Skip to main content
  1. Tags/

Critical-Infrastructure

Sikkerhetsloven

The Norwegian Security Act creates a comprehensive framework for national security. It requires security clearances for personnel accessing classified information and establishes classification levels (RESTRICTED, CONFIDENTIAL, SECRET, TOP SECRET). Organizations handling classified information must implement security measures and undergo security audits. The Act enables the government to impose security requirements on critical infrastructure operators and assess foreign investments for national security risks. It covers information security (protecting classified data), personnel security (vetting individuals), and supply chain security (managing risks in procurement). NSM (Norwegian National Security Authority) oversees implementation, while PST (Police Security Service) handles threat assessments. The law interacts with data protection rules, allowing certain national security exemptions while maintaining proportionality requirements.

Cybersecurity Law

China’s Cybersecurity Law of 2017 establishes foundational requirements for network security. Critical Information Infrastructure Operators (CIIOs) in sectors like telecoms, energy, transport, and finance must localize personal information and ‘important data’ collected in China. Cross-border transfers require government security assessments. Network products and services used by CIIOs must undergo security reviews. The law requires network operators to maintain logs for at least six months and provide technical support to public security organs for investigations. Real-name registration is required for online accounts. The law’s broad definitions and vague language create compliance uncertainty. Combined with the National Intelligence Law, it means Chinese network operators must both assist intelligence work and implement technical capabilities for lawful access.