable.

5.     What are the investigative powers of the Commissioner?

Under the Bill, the Commissioner may direct an authorised officer to make inquiries to identify the cause of the event, or to carry out an investigation into the security threat. The authorised officer can also require the CIO to produce documents and apply for a warrant from the magistrate to enter the CIO’s premises to search for, inspect, make copies and seize evidence if specified conditions are met.

6.     Will personal data be governed by the Bill?

The Security Bureau explicitly stated that the Bill is not targeted at personal data or commercial confidential information. However, in reality, it is unavoidable that personal data would be leaked in the event of cyber-attacks against the CIs and the CCSs, especially when CIOs are usually large organisations holding vast amount of personal data. It is further clarified that CIOs are required to report to both the Commissioner’s Office and the Privacy Commissioner for Personal Data when a computer system attack incident results in a personal data leak.

Next steps

Given the extensive obligations imposed on CIOs, potential CIOs should consider whether they fall within the scope of the Bill and, if so, review their existing cybersecurity measures and consider the type of implementation or framework that they would need to put in place to ensure compliance with the Bill when it comes into effect.  


[1] https://www.elegislation.gov.hk/hk/2024/12/06/supp3/5!en
[2] The Commissioner of Critical Infrastructure (Computer-system Security)

结束

Clyde.Insights.Areas:

  • Legal Developments

掌握其礼的最新消息

注册您的邮箱,获取其礼最新消息!