Document from CIS Legislation database © 2003-2022 SojuzPravoInform LLC

LAW OF THE REPUBLIC OF UZBEKISTAN

of April 15, 2022 No. ZRU-764

About cyber security

Accepted by Legislative house on February 25, 2022

Approved by the Senate on March 17, 2022

Chapter 1. General provisions

Article 1. Purpose of this Law

The purpose of this Law is regulation of the relations in the field of cyber security.

Article 2. Legislation on cyber security

The legislation on cyber security consists of this Law and other acts of the legislation.

Ensuring cyber security of system of investigation and search operations on networks of telecommunication and communication channels is performed according to the procedure, established by separate acts of the legislation.

If the international treaty of the Republic of Uzbekistan establishes other rules, than those which are stipulated by the legislation the Republic of Uzbekistan about cyber security then are applied rules of the international treaty.

Article 3. Basic concepts

In this Law the following basic concepts are applied:

object of informatization - information systems of different level and appointment, network of telecommunications, technical means of information processing, the room where are established and are operated these means;

cybercrime - cumulative offenses, performed in cyberspace with use of the software and technical means, for the purpose of occupancy by information, its changes, destruction or breaking of information systems and resources;

cyberspace - the virtual environment created by means of information technologies;

cyberthreat - complex of the conditions and factors in cyberspace posing threat to interests of the personality, society and state;

cyber security - condition of security of interests of the personality, society and state from external and internal threats in cyberspace;

cyber security incident - the event in cyberspace which led to failures in work of information systems and (or) violations of availability of information in them, integrity and its free use;

cyber security object - complex of the information systems used in activities for ensuring cyberinformation security and cyber security of national information systems and resources including objects of critical information infrastructure;

the subject of cyber security - the legal entity or the individual entrepreneur having the certain rights and obligations connected with ownership, use and the order of national information resource and rendering information electronic services on their use, information security and cyber security including subjects of critical information infrastructure;

cyberprotection - complex of legal, organizational, financial and economic, technical measures, and also the measures of cryptographic and technical data protection directed to prevention of incidents of cyber security, identification of cyber attacks and protection against them, elimination of effects of cyber attacks, recovery of stability and reliability of activities of telecommunication networks, information systems and resources;

cyber attack - the action posing cyber security threat, intentionally performed in cyberspace with use of equipment rooms, hardware-software and software;

critical information infrastructure - complex of automated control systems, information systems and resources of the networks and engineering procedures having important strategic and social and economic importance;

Warning!!!

This is not a full text of document! Document shown in Demo mode!

If you have active License, please Login, or get License for Full Access.

With Full access you can get: full text of document, original text of document in Russian, attachments (if exist) and see History and Statistics of your work.

Get License for Full Access Now

Disclaimer! This text was translated by AI translator and is not a valid juridical document. No warranty. No claim. More info

Effectively work with search system

Database include more 50000 documents. You can find needed documents using search system. For effective work you can mix any on documents parameters: country, documents type, date range, teams or tags.
More about search system

Get help

If you cannot find the required document, or you do not know where to begin, go to Help section.

In this section, we’ve tried to describe in detail the features and capabilities of the system, as well as the most effective techniques for working with the database.

You also may open the section Frequently asked questions. This section provides answers to questions set by users.

Search engine created by SojuzPravoInform LLC. UI/UX design by Intelliants.