Statements (51)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:law
|
| gptkbp:address |
gptkb:cybercrime
gptkb:malware phishing data leaks hacking unauthorized access cyber threats cyber terrorism |
| gptkbp:aimsTo |
prevent cybercrime
protect information systems ensure privacy |
| gptkbp:appliesTo |
individuals
organizations critical infrastructure |
| gptkbp:basisFor |
industry standards
compliance frameworks cybersecurity regulations |
| gptkbp:dateEnacted |
various countries
early 2000s |
| gptkbp:enforcedBy |
gptkb:government_agency
|
| gptkbp:fieldOfLaw |
cybersecurity
|
| gptkbp:includes |
security standards
penalties for non-compliance cyber incident reporting data breach notification requirements |
| gptkbp:notableExample |
gptkb:China's_Cybersecurity_Law
gptkb:EU_NIS_Directive gptkb:Singapore_Cybersecurity_Act gptkb:US_Cybersecurity_Information_Sharing_Act |
| gptkbp:protectedBy |
personal data
critical infrastructure business information government networks |
| gptkbp:regulates |
data protection
network security information security cyber activities |
| gptkbp:relatedTo |
gptkb:privacy_law
information technology law computer crime law |
| gptkbp:requires |
risk assessments
security controls incident response plans |
| gptkbp:subject |
gptkb:treaty
gptkb:regulatory_oversight compliance audits cross-border data transfer rules |
| gptkbp:bfsParent |
gptkb:modern_Chinese_legal_system
|
| gptkbp:bfsLayer |
9
|
| https://www.w3.org/2000/01/rdf-schema#label |
Cybersecurity Law
|