{"id":62819,"date":"2024-03-22T15:48:25","date_gmt":"2024-03-22T06:48:25","guid":{"rendered":"https:\/\/monolith.law\/cs\/?p=62819"},"modified":"2024-03-31T11:52:18","modified_gmt":"2024-03-31T02:52:18","slug":"china-cyber-security-law","status":"publish","type":"post","link":"https:\/\/monolith.law\/cs\/general-corporate\/china-cyber-security-law","title":{"rendered":"Co je \u010d\u00ednsk\u00fd z\u00e1kon o kybernetick\u00e9 bezpe\u010dnosti? Vysv\u011btlen\u00ed kl\u00ed\u010dov\u00fdch bod\u016f pro jeho dodr\u017eov\u00e1n\u00ed"},"content":{"rendered":"\n<p>Podle speci\u00e1ln\u00edho pr\u016fzkumu &#8220;<a href=\"https:\/\/www.tdb.co.jp\/report\/watching\/press\/p220705.html\" target=\"_blank\" rel=\"noreferrer noopener\">Trendy vstupu japonsk\u00fdch firem do \u010c\u00edny (2022)[ja]<\/a>&#8221; od Japonsk\u00e9 c\u00edsa\u0159sk\u00e9 datov\u00e9 banky (Teikoku Databank) je po\u010det japonsk\u00fdch firem p\u016fsob\u00edc\u00edch v \u010c\u00edn\u011b 12 706. Po\u010det firem, kter\u00e9 se zab\u00fdvaj\u00ed \u010d\u00ednsk\u00fdm byznysem, je pravd\u011bpodobn\u011b je\u0161t\u011b vy\u0161\u0161\u00ed. V \u010c\u00edn\u011b byl v roce 2017 zaveden &#8220;\u010c\u00ednsk\u00fd z\u00e1kon o kybernetick\u00e9 bezpe\u010dnosti&#8221;.<\/p>\n\n\n\n<p>V d\u016fsledku toho se firmy rozv\u00edjej\u00edc\u00ed sv\u016fj byznys v \u010c\u00edn\u011b musely p\u0159izp\u016fsobit nov\u00fdm pr\u00e1vn\u00edm p\u0159edpis\u016fm a implementovat technick\u00e1 ochrann\u00e1 opat\u0159en\u00ed. Mo\u017en\u00e1 se ale najdou ti, kte\u0159\u00ed nejsou jist\u00ed, co tento z\u00e1kon p\u0159esn\u011b znamen\u00e1, nebo jak by m\u011bli postupovat.<\/p>\n\n\n\n<p>V tomto \u010dl\u00e1nku proto vysv\u011btl\u00edme z\u00e1kladn\u00ed informace o \u010c\u00ednsk\u00e9m z\u00e1konu o kybernetick\u00e9 bezpe\u010dnosti, jeho regula\u010dn\u00edm r\u00e1mci a opat\u0159en\u00edch, kter\u00e1 byste m\u011bli zv\u00e1\u017eit. Pokud ji\u017e podnik\u00e1te v \u010c\u00edn\u011b nebo o tom uva\u017eujete, ur\u010dit\u011b si tento \u010dl\u00e1nek p\u0159e\u010dt\u011bte.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_53 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/monolith.law\/cs\/general-corporate\/china-cyber-security-law\/#Prehled_cinskeho_zakona_o_kyberneticke_bezpecnosti\" title=\"P\u0159ehled \u010d\u00ednsk\u00e9ho z\u00e1kona o kybernetick\u00e9 bezpe\u010dnosti\">P\u0159ehled \u010d\u00ednsk\u00e9ho z\u00e1kona o kybernetick\u00e9 bezpe\u010dnosti<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/monolith.law\/cs\/general-corporate\/china-cyber-security-law\/#Regulace_cilu_cinskeho_zakona_o_kyberneticke_bezpecnosti\" title=\"Regulace c\u00edl\u016f \u010d\u00ednsk\u00e9ho z\u00e1kona o kybernetick\u00e9 bezpe\u010dnosti\">Regulace c\u00edl\u016f \u010d\u00ednsk\u00e9ho z\u00e1kona o kybernetick\u00e9 bezpe\u010dnosti<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/monolith.law\/cs\/general-corporate\/china-cyber-security-law\/#Obsah_cinskeho_zakona_o_kyberneticke_bezpecnosti\" title=\"Obsah \u010d\u00ednsk\u00e9ho z\u00e1kona o kybernetick\u00e9 bezpe\u010dnosti\">Obsah \u010d\u00ednsk\u00e9ho z\u00e1kona o kybernetick\u00e9 bezpe\u010dnosti<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/monolith.law\/cs\/general-corporate\/china-cyber-security-law\/#Zavedeni_urovni_kyberneticke_bezpecnosti\" title=\"Zaveden\u00ed \u00farovn\u00ed kybernetick\u00e9 bezpe\u010dnosti\">Zaveden\u00ed \u00farovn\u00ed kybernetick\u00e9 bezpe\u010dnosti<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/monolith.law\/cs\/general-corporate\/china-cyber-security-law\/#Dodrzovani_povinnych_statnich_norem\" title=\"Dodr\u017eov\u00e1n\u00ed povinn\u00fdch st\u00e1tn\u00edch norem\">Dodr\u017eov\u00e1n\u00ed povinn\u00fdch st\u00e1tn\u00edch norem<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/monolith.law\/cs\/general-corporate\/china-cyber-security-law\/#Pozaduje_se_registrace_pod_skutecnym_jmenem\" title=\"Po\u017eaduje se registrace pod skute\u010dn\u00fdm jm\u00e9nem\">Po\u017eaduje se registrace pod skute\u010dn\u00fdm jm\u00e9nem<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/monolith.law\/cs\/general-corporate\/china-cyber-security-law\/#Povinnosti_provozovatelu_klicovych_informacnich_infrastruktur\" title=\"Povinnosti provozovatel\u016f kl\u00ed\u010dov\u00fdch informa\u010dn\u00edch infrastruktur\">Povinnosti provozovatel\u016f kl\u00ed\u010dov\u00fdch informa\u010dn\u00edch infrastruktur<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/monolith.law\/cs\/general-corporate\/china-cyber-security-law\/#Vytvoreni_systemu_rizeni_a_reakce\" title=\"Vytvo\u0159en\u00ed syst\u00e9mu \u0159\u00edzen\u00ed a reakce\">Vytvo\u0159en\u00ed syst\u00e9mu \u0159\u00edzen\u00ed a reakce<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/monolith.law\/cs\/general-corporate\/china-cyber-security-law\/#Ustanoveni_v_pripade_poruseni_zakona_o_kyberneticke_bezpecnosti\" title=\"Ustanoven\u00ed v p\u0159\u00edpad\u011b poru\u0161en\u00ed z\u00e1kona o kybernetick\u00e9 bezpe\u010dnosti\">Ustanoven\u00ed v p\u0159\u00edpad\u011b poru\u0161en\u00ed z\u00e1kona o kybernetick\u00e9 bezpe\u010dnosti<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/monolith.law\/cs\/general-corporate\/china-cyber-security-law\/#Opatreni_proti_kyberneticke_bezpecnosti_ktera_by_japonske_firmy_mely_prijmout\" title=\"Opat\u0159en\u00ed proti kybernetick\u00e9 bezpe\u010dnosti, kter\u00e1 by japonsk\u00e9 firmy m\u011bly p\u0159ijmout\">Opat\u0159en\u00ed proti kybernetick\u00e9 bezpe\u010dnosti, kter\u00e1 by japonsk\u00e9 firmy m\u011bly p\u0159ijmout<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/monolith.law\/cs\/general-corporate\/china-cyber-security-law\/#Vytvoreni_koordinovaneho_systemu_spoluprace_s_oddelenim_informacnich_systemu_a_oddelenim_pro_digitalni_transformaci_DX\" title=\"Vytvo\u0159en\u00ed koordinovan\u00e9ho syst\u00e9mu spolupr\u00e1ce s odd\u011blen\u00edm informa\u010dn\u00edch syst\u00e9m\u016f a odd\u011blen\u00edm pro digit\u00e1ln\u00ed transformaci (DX)\">Vytvo\u0159en\u00ed koordinovan\u00e9ho syst\u00e9mu spolupr\u00e1ce s odd\u011blen\u00edm informa\u010dn\u00edch syst\u00e9m\u016f a odd\u011blen\u00edm pro digit\u00e1ln\u00ed transformaci (DX)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/monolith.law\/cs\/general-corporate\/china-cyber-security-law\/#Urceni_urovne_ochrany_ktere_odpovidaji_systemy_ve_vlastnictvi_spolecnosti\" title=\"Ur\u010den\u00ed \u00farovn\u011b ochrany, kter\u00e9 odpov\u00eddaj\u00ed syst\u00e9my ve vlastnictv\u00ed spole\u010dnosti\">Ur\u010den\u00ed \u00farovn\u011b ochrany, kter\u00e9 odpov\u00eddaj\u00ed syst\u00e9my ve vlastnictv\u00ed spole\u010dnosti<\/a><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/monolith.law\/cs\/general-corporate\/china-cyber-security-law\/#Pravni_administrativni_a_oddeleni_pro_rizeni_rizik\" title=\"Pr\u00e1vn\u00ed, administrativn\u00ed a odd\u011blen\u00ed pro \u0159\u00edzen\u00ed rizik\">Pr\u00e1vn\u00ed, administrativn\u00ed a odd\u011blen\u00ed pro \u0159\u00edzen\u00ed rizik<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/monolith.law\/cs\/general-corporate\/china-cyber-security-law\/#Oddeleni_informacnich_systemu_a_DX\" title=\"Odd\u011blen\u00ed informa\u010dn\u00edch syst\u00e9m\u016f a DX\">Odd\u011blen\u00ed informa\u010dn\u00edch syst\u00e9m\u016f a DX<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/monolith.law\/cs\/general-corporate\/china-cyber-security-law\/#Shrnuti_Pokud_mate_problemy_s_internimi_opatrenimi_poradte_se_s_odborniky\" title=\"Shrnut\u00ed: Pokud m\u00e1te probl\u00e9my s intern\u00edmi opat\u0159en\u00edmi, pora\u010fte se s odborn\u00edky\">Shrnut\u00ed: Pokud m\u00e1te probl\u00e9my s intern\u00edmi opat\u0159en\u00edmi, pora\u010fte se s odborn\u00edky<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/monolith.law\/cs\/general-corporate\/china-cyber-security-law\/#Predstaveni_opatreni_nasi_kancelare\" title=\"P\u0159edstaven\u00ed opat\u0159en\u00ed na\u0161\u00ed kancel\u00e1\u0159e\">P\u0159edstaven\u00ed opat\u0159en\u00ed na\u0161\u00ed kancel\u00e1\u0159e<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Prehled_cinskeho_zakona_o_kyberneticke_bezpecnosti\"><\/span>P\u0159ehled \u010d\u00ednsk\u00e9ho z\u00e1kona o kybernetick\u00e9 bezpe\u010dnosti<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/Monolith.law\/wp-content\/uploads\/2024\/01\/woman.jpg\" alt=\"\u017dena poskytuj\u00edc\u00ed informace\" class=\"wp-image-63921\" \/><\/figure>\n\n\n\n<p>\u010c\u00ednsk\u00fd z\u00e1kon o kybernetick\u00e9 bezpe\u010dnosti (\u7f51\u7edc\u5b89\u5168\u6cd5), kter\u00fd byl implementov\u00e1n v \u010dervnu 2017 (2017\u5e746\u6708), stanovuje pr\u00e1vn\u00ed r\u00e1mec v \u010c\u00edn\u011b. C\u00edle z\u00e1kona jsou v prvn\u00edm \u010dl\u00e1nku pops\u00e1ny n\u00e1sledovn\u011b:<\/p>\n\n\n\n<ul>\n<li>Zaji\u0161t\u011bn\u00ed bezpe\u010dnosti s\u00edt\u00ed<\/li>\n\n\n\n<li>Ochrana kybernetick\u00e9 suverenity, n\u00e1rodn\u00ed bezpe\u010dnosti a ve\u0159ejn\u00e9ho z\u00e1jmu<\/li>\n\n\n\n<li>Ochrana legitimn\u00edch pr\u00e1v a z\u00e1jm\u016f ob\u010dan\u016f, pr\u00e1vnick\u00fdch osob a dal\u0161\u00edch organizac\u00ed<\/li>\n\n\n\n<li>Podpora rozvoje informatizace ekonomiky a spole\u010dnosti<\/li>\n<\/ul>\n\n\n\n<p>Term\u00edn &#8220;s\u00ed\u0165&#8221; je definov\u00e1n jako &#8220;syst\u00e9m slo\u017een\u00fd z po\u010d\u00edta\u010d\u016f, jin\u00fdch informa\u010dn\u00edch termin\u00e1l\u016f a p\u0159\u00edslu\u0161n\u00fdch za\u0159\u00edzen\u00ed, kter\u00fd podle ur\u010dit\u00fdch pravidel a program\u016f shroma\u017e\u010fuje, ukl\u00e1d\u00e1, p\u0159en\u00e1\u0161\u00ed, vym\u011b\u0148uje a zpracov\u00e1v\u00e1 informace (\u010dl\u00e1nek 76)&#8221;, co\u017e zahrnuje nejen internet, ale i intranety.<\/p>\n\n\n\n<p>\u010c\u00ednsk\u00fd z\u00e1kon o kybernetick\u00e9 bezpe\u010dnosti se li\u0161\u00ed od Obecn\u00e9ho na\u0159\u00edzen\u00ed o ochran\u011b osobn\u00edch \u00fadaj\u016f EU (GDPR) a Japonsk\u00e9ho z\u00e1kona o ochran\u011b osobn\u00edch \u00fadaj\u016f t\u00edm, \u017ee nechr\u00e1n\u00ed pouze informace jednotlivc\u016f a organizac\u00ed, ale tak\u00e9 zabezpe\u010duje ochranu n\u00e1rodn\u00ed bezpe\u010dnosti a ve\u0159ejn\u00e9ho z\u00e1jmu \u010c\u00edny. Z\u00e1kon stanovuje povinnosti pro dot\u010den\u00e9 podniky, v\u010detn\u011b implementace syst\u00e9mu kybernetick\u00e9 bezpe\u010dnosti, dodr\u017eov\u00e1n\u00ed compliance a z\u0159eteln\u00e9 definice pr\u00e1v a povinnost\u00ed.<\/p>\n\n\n\n<p>Krom\u011b tohoto z\u00e1kona existuj\u00ed v \u010c\u00edn\u011b i dal\u0161\u00ed pr\u00e1vn\u00ed p\u0159edpisy t\u00fdkaj\u00edc\u00ed se bezpe\u010dnosti, jako je \u010c\u00ednsk\u00fd z\u00e1kon o datov\u00e9 bezpe\u010dnosti.<\/p>\n\n\n\n<p>Souvisej\u00edc\u00ed \u010dl\u00e1nek: <a href=\"https:\/\/monolith.law\/corporate\/china-data-security-law\" target=\"_blank\" rel=\"noreferrer noopener\">Co je \u010d\u00ednsk\u00fd z\u00e1kon o datov\u00e9 bezpe\u010dnosti? Vysv\u011btlen\u00ed opat\u0159en\u00ed, kter\u00e1 by m\u011bly japonsk\u00e9 spole\u010dnosti p\u0159ijmout[ja]<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Regulace_cilu_cinskeho_zakona_o_kyberneticke_bezpecnosti\"><\/span>Regulace c\u00edl\u016f \u010d\u00ednsk\u00e9ho z\u00e1kona o kybernetick\u00e9 bezpe\u010dnosti<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2024\/01\/rule.jpg\" alt=\"Pravidla\" class=\"wp-image-63923\" \/><\/figure>\n\n\n\n<p>Japonsk\u00e9 spole\u010dnosti se stanou p\u0159edm\u011btem \u010d\u00ednsk\u00e9ho z\u00e1kona o kybernetick\u00e9 bezpe\u010dnosti v n\u00e1sleduj\u00edc\u00edch p\u0159\u00edpadech:<\/p>\n\n\n\n<ul>\n<li>Manipulace s informacemi prob\u00edh\u00e1 uvnit\u0159 \u010c\u00edny<\/li>\n\n\n\n<li>P\u0159enos informac\u00ed z \u010c\u00edny do Japonska<\/li>\n<\/ul>\n\n\n\n<p>I kdy\u017e je s\u00eddlo spole\u010dnosti v Japonsku, pokud dojde k situac\u00edm uveden\u00fdm v\u00fd\u0161e, st\u00e1v\u00e1 se spole\u010dnost p\u0159edm\u011btem tohoto z\u00e1kona. Mezi subjekty, na kter\u00e9 se vztahuje regulace, pat\u0159\u00ed &#8220;provozovatel\u00e9 s\u00edt\u00ed&#8221; a &#8220;provozovatel\u00e9 kritick\u00e9 informa\u010dn\u00ed infrastruktury&#8221;.<\/p>\n\n\n\n<p>Provozovatel s\u00edt\u011b je vlastn\u00edk nebo spr\u00e1vce s\u00edt\u011b, kter\u00fd poskytuje s\u00ed\u0165ov\u00e9 slu\u017eby.<\/p>\n\n\n\n<p>Provozovatel kritick\u00e9 informa\u010dn\u00ed infrastruktury je subjekt, kter\u00fd provozuje za\u0159\u00edzen\u00ed v oblastech, kde by po\u0161kozen\u00ed mohlo ohrozit n\u00e1rodn\u00ed bezpe\u010dnost (nap\u0159\u00edklad v energetice, doprav\u011b, financ\u00edch, ve\u0159ejn\u00fdch slu\u017eb\u00e1ch atd.), a kde by po\u0161kozen\u00ed nebo \u00fanik dat mohl zna\u010dn\u011b po\u0161kodit n\u00e1rodn\u00ed bezpe\u010dnost, \u017eivot ob\u010dan\u016f nebo ve\u0159ejn\u00fd z\u00e1jem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Obsah_cinskeho_zakona_o_kyberneticke_bezpecnosti\"><\/span>Obsah \u010d\u00ednsk\u00e9ho z\u00e1kona o kybernetick\u00e9 bezpe\u010dnosti<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2024\/01\/woman2.jpg\" alt=\"Fotografie \u017eeny\" class=\"wp-image-63924\" \/><\/figure>\n\n\n\n<p>\u010c\u00ednsk\u00fd z\u00e1kon o kybernetick\u00e9 bezpe\u010dnosti stanovuje n\u00e1sleduj\u00edc\u00ed povinnosti:<\/p>\n\n\n\n<ul>\n<li>Zaveden\u00ed \u00farovn\u00ed kybernetick\u00e9 bezpe\u010dnosti<\/li>\n\n\n\n<li>Soulad s povinn\u00fdmi n\u00e1rodn\u00edmi standardy<\/li>\n\n\n\n<li>Po\u017eadavek na registraci pod skute\u010dn\u00fdm jm\u00e9nem<\/li>\n\n\n\n<li>Povinnosti provozovatel\u016f d\u016fle\u017eit\u00e9 informa\u010dn\u00ed infrastruktury<\/li>\n\n\n\n<li>Vytvo\u0159en\u00ed syst\u00e9mu spr\u00e1vy a reakce<\/li>\n<\/ul>\n\n\n\n<p>Zde podrobn\u011b vysv\u011btl\u00edme jednotliv\u00e9 body.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Zavedeni_urovni_kyberneticke_bezpecnosti\"><\/span>Zaveden\u00ed \u00farovn\u00ed kybernetick\u00e9 bezpe\u010dnosti<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>V \u010dl\u00e1nku 21 \u010c\u00ednsk\u00e9ho z\u00e1kona o kybernetick\u00e9 bezpe\u010dnosti (Chinese Cybersecurity Law) je stanoven syst\u00e9m ochrany podle \u00farovn\u00ed, kter\u00fd mus\u00ed dodr\u017eovat provozovatel\u00e9 s\u00edt\u00ed, a podniky \u010di organizace vlastn\u00edc\u00ed s\u00edt\u011b v \u010c\u00edn\u011b jsou povinny z\u00edskat certifikaci ochrany podle \u00farovn\u00ed.<\/p>\n\n\n\n<p>Syst\u00e9m ochrany podle \u00farovn\u00ed je ve\u0159ejn\u00fd hodnot\u00edc\u00ed syst\u00e9m pro spr\u00e1vu bezpe\u010dnosti s\u00edt\u011b. Mezi oblasti, kter\u00e9 spadaj\u00ed do tohoto syst\u00e9mu, pat\u0159\u00ed:<\/p>\n\n\n\n<ul>\n<li>Infrastruktura s\u00edt\u011b<\/li>\n\n\n\n<li>IoT (Internet v\u011bc\u00ed)<\/li>\n\n\n\n<li>Pr\u016fmyslov\u00e9 \u0159\u00eddic\u00ed syst\u00e9my<\/li>\n\n\n\n<li>Rozs\u00e1hl\u00e9 internetov\u00e9 str\u00e1nky a datov\u00e1 centra<\/li>\n\n\n\n<li>Platformy ve\u0159ejn\u00fdch slu\u017eeb<\/li>\n<\/ul>\n\n\n\n<p>V syst\u00e9mu ochrany podle \u00farovn\u00ed jsou informa\u010dn\u00ed syst\u00e9my klasifikov\u00e1ny do p\u011bti \u00farovn\u00ed na z\u00e1klad\u011b rozsahu a velikosti \u0161kody, kter\u00e1 by mohla vzniknout v p\u0159\u00edpad\u011b jejich po\u0161kozen\u00ed.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td rowspan=\"2\"><\/td><td colspan=\"3\">Stupe\u0148 \u0161kody zp\u016fsoben\u00e9 subjektu<\/td><\/tr><tr><td>Obecn\u00e1 \u0161koda<\/td><td>V\u00e1\u017en\u00e1 \u0161koda<\/td><td>Zvl\u00e1\u0161t\u011b v\u00e1\u017en\u00e1 \u0161koda<\/td><\/tr><tr><td>Ob\u010dan\u00e9 a pr\u00e1vnick\u00e9 osoby atd.<\/td><td>1. \u00farove\u0148<\/td><td>2. \u00farove\u0148<\/td><td>3. \u00farove\u0148<\/td><\/tr><tr><td>Soci\u00e1ln\u00ed \u0159\u00e1d a ve\u0159ejn\u00fd z\u00e1jem<\/td><td>2. \u00farove\u0148<\/td><td>3. \u00farove\u0148<\/td><td>4. \u00farove\u0148<\/td><\/tr><tr><td>N\u00e1rodn\u00ed bezpe\u010dnost<\/td><td>3. \u00farove\u0148<\/td><td>4. \u00farove\u0148<\/td><td>5. \u00farove\u0148<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Definice jednotliv\u00fdch \u00farovn\u00ed jsou n\u00e1sleduj\u00edc\u00ed:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>\u00darove\u0148<\/td><td>Definice<\/td><\/tr><tr><td>1. \u00farove\u0148<\/td><td>S\u00ed\u0165, jej\u00ed\u017e po\u0161kozen\u00ed by zp\u016fsobilo naru\u0161en\u00ed z\u00e1konn\u00fdch pr\u00e1v a z\u00e1jm\u016f ob\u010dan\u016f, pr\u00e1vnick\u00fdch osob a dal\u0161\u00edch organizac\u00ed, ale neovlivnilo by n\u00e1rodn\u00ed bezpe\u010dnost, soci\u00e1ln\u00ed \u0159\u00e1d ani ve\u0159ejn\u00fd z\u00e1jem<\/td><\/tr><tr><td>2. \u00farove\u0148<\/td><td>S\u00ed\u0165, jej\u00ed\u017e po\u0161kozen\u00ed by zp\u016fsobilo v\u00e1\u017en\u00e9 \u0161kody na z\u00e1konn\u00fdch pr\u00e1vech a z\u00e1jmech ob\u010dan\u016f, pr\u00e1vnick\u00fdch osob a dal\u0161\u00edch organizac\u00ed, nebo by ohrozilo soci\u00e1ln\u00ed \u0159\u00e1d a ve\u0159ejn\u00fd z\u00e1jem, ale neovlivnilo by n\u00e1rodn\u00ed bezpe\u010dnost<\/td><\/tr><tr><td>3. \u00farove\u0148<\/td><td>D\u016fle\u017eit\u00e1 s\u00ed\u0165, jej\u00ed\u017e po\u0161kozen\u00ed by zp\u016fsobilo velmi v\u00e1\u017en\u00e9 \u0161kody na z\u00e1konn\u00fdch pr\u00e1vech a z\u00e1jmech ob\u010dan\u016f, pr\u00e1vnick\u00fdch osob a dal\u0161\u00edch organizac\u00ed, nebo by ohrozilo n\u00e1rodn\u00ed bezpe\u010dnost<\/td><\/tr><tr><td>4. \u00farove\u0148<\/td><td>Zvl\u00e1\u0161t\u011b d\u016fle\u017eit\u00e1 s\u00ed\u0165, jej\u00ed\u017e po\u0161kozen\u00ed by v\u00fdrazn\u011b naru\u0161ilo soci\u00e1ln\u00ed \u0159\u00e1d a ve\u0159ejn\u00fd z\u00e1jem, nebo by zp\u016fsobilo velmi v\u00e1\u017en\u00e9 \u0161kody na n\u00e1rodn\u00ed bezpe\u010dnosti<\/td><\/tr><tr><td>5. \u00farove\u0148<\/td><td>Extr\u00e9mn\u011b d\u016fle\u017eit\u00e1 s\u00ed\u0165, jej\u00ed\u017e po\u0161kozen\u00ed by zp\u016fsobilo velmi v\u00e1\u017en\u00e9 \u0161kody na n\u00e1rodn\u00ed bezpe\u010dnosti<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Pro ka\u017edou \u00farove\u0148 jsou stanoveny standardy informa\u010dn\u00ed bezpe\u010dnosti, kter\u00e9 je nutn\u00e9 dodr\u017eovat. Provozovatel\u00e9 s\u00edt\u00ed obvykle mus\u00ed spl\u0148ovat po\u017eadavky 2. \u00farovn\u011b a vy\u0161\u0161\u00ed, zat\u00edmco provozovatel\u00e9 kritick\u00e9 informa\u010dn\u00ed infrastruktury mus\u00ed spl\u0148ovat po\u017eadavky 3. \u00farovn\u011b a vy\u0161\u0161\u00ed.<\/p>\n\n\n\n<p>Pro z\u00edsk\u00e1n\u00ed \u00farovn\u011b je nutn\u00e9 podat samostatnou \u017e\u00e1dost \u00fa\u0159ad\u016fm, ale kone\u010dn\u00fd souhlas mus\u00ed b\u00fdt z\u00edsk\u00e1n od ministerstva ve\u0159ejn\u00e9 bezpe\u010dnosti. Syst\u00e9m ochrany podle \u00farovn\u00ed tak\u00e9 vy\u017eaduje, aby subjekty s 2. \u00farovn\u00ed a vy\u0161\u0161\u00ed byly hodnoceny hodnot\u00edc\u00ed agenturou. Je t\u0159eba b\u00fdt opatrn\u00fd, proto\u017ee poru\u0161en\u00ed syst\u00e9mu ochrany podle \u00farovn\u00ed m\u016f\u017ee v\u00e9st k ulo\u017een\u00ed pokuty.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Dodrzovani_povinnych_statnich_norem\"><\/span>Dodr\u017eov\u00e1n\u00ed povinn\u00fdch st\u00e1tn\u00edch norem<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Poskytovatel\u00e9 internetov\u00fdch produkt\u016f a slu\u017eeb mus\u00ed zajistit, aby jejich slu\u017eby byly v souladu s povinn\u00fdmi st\u00e1tn\u00edmi normami (\u010dl\u00e1nek 22). Poskytovatel\u00e9 nesm\u00ed instalovat \u0161kodliv\u00e9 programy.<\/p>\n\n\n\n<p>Krom\u011b toho, pokud poskytovatel\u00e9 objev\u00ed v produktech nebo slu\u017eb\u00e1ch jak\u00e9koli vady, zranitelnosti nebo jin\u00e1 rizika, mus\u00ed okam\u017eit\u011b p\u0159ijmout opat\u0159en\u00ed, informovat u\u017eivatele a nahl\u00e1sit situaci p\u0159\u00edslu\u0161n\u00fdm regula\u010dn\u00edm \u00fa\u0159ad\u016fm.<\/p>\n\n\n\n<p>V z\u00e1\u0159\u00ed 2021 (Gregori\u00e1nsk\u00fd kalend\u00e1\u0159n\u00ed rok) byly zavedeny &#8220;P\u0159edpisy pro spr\u00e1vu zranitelnost\u00ed bezpe\u010dnosti internetov\u00fdch produkt\u016f (\u7f51\u7edc\u4ea7\u54c1\u5b89\u5168\u6f0f\u6d1e\u7ba1\u7406\u89c4\u5b9a)&#8221;, kter\u00e9 se t\u00fdkaj\u00ed provozovatel\u016f s\u00edt\u00ed, tak\u017ee je d\u016fle\u017eit\u00e9 se tak\u00e9 t\u011bmito p\u0159edpisy \u0159\u00eddit a p\u0159izp\u016fsobit jim.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Pozaduje_se_registrace_pod_skutecnym_jmenem\"><\/span>Po\u017eaduje se registrace pod skute\u010dn\u00fdm jm\u00e9nem<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>P\u0159i poskytov\u00e1n\u00ed slu\u017eeb, jako jsou s\u00ed\u0165ov\u00e9 p\u0159ipojovac\u00ed slu\u017eby, postupy pro p\u0159ipojen\u00ed k pevn\u00fdm a mobiln\u00edm telefonn\u00edm s\u00edt\u00edm, slu\u017eby sd\u00edlen\u00ed informac\u00ed nebo instant messaging slu\u017eby, je vy\u017eadov\u00e1no, aby u\u017eivatel\u00e9 byli registrov\u00e1ni pod sv\u00fdm skute\u010dn\u00fdm jm\u00e9nem. Pokud u\u017eivatel\u00e9 neprovedou registraci pod skute\u010dn\u00fdm jm\u00e9nem, nesm\u00ed se jim tyto slu\u017eby poskytovat.<\/p>\n\n\n\n<p>D\u00e1le maj\u00ed provozovatel\u00e9 s\u00edt\u00ed povinnost p\u0159ezkoum\u00e1vat, zda informace zve\u0159ej\u0148ovan\u00e9 u\u017eivateli neporu\u0161uj\u00ed z\u00e1kony.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Povinnosti_provozovatelu_klicovych_informacnich_infrastruktur\"><\/span>Povinnosti provozovatel\u016f kl\u00ed\u010dov\u00fdch informa\u010dn\u00edch infrastruktur<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Provozovatel\u00e9 kl\u00ed\u010dov\u00fdch informa\u010dn\u00edch infrastruktur jsou povinni nejen prov\u00e1d\u011bt bezpe\u010dnostn\u00ed opat\u0159en\u00ed ulo\u017een\u00e1 provozovatel\u016fm s\u00edt\u00ed, ale tak\u00e9 je nutn\u00e9 zav\u00e9st n\u00e1sleduj\u00edc\u00ed opat\u0159en\u00ed:<\/p>\n\n\n\n<ul>\n<li>Pravideln\u00e9 z\u00e1lohov\u00e1n\u00ed syst\u00e9m\u016f a datab\u00e1z\u00ed<\/li>\n\n\n\n<li>Vytvo\u0159en\u00ed pl\u00e1nu reakce na bezpe\u010dnostn\u00ed incidenty<\/li>\n\n\n\n<li>Ro\u010dn\u00ed hodnocen\u00ed bezpe\u010dnosti<\/li>\n\n\n\n<li>Lokalizace dat<\/li>\n<\/ul>\n\n\n\n<p class=\"has-small-font-size\">Lokalizace dat: Proces ukl\u00e1d\u00e1n\u00ed a zpracov\u00e1n\u00ed dat v r\u00e1mci hranic zem\u011b, kde byla data vygenerov\u00e1na<\/p>\n\n\n\n<p>V z\u00e1\u0159\u00ed 2021 (z\u00e1\u0159\u00ed roku Reiwa 3) bylo zavedeno &#8220;Na\u0159\u00edzen\u00ed o ochran\u011b bezpe\u010dnosti kl\u00ed\u010dov\u00fdch informa\u010dn\u00edch infrastruktur&#8221;, kter\u00e9 d\u00e1le specifikuje spr\u00e1vu, certifikaci a povinnosti provozovatel\u016f kl\u00ed\u010dov\u00fdch informa\u010dn\u00edch infrastruktur, a proto je tak\u00e9 nutn\u00e9 se na tento dokument odkazovat.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Vytvoreni_systemu_rizeni_a_reakce\"><\/span>Vytvo\u0159en\u00ed syst\u00e9mu \u0159\u00edzen\u00ed a reakce<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Od provozovatel\u016f s\u00edt\u00ed se vy\u017eaduje n\u00e1sleduj\u00edc\u00ed (\u010dl\u00e1nek 21).<\/p>\n\n\n\n<ul>\n<li>Zaveden\u00ed syst\u00e9mu bezpe\u010dnostn\u00edho managementu a provozn\u00edch p\u0159edpis\u016f<\/li>\n\n\n\n<li>Ur\u010den\u00ed odpov\u011bdn\u00e9 osoby za bezpe\u010dnost s\u00edt\u011b<\/li>\n\n\n\n<li>Vytvo\u0159en\u00ed pl\u00e1nu reakce na bezpe\u010dnostn\u00ed incidenty a p\u0159\u00edprava technick\u00fdch opat\u0159en\u00ed<\/li>\n\n\n\n<li>Implementace technologi\u00ed pro monitorov\u00e1n\u00ed s\u00edt\u011b a uchov\u00e1v\u00e1n\u00ed log\u016f (alespo\u0148 6 m\u011bs\u00edc\u016f)<\/li>\n\n\n\n<li>Klasifikace dat a ochrann\u00e1 opat\u0159en\u00ed, jako je z\u00e1lohov\u00e1n\u00ed a \u0161ifrov\u00e1n\u00ed kl\u00ed\u010dov\u00fdch dat<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ustanoveni_v_pripade_poruseni_zakona_o_kyberneticke_bezpecnosti\"><\/span>Ustanoven\u00ed v p\u0159\u00edpad\u011b poru\u0161en\u00ed z\u00e1kona o kybernetick\u00e9 bezpe\u010dnosti<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2024\/01\/caution.jpg\" alt=\"Upozorn\u011bn\u00ed\" class=\"wp-image-63925\" \/><\/figure>\n\n\n\n<p>Pokud dojde k poru\u0161en\u00ed bezpe\u010dnostn\u00edch po\u017eadavk\u016f vy\u017eadovan\u00fdch syst\u00e9mem stup\u0148ov\u00e9 ochrany, budou vyd\u00e1ny p\u0159\u00edkazy k n\u00e1prav\u011b a varov\u00e1n\u00ed. V p\u0159\u00edpad\u011b odm\u00edtnut\u00ed p\u0159\u00edkazu nebo ohro\u017een\u00ed bezpe\u010dnosti s\u00edt\u011b bude ulo\u017eena pokuta ve v\u00fd\u0161i od 10 tis\u00edc j\u00fcan\u016f (CNY) do 100 tis\u00edc j\u00fcan\u016f. Osob\u011b, kter\u00e1 nese p\u0159\u00edmou odpov\u011bdnost, bude ulo\u017eena pokuta od 5 tis\u00edc j\u00fcan\u016f do 50 tis\u00edc j\u00fcan\u016f.<\/p>\n\n\n\n<p>D\u00e1le budou vyd\u00e1ny p\u0159\u00edkazy k n\u00e1prav\u011b a varov\u00e1n\u00ed i v p\u0159\u00edpad\u011b, \u017ee je instalov\u00e1n \u0161kodliv\u00fd program, nebo nejsou p\u0159ijata opat\u0159en\u00ed proti rizik\u016fm, jako jsou vady produkt\u016f nebo slu\u017eeb a bezpe\u010dnostn\u00ed mezery. Pokud jsou tyto p\u0159\u00edkazy odm\u00edtnuty, vznikne povinnost zaplatit pokutu.<\/p>\n\n\n\n<p>V\u00fd\u0161e pokuty se li\u0161\u00ed v z\u00e1vislosti na obsahu poru\u0161en\u00ed a m\u016f\u017ee b\u00fdt na\u0159\u00edzeno uzav\u0159en\u00ed webov\u00fdch str\u00e1nek, zru\u0161en\u00ed obchodn\u00ed licence nebo zastaven\u00ed podnikatelsk\u00e9 \u010dinnosti, proto je t\u0159eba b\u00fdt opatrn\u00fd. V minulosti byly p\u0159\u00edpady, kdy byla za poru\u0161en\u00ed ulo\u017eena pokuta a zodpov\u011bdn\u00e9 osob\u011b byl zak\u00e1z\u00e1n do\u017eivotn\u00ed vstup do stejn\u00e9ho oboru, co\u017e zd\u016fraz\u0148uje, \u017ee opat\u0159en\u00ed pro kybernetickou bezpe\u010dnost jsou nezbytn\u00e1.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Opatreni_proti_kyberneticke_bezpecnosti_ktera_by_japonske_firmy_mely_prijmout\"><\/span>Opat\u0159en\u00ed proti kybernetick\u00e9 bezpe\u010dnosti, kter\u00e1 by japonsk\u00e9 firmy m\u011bly p\u0159ijmout<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/Monolith.law\/wp-content\/uploads\/2024\/01\/man-guiding.jpg\" alt=\"Mu\u017e poskytuj\u00edc\u00ed n\u00e1vod\" class=\"wp-image-63914\" \/><\/figure>\n\n\n\n<p>\u010c\u00ednsk\u00fd z\u00e1kon o kybernetick\u00e9 bezpe\u010dnosti je slo\u017eit\u00fd a n\u011bkte\u0159\u00ed mo\u017en\u00e1 nev\u011bd\u00ed, kde za\u010d\u00edt. V tomto \u010dl\u00e1nku vysv\u011btl\u00edme, jak\u00e1 opat\u0159en\u00ed by japonsk\u00e9 firmy m\u011bly p\u0159ijmout.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Vytvoreni_koordinovaneho_systemu_spoluprace_s_oddelenim_informacnich_systemu_a_oddelenim_pro_digitalni_transformaci_DX\"><\/span>Vytvo\u0159en\u00ed koordinovan\u00e9ho syst\u00e9mu spolupr\u00e1ce s odd\u011blen\u00edm informa\u010dn\u00edch syst\u00e9m\u016f a odd\u011blen\u00edm pro digit\u00e1ln\u00ed transformaci (DX)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Pro zvl\u00e1dnut\u00ed \u010d\u00ednsk\u00e9ho z\u00e1kona o kybernetick\u00e9 bezpe\u010dnosti je nutn\u00e9 vybudovat opera\u010dn\u00ed procesy a vytvo\u0159it nebo doplnit p\u0159edpisy pro spr\u00e1vu osobn\u00edch \u00fadaj\u016f. Krom\u011b toho je nezbytn\u00e9 p\u0159ijmout technick\u00e1 opat\u0159en\u00ed pro vlastn\u00ed syst\u00e9my, aby byly v souladu s syst\u00e9mem ochrany podle \u00farovn\u00ed.<\/p>\n\n\n\n<p>M\u00edsto individu\u00e1ln\u00edho p\u0159\u00edstupu pr\u00e1vn\u00edch a administrativn\u00edch odd\u011blen\u00ed je t\u0159eba vytvo\u0159it koordinovan\u00fd syst\u00e9m spolupr\u00e1ce s odd\u011blen\u00edm informa\u010dn\u00edch syst\u00e9m\u016f a odd\u011blen\u00edm pro digit\u00e1ln\u00ed transformaci (DX).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Urceni_urovne_ochrany_ktere_odpovidaji_systemy_ve_vlastnictvi_spolecnosti\"><\/span>Ur\u010den\u00ed \u00farovn\u011b ochrany, kter\u00e9 odpov\u00eddaj\u00ed syst\u00e9my ve vlastnictv\u00ed spole\u010dnosti<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Nejprve je t\u0159eba ur\u010dit \u00farove\u0148 ochrany vlastn\u00edch syst\u00e9m\u016f. Podle t\u00e9to \u00farovn\u011b je nutn\u00e9, aby ka\u017ed\u00e9 odd\u011blen\u00ed p\u0159ijalo opat\u0159en\u00ed v souladu s kybernetickou bezpe\u010dnost\u00ed. Pr\u00e1vn\u00ed, administrativn\u00ed a odd\u011blen\u00ed pro \u0159\u00edzen\u00ed rizik mus\u00ed p\u0159ehodnotit a p\u0159\u00edpadn\u011b upravit p\u0159edpisy a provozn\u00ed postupy, zat\u00edmco odd\u011blen\u00ed informa\u010dn\u00edch syst\u00e9m\u016f a DX mus\u00ed \u0159e\u0161it technick\u00e9 aspekty. N\u00ed\u017ee vysv\u011btl\u00edme jednotliv\u00e1 opat\u0159en\u00ed.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Pravni_administrativni_a_oddeleni_pro_rizeni_rizik\"><\/span>Pr\u00e1vn\u00ed, administrativn\u00ed a odd\u011blen\u00ed pro \u0159\u00edzen\u00ed rizik<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Porovn\u00e1me polo\u017eky stanoven\u00e9 v \u00farovni ochrany s aktu\u00e1ln\u00edm stavem spr\u00e1vy a informa\u010dn\u00ed bezpe\u010dnostn\u00ed strukturou spole\u010dnosti, p\u0159ezkoum\u00e1me provozn\u00ed syst\u00e9my a p\u0159id\u00e1me p\u0159edpisy. Pot\u00e9 je t\u0159eba zv\u00e1\u017eit, jak\u00fdm zp\u016fsobem reagovat a prov\u00e9st pot\u0159ebn\u00e9 zm\u011bny nebo zaveden\u00ed syst\u00e9m\u016f.<\/p>\n\n\n\n<p>Pokud je \u00farove\u0148 ochrany druh\u00e1 nebo vy\u0161\u0161\u00ed, je nutn\u00e9 tak\u00e9 podat hl\u00e1\u0161en\u00ed p\u0159\u00edslu\u0161n\u00fdm \u00fa\u0159ad\u016fm. Pokud je spole\u010dnost pova\u017eov\u00e1na za provozovatele kritick\u00e9 informa\u010dn\u00ed infrastruktury, vy\u017eaduje se z\u00edsk\u00e1n\u00ed certifikace ochrany na t\u0159et\u00ed nebo vy\u0161\u0161\u00ed \u00farovni. Krom\u011b toho je t\u0159eba se vypo\u0159\u00e1dat s mnoha dal\u0161\u00edmi \u00fakoly, jako je dodr\u017eov\u00e1n\u00ed pravidel pro lokalizaci dat, pravideln\u00e9 \u0161kolen\u00ed zam\u011bstnanc\u016f v oblasti informa\u010dn\u00ed bezpe\u010dnosti a technick\u00e9 tr\u00e9ninky. Pokud existuje mo\u017enost, \u017ee spole\u010dnost spad\u00e1 do kategorie provozovatel\u016f kritick\u00e9 infrastruktury, je dobr\u00e9 se poradit s pr\u00e1vn\u00edm poradcem a stanovit pl\u00e1n reakce.<\/p>\n\n\n\n<p>V posledn\u00edch letech bylo v \u010c\u00edn\u011b zavedeno mnoho bezpe\u010dnostn\u00edch p\u0159edpis\u016f. Odd\u011blen\u00ed pro \u0159\u00edzen\u00ed rizik proto bude muset p\u0159ijmout opat\u0159en\u00ed odpov\u00eddaj\u00edc\u00ed nov\u00fdm regulac\u00edm.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Oddeleni_informacnich_systemu_a_DX\"><\/span>Odd\u011blen\u00ed informa\u010dn\u00edch syst\u00e9m\u016f a DX<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Odd\u011blen\u00ed informa\u010dn\u00edch syst\u00e9m\u016f a DX mus\u00ed zav\u00e9st syst\u00e9my ochrany bezpe\u010dnosti odpov\u00eddaj\u00edc\u00ed stanoven\u00e9 \u00farovni. Nejprve je t\u0159eba zhodnotit st\u00e1vaj\u00edc\u00ed bezpe\u010dnostn\u00ed opat\u0159en\u00ed vlastn\u00edch syst\u00e9m\u016f a v p\u0159\u00edpad\u011b nedostatk\u016f je doplnit o syst\u00e9my odpov\u00eddaj\u00edc\u00ed z\u00e1konu o kybernetick\u00e9 bezpe\u010dnosti.<\/p>\n\n\n\n<p>Krom\u011b z\u00e1kona o kybernetick\u00e9 bezpe\u010dnosti je t\u0159eba se vypo\u0159\u00e1dat tak\u00e9 s regulacemi lokalizace dat, p\u0159eshrani\u010dn\u00edmi omezen\u00edmi a p\u0159\u00edstupem vl\u00e1dy. Je nutn\u00e9 m\u00edt p\u0159ehled o tom, jak\u00e1 data jsou p\u0159en\u00e1\u0161ena mimo \u010c\u00ednu, a p\u0159ehodnotit vlastn\u00ed postupy z\u00edsk\u00e1v\u00e1n\u00ed a ukl\u00e1d\u00e1n\u00ed dat.<\/p>\n\n\n\n<p>Z\u00e1kon o kybernetick\u00e9 bezpe\u010dnosti vy\u017eaduje nejen revizi p\u0159edpis\u016f, ale tak\u00e9 zaveden\u00ed technick\u00fdch ochrann\u00fdch opat\u0159en\u00ed, co\u017e znamen\u00e1, \u017ee koordinace mezi odpov\u00eddaj\u00edc\u00edmi odd\u011blen\u00edmi je nezbytn\u00e1.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Shrnuti_Pokud_mate_problemy_s_internimi_opatrenimi_poradte_se_s_odborniky\"><\/span>Shrnut\u00ed: Pokud m\u00e1te probl\u00e9my s intern\u00edmi opat\u0159en\u00edmi, pora\u010fte se s odborn\u00edky<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2024\/01\/man-and-woman.jpg\" alt=\"Fotografie mu\u017ee a \u017eeny\" class=\"wp-image-63926\" \/><\/figure>\n\n\n\n<p>\u010c\u00ednsk\u00fd z\u00e1kon o kybernetick\u00e9 bezpe\u010dnosti je syst\u00e9m vytvo\u0159en\u00fd za \u00fa\u010delem zaji\u0161t\u011bn\u00ed n\u00e1rodn\u00ed bezpe\u010dnosti \u010c\u00edny. Aby bylo mo\u017en\u00e9 se p\u0159izp\u016fsobit z\u00e1konu o kybernetick\u00e9 bezpe\u010dnosti, je t\u0159eba nejen revidovat p\u0159edpisy pr\u00e1vn\u00edho nebo obecn\u00edho odd\u011blen\u00ed, ale tak\u00e9 prov\u00e1d\u011bt technick\u00e1 ochrann\u00e1 opat\u0159en\u00ed.<\/p>\n\n\n\n<p>Od zaveden\u00ed z\u00e1kona o kybernetick\u00e9 bezpe\u010dnosti byly postupn\u011b zavedeny dal\u0161\u00ed pr\u00e1vn\u00ed p\u0159edpisy t\u00fdkaj\u00edc\u00ed se datov\u00e9ho souladu, jako jsou &#8220;P\u0159edpisy pro spr\u00e1vu zranitelnosti bezpe\u010dnosti internetov\u00fdch produkt\u016f&#8221; nebo &#8220;Metody pro kybernetick\u00e9 bezpe\u010dnostn\u00ed posouzen\u00ed (syst\u00e9m specifikuj\u00edc\u00ed n\u00e1rodn\u00ed bezpe\u010dnostn\u00ed kontroln\u00ed re\u017eim)&#8221;. Poru\u0161en\u00ed t\u011bchto p\u0159edpis\u016f m\u016f\u017ee v\u00e9st k pokut\u00e1m, uzav\u0159en\u00ed webov\u00fdch str\u00e1nek nebo zru\u0161en\u00ed obchodn\u00ed licence, co\u017e vy\u017eaduje zv\u00fd\u0161enou pozornost. Pokud ji\u017e podnik\u00e1te v \u010c\u00edn\u011b nebo to pl\u00e1nujete v budoucnu, doporu\u010dujeme konzultovat s pr\u00e1vn\u00edkem, kter\u00fd je obezn\u00e1men s \u010d\u00ednsk\u00fdm pr\u00e1vem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Predstaveni_opatreni_nasi_kancelare\"><\/span>P\u0159edstaven\u00ed opat\u0159en\u00ed na\u0161\u00ed kancel\u00e1\u0159e<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Advok\u00e1tn\u00ed kancel\u00e1\u0159 Monolith je pr\u00e1vn\u00ed firma specializuj\u00edc\u00ed se na IT, internet a obchodn\u00ed pr\u00e1vo. M\u00e1me zku\u0161enosti s p\u0159\u00edpady z cel\u00e9ho sv\u011bta, v\u010detn\u011b \u010c\u00edny, Spojen\u00fdch st\u00e1t\u016f americk\u00fdch a zem\u00ed Evropsk\u00e9 unie. P\u0159i rozv\u00edjen\u00ed podnik\u00e1n\u00ed v zahrani\u010d\u00ed se \u010dasto setk\u00e1v\u00e1me s mnoha pr\u00e1vn\u00edmi riziky, a proto je podpora od zku\u0161en\u00fdch pr\u00e1vn\u00edk\u016f nezbytn\u00e1. Na\u0161e kancel\u00e1\u0159 m\u00e1 hlubok\u00e9 znalosti m\u00edstn\u00edch z\u00e1kon\u016f a p\u0159edpis\u016f a spolupracuje s pr\u00e1vn\u00edmi kancel\u00e1\u0159emi po cel\u00e9m sv\u011bt\u011b.<\/p>\n\n\n\n<p>Oblasti pr\u00e1ce advok\u00e1tn\u00ed kancel\u00e1\u0159e Monolith: <a href=\"https:\/\/monolith.law\/global-jpn2fgn\" target=\"_blank\" rel=\"noreferrer noopener\">Mezin\u00e1rodn\u00ed pr\u00e1vn\u00ed slu\u017eby a zahrani\u010dn\u00ed podnik\u00e1n\u00ed[ja]<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Podle speci\u00e1ln\u00edho pr\u016fzkumu &#8220;Trendy vstupu japonsk\u00fdch firem do \u010c\u00edny (2022)[ja]&#8221; od Japonsk\u00e9 c\u00edsa\u0159sk\u00e9 datov\u00e9 banky (Teikoku Databank) je po\u010det japonsk\u00fdch firem p\u016fsob\u00edc\u00edch v \u010c\u00edn\u011b 12 706. Po\u010de [&hellip;]<\/p>\n","protected":false},"author":32,"featured_media":64332,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[24,29],"acf":[],"_links":{"self":[{"href":"https:\/\/monolith.law\/cs\/wp-json\/wp\/v2\/posts\/62819"}],"collection":[{"href":"https:\/\/monolith.law\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/monolith.law\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/monolith.law\/cs\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/monolith.law\/cs\/wp-json\/wp\/v2\/comments?post=62819"}],"version-history":[{"count":2,"href":"https:\/\/monolith.law\/cs\/wp-json\/wp\/v2\/posts\/62819\/revisions"}],"predecessor-version":[{"id":64333,"href":"https:\/\/monolith.law\/cs\/wp-json\/wp\/v2\/posts\/62819\/revisions\/64333"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/monolith.law\/cs\/wp-json\/wp\/v2\/media\/64332"}],"wp:attachment":[{"href":"https:\/\/monolith.law\/cs\/wp-json\/wp\/v2\/media?parent=62819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/monolith.law\/cs\/wp-json\/wp\/v2\/categories?post=62819"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/monolith.law\/cs\/wp-json\/wp\/v2\/tags?post=62819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}