Statements (51)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:law
|
gptkbp:address |
cybercrime
malware phishing data leaks hacking unauthorized access cyber threats cyber terrorism |
gptkbp:aimsTo |
prevent cybercrime
protect information systems ensure privacy |
gptkbp:appliesTo |
individuals
organizations critical infrastructure |
gptkbp:basisFor |
industry standards
compliance frameworks cybersecurity regulations |
gptkbp:dateEnacted |
various countries
early 2000s |
gptkbp:enforcedBy |
gptkb:government_agency
|
gptkbp:fieldOfLaw |
cybersecurity
|
https://www.w3.org/2000/01/rdf-schema#label |
Cybersecurity Law
|
gptkbp:includes |
security standards
penalties for non-compliance cyber incident reporting data breach notification requirements |
gptkbp:notableExample |
gptkb:China's_Cybersecurity_Law
gptkb:EU_NIS_Directive gptkb:Singapore_Cybersecurity_Act gptkb:US_Cybersecurity_Information_Sharing_Act |
gptkbp:protectedBy |
personal data
critical infrastructure business information government networks |
gptkbp:regulates |
data protection
network security information security cyber activities |
gptkbp:relatedTo |
information technology law
privacy law computer crime law |
gptkbp:requires |
risk assessments
security controls incident response plans |
gptkbp:subject |
gptkb:treaty
regulatory oversight compliance audits cross-border data transfer rules |
gptkbp:bfsParent |
gptkb:Chinese_law
|
gptkbp:bfsLayer |
6
|