• Font Size:
  • S
  • M
  • L

Article NO. Content

Title:

Regulations Governing the Operations of Cyber Security Affairs Handled by Personnel From Government Agencies  CH

Amended Date: 2026.01.13 
Article 19 The following situations qualify for commendation:<br/>1. In accordance with the Act, regulations made under its authority, or internal agency rules, establish, amend, and implement cyber security maintenance plans and achieve outstanding performance.<br/>2. Conduct audits of the implementation of cyber security maintenance plans under Article 15 of the Act, or carries out cyber security exercise operation, achieving outstanding performance.<br/>3. Cooperate with the competent authority and the agencies designated under Article 15 of the Act in auditing the implementation of cyber security maintenance plans, conducting cyber security exer-cise, or in the performance evaluations and commendation procedures for government agency cyber security businesses, achieving outstanding performance after assessment.<br/>4. Carry out cyber security businesses appropriately to prevent cyber security incidents and thereby protect this agency, other agencies, or the public from damage.<br/>5. Proactively identify new types of cyber security vulnerabilities or intrusion threats and share cyber security information to prevent incidents or minimize their damage.<br/>6. Actively monitor for anomalies in cyber security maintenance, promptly detect major cyber security incidents, and carry out reporting and response measures to prevent further spread of damage.<br/>7. Propose concrete improvements or innovative solutions for cyber security businesses that are im-plemented.<br/>8. Manage the training and development of cyber security personnel and make tangible contributions.<br/>9. Carry out R&D, integration, and application of cyber security technologies, including industry-academia collaboration or industry development activities, and make tangible contributions.<br/>10. Develop technical specifications for cyber security hardware and software, related services, and testing/verification mechanisms, etc., and make tangible contributions.<br/>11. Develop cyber security policy, legal analysis, or international cooperation efforts, and make tangi-ble contributions.<br/>12. Cooperated with the competent authority in dispatching support operation, achieving excellent per-formance or making tangible contributions.<br/>13. Develop other cyber security businesses, and make tangible contributions.