|
Article 2
|
The term cyber security information (hereinafter referred to as “the Information”) as used in these Regulations refers to the information in each subparagraph:<br/>1. Malicious detections or collections activity of information and communication system.<br/>2. Security vulnerabilities of information and communication system.<br/>3. The methods that invalidate the information and communication systems security control measure or make use of the security vulnerability.<br/>4. The information relating to malicious programs.<br/>5. The actual damage or possible negative impact caused by cyber security incident.<br/>6. Relevant measures that are taken to detect, prevent from or respond to the circumstances under the preceding five subparagraphs or to mitigate the damage.<br/>7. Other information relating to cyber security incidents.
|