Unofficial Translation Notice
This is an unofficial English translation prepared for general informational purposes only. It does not constitute legal advice. In case of any discrepancy, the official Chinese text published by the competent authority shall prevail.
本文为非官方英文翻译,仅供一般信息参考,不构成法律意见。如与主管机关发布的中文正式文本不一致,以中文正式文本为准。
Summary
China's foundational cybersecurity statute, covering network operation security, critical information infrastructure protection, network information security, monitoring and emergency response, and legal liability.
The CSL is a foundational law for cybersecurity governance in China. This page records the current amended source, article-level Chinese text records, amendment status, related MLPS references, and comparison route for version tracking.
Use the comparison page for the article-level structure showing how amended text can be tracked article by article.
Key Obligations
- Network operators shall perform network security protection duties.
- Critical information infrastructure operators are subject to enhanced protection duties.
- Network products and services must meet relevant security requirements.
- Operators must preserve network logs and handle security incidents under statutory requirements.
Related Documents
Amendment and Version History
- 2016-11-07: Adopted. Adopted by the Standing Committee of the National People's Congress.
- 2017-06-01: Original effective date. Original effective date recorded from the official text.
- 2026-01-01: Amended version effective. Current registry records an amended version effective date; article-level change review remains in progress.
Article Index
Official Chinese article records published; English translation editorial review pending.
78 article-level records available.
Chapter I General Provisions
- Article 1 editorial review pending
- Article 2 editorial review pending
- Article 3 editorial review pending
- Article 4 editorial review pending
- Article 5 editorial review pending
- Article 6 editorial review pending
- Article 7 editorial review pending
- Article 8 editorial review pending
- Article 9 editorial review pending
- Article 10 editorial review pending
- Article 11 editorial review pending
- Article 12 editorial review pending
- Article 13 editorial review pending
- Article 14 editorial review pending
- Article 15 editorial review pending
Chapter II Support and Promotion of Cybersecurity
- Article 16 editorial review pending
- Article 17 editorial review pending
- Article 18 editorial review pending
- Article 19 editorial review pending
- Article 20 editorial review pending
- Article 21 editorial review pending
- Article 22 editorial review pending
Chapter III Network Operation Security
- Article 23 Section 1 General Provisions editorial review pending
- Article 24 Section 1 General Provisions editorial review pending
- Article 25 Section 1 General Provisions editorial review pending
- Article 26 Section 1 General Provisions editorial review pending
- Article 27 Section 1 General Provisions editorial review pending
- Article 28 Section 1 General Provisions editorial review pending
- Article 31 Section 1 General Provisions editorial review pending
- Article 32 Section 1 General Provisions editorial review pending
- Article 33 Section 2 Operation Security for Critical Information Infrastructure editorial review pending
- Article 34 Section 2 Operation Security for Critical Information Infrastructure editorial review pending
- Article 35 Section 2 Operation Security for Critical Information Infrastructure editorial review pending
- Article 36 Section 2 Operation Security for Critical Information Infrastructure editorial review pending
- Article 37 Section 2 Operation Security for Critical Information Infrastructure editorial review pending
- Article 38 Section 2 Operation Security for Critical Information Infrastructure editorial review pending
- Article 39 Section 2 Operation Security for Critical Information Infrastructure editorial review pending
- Article 40 Section 2 Operation Security for Critical Information Infrastructure editorial review pending
- Article 41 Section 2 Operation Security for Critical Information Infrastructure editorial review pending
Chapter IV Network Information Security
- Article 42 editorial review pending
- Article 43 editorial review pending
- Article 44 editorial review pending
- Article 45 editorial review pending
- Article 46 editorial review pending
- Article 47 editorial review pending
- Article 48 editorial review pending
- Article 49 editorial review pending
- Article 50 editorial review pending
- Article 51 editorial review pending
- Article 52 editorial review pending
Chapter V Monitoring, Early Warning, and Emergency Response
- Article 53 editorial review pending
- Article 54 editorial review pending
- Article 55 editorial review pending
- Article 56 editorial review pending
- Article 57 editorial review pending
- Article 58 editorial review pending
- Article 59 editorial review pending
- Article 60 editorial review pending
Chapter VI Legal Liability
- Article 61 editorial review pending
- Article 62 editorial review pending
- Article 63 editorial review pending
- Article 64 editorial review pending
- Article 65 editorial review pending
- Article 67 editorial review pending
- Article 68 editorial review pending
- Article 69 editorial review pending
- Article 70 editorial review pending
- Article 71 editorial review pending
- Article 72 editorial review pending
- Article 73 editorial review pending
- Article 74 editorial review pending
- Article 75 editorial review pending
- Article 76 editorial review pending
- Article 77 editorial review pending
Chapter VII Supplementary Provisions
- Article 78 editorial review pending
- Article 79 editorial review pending
- Article 80 editorial review pending
- Article 81 editorial review pending