{"id":4913,"date":"2017-01-10T10:38:46","date_gmt":"2017-01-10T10:38:46","guid":{"rendered":"http:\/\/internetpolicy.kg\/?p=4913\/"},"modified":"2019-04-13T14:46:36","modified_gmt":"2019-04-13T14:46:36","slug":"obzor-zakonodatelstva-respubliki-k-2","status":"publish","type":"post","link":"https:\/\/internetpolicy.kg\/en\/2017\/01\/10\/obzor-zakonodatelstva-respubliki-k-2\/","title":{"rendered":"Review of Kyrgyz legislation in the field of information security"},"content":{"rendered":"<p>Taking into account the active development of information and communication technologies and the growing use of the Internet, the need to ensure security in the information environment and protect the information infrastructure, which requires a wide range of measures in the field of communication networks and their information security, and the fight against cyber crime, becomes especially acute.<\/p>\n<p>Rapid response and effective countering of cybercrime requires the creation of special units in law enforcement agencies and the development of a network of response centers for computer incidents and the organization of their interaction with these units.<\/p>\n<p>Until 2001, the legislation of the Kyrgyz Republic did not define the concept of security, and only with the adoption of the National Security Concept of the Kyrgyz Republic did the normative definition of this concept appear.<\/p>\n<p>CIIP has prepared an overview of the legislation of the Republic of Kyrgyzstan in the field of information security. This review contains the following topics:<\/p>\n<p>Part 1: Overview<br \/>\nPart 2: Personal data, personal and family secrets<br \/>\nPart 3: State Secrets<br \/>\nPart 4: Trade Secret<br \/>\nPart 5: Other Types of Secrets<br \/>\nPart 6: Cryptography and technical protection of information<br \/>\nPart 7: Electronic Intelligence<br \/>\nPart 8: Fighting Cybercrime<\/p>\n<p>Full review can be downloaded <a href=\"https:\/\/internetpolicy.kg\/wp-content\/uploads\/2018\/01\/\u041e\u0431\u0437\u043e\u0440-\u0437\u0430\u043a\u043e\u043d\u043e\u0434\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430-\u0420\u0435\u0441\u043f\u0443\u0431\u043b\u0438\u043a\u0438-\u041a\u044b\u0440\u0433\u044b\u0437\u0441\u0442\u0430\u043d-\u0432-\u0441\u0444\u0435\u0440\u0435-\u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439-\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.pdf\">here<\/a>.<\/p>\n<h1><\/h1>\n","protected":false},"excerpt":{"rendered":"<p>Taking into account the active development of information and communication technologies and the growing use of the Internet, the need to ensure security in the information environment and protect the information infrastructure, which requires a wide range of measures in the field of communication networks and their information security, and the fight against cyber crime, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4915,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[],"class_list":["post-4913","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analytics-en"],"_links":{"self":[{"href":"https:\/\/internetpolicy.kg\/en\/wp-json\/wp\/v2\/posts\/4913"}],"collection":[{"href":"https:\/\/internetpolicy.kg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/internetpolicy.kg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/internetpolicy.kg\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/internetpolicy.kg\/en\/wp-json\/wp\/v2\/comments?post=4913"}],"version-history":[{"count":4,"href":"https:\/\/internetpolicy.kg\/en\/wp-json\/wp\/v2\/posts\/4913\/revisions"}],"predecessor-version":[{"id":5630,"href":"https:\/\/internetpolicy.kg\/en\/wp-json\/wp\/v2\/posts\/4913\/revisions\/5630"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/internetpolicy.kg\/en\/wp-json\/wp\/v2\/media\/4915"}],"wp:attachment":[{"href":"https:\/\/internetpolicy.kg\/en\/wp-json\/wp\/v2\/media?parent=4913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/internetpolicy.kg\/en\/wp-json\/wp\/v2\/categories?post=4913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/internetpolicy.kg\/en\/wp-json\/wp\/v2\/tags?post=4913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}