Hong Kong’s First Comprehensive Cybersecurity Law: Key Requirements for Businesses
The passage of the Protection of Critical Infrastructures (Computer Systems) Ordinance marks a significant milestone in Hong Kong cybersecurity, establishing a new legal framework to protect essential services from cyber threats. The law imposes strict compliance obligations on designated critical infrastructure operators, with enforcement set to begin in 2026. Organizations in key sectors are urged to assess their potential obligations under this transformative regulatory regime.
On March 19, 2025, Hong Kong took a major step forward in strengthening its cybersecurity landscape with the passage of the Protection of Critical Infrastructures (Computer Systems) Bill, a landmark piece of legislation aimed at safeguarding the city’s essential services from cyber threats. The resulting Protection of Critical Infrastructures (Computer Systems) Ordinance (the “Ordinance”) was published in the Gazette on March 28, 2025, marking the start of a new regulatory era for operators of critical infrastructure.
This Ordinance introduces a comprehensive statutory framework requiring designated critical infrastructure operators (CIOs) to implement robust measures for protecting their computer systems. By setting out clear compliance obligations across three key categories, the law aims to reduce the risk of disruptions caused by cyberattacks and ensure the continued delivery of vital services that keep Hong Kong running.
Although the Ordinance will officially come into force on January 1, 2026, organizations will only be bound by its obligations once they are formally designated as CIOs. The responsibility for these designations lies with the newly established Office of the Commissioner of Critical Infrastructure (CCI), which will be set up under the Security Bureau within one year of the Bill’s passage, according to a background brief released by the LegCo. Once operational, the CCI will begin the designation process in phases within six months.
Given the significant compliance duties – and the potential for steep penalties – companies operating in any of the eight specified sectors should proactively assess whether they may be subject to the new requirements.
Designation of a CIO, critical infrastructure, and critical computer systems
As the Ordinance only applies to companies that have been designated as a CIO, it is important to understand what the authorities are considering when making the designation.
Broadly, a company can be designated as a CIO if it is found to be operating critical infrastructure and is operating within one of the eight designated sectors.
Critical infrastructure is defined in the Ordinance as:
- Any infrastructure that is essential to the continuous provision in Hong Kong of an essential service in the following sectors:
- Energy
- Information technology
- Banking and financial services
- Air transport
- Land transport
- Maritime transport
- Healthcare services
- Telecommunications and broadcasting services
- Any other infrastructure the damage, loss of functionality or data leakage of which may hinder or otherwise substantially affect the maintenance of critical societal or economic activities in Hong Kong.
The responsibility to designate an organization as a CIO falls to the “regulating authority”. Which regulating authority oversees the designation of a CIO depends on the industry the organization is operating in, and can be either a “designated authority” or the CCI. The “designated authority” for the banking and financial services sector is the Hong Kong Monetary Authority, while for telecommunications and broadcasting services, it is the Communications Authority. For all other sectors, the regulating authority is the CCI.
When ascertaining whether the new critical infrastructure rules apply, the regulating authority will consider:
- What kind of service is provided by the infrastructure;
- What implications there can be if the infrastructure is damaged, loses functionality or suffers any data leakage;
- Any information required by the regulating authority from the organization in order to ascertain critical infrastructure; and
- Any other matters the authority considers relevant.
When ascertaining whether to designate an organization as a CIO (or revoke the designation of an organization as a CIO), the regulating authority will take into account the following:
- How dependent the core function of the critical infrastructure concerned is on computer systems;
- The sensitivity of the digital data controlled by the organization in respect of the infrastructure;
- The extent of control that the organization has over the operation and management of the infrastructure;
- Any information requested by the regulating authority from the organization in order to ascertain critical infrastructure; and
- Any other matters the authority considers relevant.
Note that more than one CIO can be designated for a single critical infrastructure system. Similarly, a single organization may serve as CIO for multiple critical infrastructure systems.
In addition to ascertaining what constitutes critical infrastructure and whether to designate an organization as a CIO, the regulating authority will also closely examine critical computer systems related to critical infrastructure. Critical computer systems are subject to additional security compliance requirements, such as mandatory reporting of any incidents implicating the system.
Broadly, a computer system that is critical for the infrastructure in question will be designated as such if it is accessible by the CIO in or from Hong Kong and is essential to the core function of a critical infrastructure system.
In the process of designating a critical infrastructure system, a CIO, or a critical computer system, the regulating authority can request an organization to provide “any information the authority reasonably considers necessary”. Failure to comply with such a request for information could lead to initial fines of HK$300,000 to HK$5 million, plus an additional daily fine of HK$30,000 to HK$100,000 for continuing offences.
Obligations of CIOs
Being designated a CIO kicks into gear a wide range of new obligations to ensure the security of critical infrastructure. These obligations range from being required to maintain an office in Hong Kong, conducting regular risk assessments and security audits, and reporting security incidents to the authorities.
Complying with these obligations is crucial, as failing to do so carries penalties of up to HK$5 million for initial offences, and an additional daily fine of up to HK$100,000 for continuing offences.
The obligations can generally be split into two categories: Initial obligations that companies must comply with once they have been designated a CIO, and ongoing reporting and compliance requirements.
Initial obligations
Some initial obligations must be met within one month of being designated a CIO. These are:
- Maintaining or establishing an office in Hong Kong and notifying the regulating authority of the office address.
- Maintaining or establishing a computer-system security management unit notifying the regulating authority of the appointment of an employee to supervise this unit.
Meanwhile, in the first three months, CIOs are required to submit a computer-system security management plan to the regulating authority and submit an emergency response plan to the CCI. CIOs are also legally required to implement emergency response plans.
The contents of the computer-system security management plan are outlined in Schedule 3 of the Ordinance, and must cover a range of information related to the persons responsible for managing cybersecurity, how critical systems are identified, and how risks such as threats, vulnerabilities, and incidents are detected and addressed.
The emergency response plan, meanwhile, must describe the structure and responsibilities of the team that handles cybersecurity incidents, define when the response protocol should be activated, and set out how incidents are reported, investigated, and assessed, among other matters.
In the first 12 months, CIOs are also required to conduct a computer-system security risk assessment, and submit a report of this assessment within three months of the end of the initial 12-month period to the regulating authority.
Finally, in the first 24 months, CIOs must carry out a computer-system security audit and submit a report of the audit to the regulating authority within three months of the end of the 24-month period.
Below is a summary of the initial obligations placed on companies once they are designated a CIO. Note that the relevant authority for the first two divisions is either the designated authority or the CCI, depending on the CIO’s sector, whereas Division 3 obligations are exclusively under the purview of the CCI.
Initial Obligations Upon Designation as CIO |
|||
Obligation | Time limit | Overseeing authority | Legal liabilities |
General operational obligations (Division 1) | |||
Maintain or establish an office in Hong Kong | Within 1 month of designation (if no office exists when designated) | NA | NA |
Notify the regulating authority of the address of the office | Within 1 month of designation | Designated authority or CCI | HK$300,000 – HK$500,000 fine for initial offence
HK$30,000 – HK$50,000/day fine for continuing offences |
Maintain or establish a computer-system security management unit | Within 1 month of designation (if no unit exists when designated) | NA | NA |
Notify the regulating authority of appointment of an employee with adequate professional knowledge in relation to computer-system security to supervise the computer-system security management unit | Within 1 month of designation (extensions can be granted if no unit existed when designated) | Designated authority or CCI | HK$300,000 – HK$500,000 fine for initial offence
HK$30,000 – HK$50,000/day fine for continuing offences |
Obligations to prevent threats and incidents (Division 2) | |||
Submit a computer-system security management plan to the regulating authority | Within 3 months of designation | Designated authority or CCI | HK$300,000 – HK$500,000 fine for initial offence
HK$30,000 – HK$50,000/day fine for continuing offences |
Conduct a computer-system security risk assessment | Within 12 months of designation | NA | HK$300,000 – HK$500,000 fine for initial offence
HK$30,000 – HK$50,000/day fine for continuing offences |
Submit a report for the computer-system security risk assessment to the regulating authority | Within 3 months of the expiry of the period in which the assessment must be completed | Designated authority or CCI | HK$300,000 – HK$500,000 fine for initial offence
HK$30,000 – HK$50,000/day fine for continuing offences |
Carry out a computer-system security audit | Within 24 months of designation | NA | HK$300,000 – HK$500,000 fine for initial offence
HK$30,000 – HK$50,000/day fine for continuing offences |
Submit a report of the computer-system security audit to the regulating authority | Within 3 months of the expiry of the period in which the audit must be completed | Designated authority or CCI | HK$300,000 – HK$500,000 fine for initial offence
HK$30,000 – HK$50,000/day fine for continuing offences |
Obligations to respond to and report incidents (Division 3) | |||
Submit an emergency response plan to the CCI | Within 3 months of designation | CCI | HK$300,000 – HK$500,000 fine for initial offence
HK$30,000 – HK$50,000/day fine for continuing offences |
Ongoing obligations
Ongoing obligations of CIOs include notifying the regulating authority of any changes to the CIOs general operating conditions within one month of the change occurring. This includes changes in the CIO’s address, any operator or operational change related to a critical infrastructure, any change to the appointment of the employee supervising the computer-system security management unit, and any revisions to the computer-system security management plan.
CIOs are also required to notify the relevant regulating authority within one month of certain non-emergency “events” related to its computer systems, including:
- Material changes to the design, configuration, security or operation of a critical computer system of the critical infrastructure;
- The removal of a critical computer system of the infrastructure;
- The addition of a computer system to the infrastructure that is accessible by the operator in or from Hong Kong and Is essential to the core function of the infrastructure; and
- A change occurs to a computer system that is an existing computer system of the infrastructure and is accessible by the operator in or from Hong Kong, such that the system becomes essential to the core function of the infrastructure.
There are also a range of ongoing obligations relating to the prevention of threats and incidents, and to notify the authorities if any incidents occur:
- First, to prevent threats and incidents, CIOs must continue to conduct regular risk assessments and security audits (at least every 12 months and 24 months, respectively, following the initial mandatory assessment and audit period).
- Second, CIOs are required to participate in a computer-system security drill upon the request of the CCI. The CIO will be given “reasonable notice” in writing of the drill from the CCI.
- Finally, if a CIO becomes aware that a computer-system security incident has occurred implicating a critical computer system of its critical infrastructure, it must notify the CCI of the incident as soon as is practicable, or 48 hours after the CIO becomes aware of the incident. If, however, an incident has disrupted, is disrupting, or is likely to disrupt the core function of the critical infrastructure concerned, the CIO must inform the CCI 12 hours after the it becomes aware of the incident.
The last two obligations carry significant penalties if not fulfilled, with fines ranging from HK$3 million to HK$5 million depending on the severity of the case.
Ongoing Obligations of CIOs | |||
Obligation | Time limit | Overseeing authority | Legal liabilities |
General operational obligations (Division 1) | |||
Notify the regulating authority of a change in the address of the office | Within 1 month of change occurring | Designated authority or CCI | HK$300,000 – HK$500,000 fine for initial offence
HK$30,000 – HK$50,000/day fine for continuing offences |
Notify the regulating authority of any change of the organization that operates the infrastructure | Within 1 month of change occurring | Designated authority or CCI | HK$3 million – HK$5 million fine for initial offence
HK$60,000 – HK$100,000/day fine for continuing offences |
Notify the regulating authority of any change to the appointment of an employee supervising the computer-system security management unit | Within 1 month of the change occurring | Designated authority or CCI | HK$300,000 – HK$500,000 fine for initial offence
HK$30,000 – HK$50,000/day fine for continuing offences |
Obligations to prevent threats and incidents (Division 2) | |||
Notify of certain “events”, including materials changes to certain computer systems | Within 1 month of the event occurring | Designated authority or CCI | HK$300,000 – HK$500,000 fine for initial offence
HK$30,000 – HK$50,000/day fine for continuing offences |
Submit any revisions to the computer-system security management plan to the regulating authority | Within 1 month of the revision occurring | Designated authority or CCI | HK$300,000 – HK$500,000 fine for initial offence
HK$30,000 – HK$50,000/day fine for continuing offences |
Conduct subsequent computer-system security risk assessments | At least once every 12 months after the first 12 months | Designated authority or CCI | HK$300,000 – HK$500,000 fine for initial offence
HK$30,000 – HK$50,000/day fine for continuing offences |
Conduct subsequent computer-system security audits | At least once every 24 months after the first 24 months | Designated authority or CCI | HK$300,000 – HK$500,000 fine for initial offence
HK$30,000 – HK$50,000/day fine for continuing offences |
Obligations to respond to and report incidents (Division 3) | |||
Participate in a computer-system security drill upon the request of the Commissioner of Critical Infrastructure | Upon request | CCI | HK$3 million – HK$5 million fine |
Submit any revisions to the emergency response plan | Within 1 month of the revision occurring | CCI | HK$300,000 – HK$500,000 fine for initial offence
HK$30,000 – HK$50,000/day fine for continuing offences |
Notify the Commissioner of Critical Infrastructure of any computer-system security incidents that occur in a critical computer system of a critical infrastructure | As soon as practicable, or 12 to 48 hours after the operator becomes aware of the incident. | CCI | HK$3 million – HK$5 million |
Impact on companies in Hong Kong
The enactment of the Ordinance represents a major shift in Hong Kong’s approach to cybersecurity regulation, and will have far-reaching implications for companies operating in the city. For those designated as CIOs, meeting the obligations of the Ordinance will require a substantial allocation of resources, including both financial investment and enhanced internal capacity to manage ongoing cybersecurity risks. Non-compliance should not be taken lightly, given the steep penalties stipulated in the law.
In light of this, companies should begin to prepare by assessing whether they operate infrastructure that could be deemed “critical” under the Ordinance, and whether that operation would make them likely to be designated as a CIO. They should then consider what that designation could mean for their business operations, resourcing, and risk exposure.
To stay ahead of the requirements, businesses should begin preparing by allocating resources for compliance, which may include establishing a presence in Hong Kong, setting up a dedicated computer-system security management unit, developing comprehensive cybersecurity and emergency response plans, and conducting regular security risk assessments, audits, and incident response drills. Training personnel involved in these processes will also be essential to building the capabilities required under the new law.
About Us
China Briefing is one of five regional Asia Briefing publications, supported by Dezan Shira & Associates. For a complimentary subscription to China Briefing’s content products, please click here.
Dezan Shira & Associates assists foreign investors into China and has done so since 1992 through offices in Beijing, Tianjin, Dalian, Qingdao, Shanghai, Hangzhou, Ningbo, Suzhou, Guangzhou, Haikou, Zhongshan, Shenzhen, and Hong Kong. We also have offices in Vietnam, Indonesia, Singapore, United States, Germany, Italy, India, and Dubai (UAE) and partner firms assisting foreign investors in The Philippines, Malaysia, Thailand, Bangladesh, and Australia. For assistance in China, please contact the firm at china@dezshira.com or visit our website at www.dezshira.com.
- Previous Article Transfer Pricing Documentation in China: Common Pitfalls and Best Practices
- Next Article China-India Economic Ties: Trade, Investment, and Opportunities