News: 1758006913

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

China slaps 1-hour deadline on reporting serious cyber incidents

(2025/09/16)


Beijing will soon expect Chinese network operators to 'fess up to serious cyber incidents within an hour of spotting them – or risk penalties for dragging their feet.

China ponders creating a national 'cyberspace ID' [1]READ MORE

From November 1, the Cyberspace Administration of China (CAC) will enforce its new National Cybersecurity Incident Reporting Management Measures, [2]a sweeping set of rules that tighten how quickly incidents must be disclosed.

The rules apply to a broad category of "network operators," which in China effectively means anyone who owns, manages, or provides network services, and mandate that serious incidents be reported to the relevant authorities within 60 minutes – or in the case of "particularly major" events, 30 minutes.

"If it is a major or particularly important network security incident, the protection department shall report to the national cyber information department and the public security department of the State Council as soon as possible after receiving the report, no later than half an hour," the CAC states.

The regulations set out a four-tier system for classifying cyber incidents, but reserve their most challenging demands for the highest "particularly major" tier. An incident that falls within this category includes the loss or theft of core or sensitive data that threatens national security or social stability, a leak of more than 100 million citizens' personal records, or outages that take key government or news websites offline for more than 24 hours.

[3]

The CAC also considers direct economic losses of more than ¥100 million (about £10.3 million) enough to trigger the highest classification.

[4]

[5]

Operators must file their initial report with a laundry list of details: what systems were hit, the timeline of the attack, the type of incident, what damage was done, what steps were taken to contain it, the preliminary cause, vulnerabilities exploited, and even ransom amounts if a shakedown was involved. They also need to include a grim bit of crystal-ball gazing – an assessment of possible future harm, and what government support they need in order to recover.

After the dust settles, a final postmortem must be submitted within 30 days, detailing causes, lessons learned, and where the blame lies.

[6]UK threatens £100K-a-day fines under new cyber bill

[7]UK to ban ransomware payments by public sector organizations

[8]ICO, forgive me – it has been three weeks since I discovered my breach

[9]UK wants dirt on data brokers before criminals get there first

Anyone caught sitting on an incident or trying to brush it under the carpet can expect to face penalties, with both network operators and government suits in the firing line.

"If the network operator reports late, omitted, falsely reported or concealed network security incidents, causing major harmful consequences, the network operator and the relevant responsible persons shall be punished more severely according to law," the CAC warns.

[10]

Beijing's cyber cops have rolled out a bunch of reporting channels – hotline 12387, a website, WeChat, email, and more – making it harder for anyone to plead ignorance when their network catches fire.

Compared to Europe's leisurely 72-hour breach deadline, Beijing's stopwatch will force many organizations to invest in real-time monitoring and compliance teams that can make a go/no-go call in minutes rather than days.

The introduction of these stringent new reporting rules comes just days after [11]Dior's Shanghai arm was fined for transferring customer data to its French headquarters without the legally required security screening, proper customer disclosure, or even encryption. ®

Get our [12]Tech Resources



[1] https://www.theregister.com/2024/07/29/china_cyberspace_id_proposal/

[2] https://www.cac.gov.cn/2025-09/15/c_1759583017717009.htm

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aMk1OxlrlYuXTAN6uT_gLwAAAwg&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aMk1OxlrlYuXTAN6uT_gLwAAAwg&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aMk1OxlrlYuXTAN6uT_gLwAAAwg&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[6] https://www.theregister.com/2025/04/01/uk_100k_fines_csr/

[7] https://www.theregister.com/2025/07/22/uk_to_ban_ransomware_payments/

[8] https://www.theregister.com/2019/03/11/ico_data_breach_report_survey/

[9] https://www.theregister.com/2025/03/18/uk_data_broker_inquiry/

[10] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aMk1OxlrlYuXTAN6uT_gLwAAAwg&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[11] https://www.scmp.com/news/china/article/3324865/dior-fined-china-sending-data-overseas-without-security-screening?module=inline&pgtype=article

[12] https://whitepapers.theregister.com/



1 hour?

Anonymous Coward

I guess a company's only possible action is to report, via api, that every bit of information on every system has been compromised every minute. The only other alternative appears to be to not get hacked...

Re: 1 hour?

Anonymous Coward

The other 'safer' option is that you report 'I have been hacked' then 'I made a mistake, I have not been hacked' on a rotating schedule of 59minutes 5seconds (allowing 55 seconds for the report to be logged as CCP central !!!)

You will be correct & mistaken multiple times but demonstrating a eagerness to comply with the directive from 'on high' !!!

(It is always best to be 'seen' to be trying to comply !!!)

:)

DavCrav2

"outages that take key government or news websites offline for more than 24 hours."

Yes, I will report within 30 minutes that an outage has happened that will take out a website for the next 24 hours.

wolfetone

People mocking this, then ignoring the stone wall silence coming from M&S, Co-Op, JLR and TCS after their hacks since Easter.

stiine

The closest M&S is 6770km from me. I don't know who Co-Op, JLR or TCS are, and I don't celebrate easter.

Paul Herber

Meanwhile a different country relaxes the notification rules if only customer data is involved, or if there could be a detrimental effect on the stock price.

A language that doesn't have everything is actually easier to program
in than some that do.
-- Dennis M. Ritchie