Current location - Quotes Website - Signature design - There is no connection between China's encryption law and network security law.
There is no connection between China's encryption law and network security law.
Legally speaking, cryptography is a legal norm to regulate the application and management of cryptography, while electronic signature is a legal norm to regulate the application and management of cryptography in a certain way. Therefore, the former is a general law and the latter is a special law. The former is the superior method and the latter is the subordinate method. Under the guidance of cryptography, the electronic signature law has been supported by the superior legal sources, and the legal status of electronic signature has been clearly based in the Basic Law.

The promulgation of Cryptography Law means that the focus of national policy has begun to change and the regulatory environment has become stricter. Pay more attention to social impact and risk control, and strengthen the management of electronic contract platform through regulations, documents and window guidance.

Cyber security law: After the implementation of cyber security law and related supporting laws, regulations and judicial interpretations, the act of profiting from users' sensitive information has a legal basis for sentencing standards.

Therefore, enterprises should strengthen the awareness of protecting users' information, especially when choosing electronic contract service providers, try to choose service providers with high security level and many technical qualifications, otherwise, once information is leaked, enterprises may have to bear corresponding responsibilities.

Digital authentication of electronic contract is a high-security encryption protection based on domestic cryptographic algorithm, which can block any unauthorized operation and ensure the security of identity information, contract documents, data transmission and business information in the process of contract signing. The profound technical accumulation of digital authentication in identity authentication can also effectively protect users' personal privacy information from being leaked.