Hệ thống pháp luật
Loading content, please wait a moment ...
Đang tải nội dung, vui lòng chờ giây lát...

THE STATE BANK OF VIETNAM
-------------

SOCIALIST REPUBLIC OF VIETNAM
Independence – Freedom – Happiness
---------------

No. 04/2006/QD-NHNN

Hanoi, January 18, 2006

 

DECISION

ON THE ISSUANCE OF THE REGULATION ON THE PRUDENCE AND CONFIDENTIALITY OF THE INFORMATICS TECHNOLOGY SYSTEM IN BANKING AREA

THE GOVERNOR OF THE STATE BANK

- Pursuant to the Law on the State Bank of Vietnam issued  in 1997; the Law on the amendment, supplement of several articles of the Law on the State Bank of Vietnam issued in 2003;
- Pursuant to the Law on Credit Institutions issued in 1997; the Law on the amendment, supplement of several articles of the Law on Credit Institutions issued in 2004;
- Pursuant to the Ordinance on State secret preservation No.03/2000/PL-UBTVQH10 dated 28/12/2000 of the Standing Committee of the National Assembly;
- Pursuant to the Decree No.33/2002/ND-CP dated 28/03/2002 of the Government providing in details for the implementation of the Ordinance on State secret preservation;
- Pursuant to the Decree No. 52/2003/ND-CP dated 19/5/2003 of the Government providing for the function, assignment, authority and organizational structure of the State Bank of Vietnam;
Upon the proposal of the Director of the Banking Informatics Technology Department,

DECIDES:

Article 1. To issue in conjunction with this Decision the “Regulation on the prudence, confidentiality of the informatics technology system in Banking area”.

Article 2. This Decision shall be effective after 15 days since its publication in the Official Gazette.

Article 3. The Director of Administrative Department, the Director of the Banking Informatics Technology Department, Heads of units of the State Bank, Managers of the State Bank’s branches in provinces, cities under the Central Government’s management, Chairperson of the Board of Directors, General Directors (Directors) of credit institutions shall be responsible for the implementation of this Decision.

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



 

FOR THE GOVERNOR OF THE STATE BANK OF VIETNAM
DEPUTY GOVERNOR




Phung Khac Ke

 

REGULATION

ON THE PRUDENCE, CONFIDENTIALITY OF THE INFORMATICS TECHNOLOGY SYSTEM IN BANKING AREA
(Issued in conjunction with the Decision No.04/2006/QD-NHNN dated 18/01/2006 of the Governor of the State Bank)

Chapter I

GENERAL PROVISIONS

Article 1. Governing scope

This Regulation provides for requirements for the users and basic criteria of the prudential technique of the informatics technology system of the State Bank and Credit Institutions except for the Local People’s Credit Funds (hereinafter referred to as units), for the purpose of unifying the management of the application of informatics technology in banking activities in a prudential and efficient way.

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



1. Informatics technology system (IT) is a structural group of equipment of hardware, software, database and the network system serving one or several technical, operational activities.

2. Fire wall is a group of components or a system of equipment, software being set between the two networks for the purpose of controlling the entire connections from the inside to the outside of the network or vice versa.

3. The integrity of the data is the existent status of the data like they are in the original documents and not changed in terms of data, structure or the data of which is not lost.

4. Configuration management is the management of changes in hardware, software, technical documents, checking tool, connection interface, operating technical procedure, installation configuration and all other changes of the IT system during the process from the installation to the operation.

5. Archive is to create a copy of the software or data for the purpose of the preservation against losses, corruption of the original software, data.

6. Virus is a computer program which is able to multiply, transmit in the computer network or through information carriers, can destroy data or do some unexpected functions for the IT system.

7. Authority grant: is the permission grant which is given to an individual in accordance with the organizational procedure which has been previously formed for his access, use of a program or a process of the IT system.

8. Password is a string of characters or a confirmation mode of the secrecy identification which is used for authenticating the user’s right.

9. Network security system: is a group of fire wall equipment; equipment for controlling, discovering illegal access; software for the administration, following up, recording diary on the status of network security and other equipment which has a function of prudential assurance for the network operation and all of them synchronously operate under a consistent network security policy for close control over the activities in the network.

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



Article 3. Responsibilities of the units

1. To issue policies on prudence, confidentiality of the IT system (hereinafter referred to as IT security policies), organize the implementation and examination for the implementation of those policies. To update, on regular basis, the IT security policies in line with changes in the IT system of the units, running environment and scientific technical advances in the IT security area.

2. To arrange necessary resources for carrying out the equipment, deployment, running, management, supervision and processing of breakdowns in the activity of IT application,  ensuring the confidential, prudential operation of the IT systems and corresponding with the requirements of operational activities and the IT security strategy of their units. To take preventive measures, to detect and timely deal with frauds, errors, instability and other extraordinary, unsafe elements.

3. To organize an appropriate IT security management division for uniform management, deployment of IT security activities from the stage of plan preparation, designing, installation deployment to the running stage of the IT system in line with the provisions in this document. To select, train an IT system administrator who satisfies such standards as: having professional virtue, being knowledgeable of IT security and equipped with knowledge concerning operational activities and the IT system of the units. Decision on the assignment of administration duty for the IT system must be made in writing.

4. To ensure that the IT system is always ready at the high level; to set up, test backup plans and restore the system in the event of breakdowns or disaster.

5. To assess the ability, feasibility, risks relating to IT activities supplied by external partners; to set up agreements to clearly define the relationship, obligations and responsibilities of the parties participating in the IT service supply such as: level of service supply, expected running result, ability of implementation, ability of expansion, compliance level, backup plan, backup levels, prudence and confidentiality, service suspension, control over obligations of contract implementation and relationship with related IT systems.

6. To organize, on regular basis, training courses to update users’ the knowledge about IT security in line with the duties they are in charge of;

7. Equipments, software, data used in the operational activities must be supported by the copyright in accordance with provisions of applicable laws

Article 4. Requirements of information security

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



2. Intactness: incompetent persons shall not be entitled to modify, delete or supplement the information

3. Readiness: information shall be always ready to satisfy using demand of competent persons

4. Non-negation: Information creator shall not be permitted to deny his responsibility for the information he created

5. Truthfulness: source of information must be clearly defined

Article 5. Determination of security requirements of the IT system

The classification of requirements, levels of investment in the security of the IT system of the units shall be clearly determined based on the following elements:

1. Role of the IT system in the implementation of the units’ targets

2. Source, danger to occur risks for the IT system

3. Ability to overcome in case of risk

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



5. Effect of risks, if any, on the activities of the units in particular and general activities of banking industry.

Article 6. Acts to be strictly forbidden

1. Not to comply with provisions on the security of the IT system of the State, industry and of the units;

2. To access, supply and disperse information illegally

3. To disclose the system architecture, algorithm of the IT security system

4. To illegally modify the architecture, operating mechanism of the IT system

5. To use IT equipments of the units for individual purposes

6. Other acts that obstruct, destroy the operation of the IT system

Chapter II

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



Article 7. Management, authentication of users in the IT system

1. All the IT systems must be capable of management and authentication of the users who are accessing those systems

2. Activities of transactions which are processed centrally and immediately through the computer network shall be organized based on the system of management, authentication of centralized users

3. Processes, programs, instruments, algorithm used to set up password, identification device and key database which is used to check the access shall be managed, used under the “Confidential” regime

4. Requirements for the organization of the authentication system:

a. Having separate process on management and authentication of the users for each IT system in line with the requirements of prudence, confidentiality of above-mentioned processing operation;

b. Authenticating the access right of the users by account, identification device or by both; and the users shall only be granted enough authority to perform their assigned tasks;

c. Password, identification data used for the access authentication shall be kept secret during the process of archive, transmission through the network and displayed on the users’ monitor;

d. The environment where the authentication equipments are located must be secret, prudential for the use of code, identification device;

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



e. Temporarily suspending the working right of the users who have been registered on the IT system, but are not temporarily working on this system within a period of 60 days upwards;

g. On weekly basis, examining the system-access diary, detecting and timely dealing with cases which illegally access or carry out manipulation acts beyond the assigned limit of the users.

Article 8. Methods of authentication

1. Authentication by identification (ID) and password must satisfy the following requirements:

a. A password must have the length of 6 characters upwards, consist of numbers, letters and other special characters if permitted by the system. Requirements of valid password shall be automatically checked upon setting up the password;

b. Default passwords availably installed on equipments, software, databases by the producer must be changed right after they are put into use

c. Software on management of passwords must contain such functions as: informing users to change their passwords which are about to expire; canceling the effectiveness of expired passwords, permitting the users to change passwords which have been revealed, are likely to be revealed or upon request of the users; preventing users from reusing old passwords in a certain time.

2. Authentication by card must clearly provide for responsibilities of parties that issue and use cards

3. Authentication by biometric method must ensure the prudence of the users during the collection of biometric elements

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



a. Checking subjects applying for the grant of number certificate and key code legally and validly

b. Checking the validity of the number certificate prior to examining, accepting transactions which use the number certificate

c. Controlling, timely updating into databases cancelled number certificates to avoid being benefited;

d. Having measures for protecting the prudence of root key and equipments of the number certificate system;

dd. Recording diary on the entire process of granting, changing, canceling the number certificates and key codes;

e. Examining extraordinary events, on regular basis, of the number certificate system to timely detect changes and illegal access.

Article 9. Controlling the access to the IT system

1. All IT systems shall be set up a function of access control, warning, preventing users from illegal access or misusing their function, authority in the system

2. The system of access control must have the following functions:

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



b. Managing, authenticating the connection of terminal devices as well as accepting the internal devices to carry out the connection;

c. Not permitting the users, except for system administrator, to concurrently access several terminal devices at a certain time;

d. The terminal devices shall be automatically installed to convert to non-operating status, locked monitor status with password or automatically escape from the system after a period of time of non-use.

Article 10. Data encryption

1. The sensitive, important data which is transmitted on the computer network shall be encrypted

2. Only encryption techniques that have been tested, assessed as reliable enough by prestigious IT security organizations in the country or in the world. The complication of selective encryption algorithm must be in line with the confidential level of data that needs protecting and processing ability of the IT system;

3. Secret elements used for encryption technique must be independently installed from supplier and changed on annual basis at the minimum

4. Equipment, software used for encryption solution must be concurrently archived with encrypted data; or convert the encrypted data to new data type in the event of any change in encryption method in order to ensure the original data restoring from data of encryption type at any time;

5. The encryption solution which is in use must be regularly checked, assessed in terms of the prudential level and shortcomings (if any) of which must be timely dealt with.

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



1. The IT systems must have a function of recording supervision diary for activities of those systems. Clock of equipments in the same IT system must be synchronized from a source for ensuring the accuracy of supervision diary.

2. Accesses and manipulation acts that affect the operation of the system shall be recorded in the diary. Diary file must be protected from any change

3. The Head of units shall provide for the regime on diary record, archive time of diary file for each IT system in order to supervise the system’s activities and support the audit work.

4. System administrator shall be responsible for examining diary files of the system on regular basis in order to detect, settle and timely prevent breakdowns resulting in unsafeness, instability of the IT system

Article 12. Physical safety

1. Server room and other areas where IT equipments are situated, used must have regulations and take measures for protection, entry and exit control to ensure that only persons with duty can enter into those areas

2. All works carried out in the server room shall be recorded in daily working diary

3. Computer room must ensure industrial hygiene: not dilapidated, unabsorbed; the equipments are installed on the technical floor, not directly contact the sunshine; humidity, temperature satisfy standards provided for the equipments and server; to be fully equipped with devices for preventing and protecting fire, explosion, flood, anti-thunder system and security system for preventing illegal access

4. It is required to take measures for supervision, security protection, and prevention from illegal access and management of the use of the equipments used for installation outside the units’ office

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



6. Programs, data of the units, which are likely to be benefited, must be rejected when handing over the equipments containing those programs, data to external units or upon making assess liquidation

7. Power source supplied to the IT system:

a. The server room must be equipped with a separate power source with industrial technical standards which are in line with the equipments installed in the computer room

b. Backup power source must meet the standard, capacity for normal operation of the IT system during the time when the main power source meets breakdown

Article 13. Prudence of the computer network

1. Documents on technique and operation of the computer network system shall consist of the following types:

a. File on the investigation, design and technical explanation of the network;

b. Documents which determine the design of the network to fully meet standards for safe operation through the self-checking, self-assessment of the units or by specialized agency of the State

c. Process on the management and operation of the network

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



a. Being able to control, supervise network accesses

b. Being able to prevent illegal accesses;

c. Recording the diary on the network access

d. Having process on breakdown settlement and disaster prevention

dd. Having administrative, technical measures to prevent the illegal access to equipments, network transmitting line

3. Responsibilities of the network users:

a. The network users must register and obtain the using acceptance prior to accessing the network;

b. When detecting any sign of unsafeness, they must immediately inform to the network administrator for settlement

c. They must update new version of anti-virus software and regularly scan virus on the computers connected to the network. They shall not be entitled to change, remove, on their own, programs, technical parameters, which are installed by the administrator

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



dd. To comply with other provisions of the units in line with the provisions in this Regulation

4. Responsibilities of the network administrator:

a. To check, ensure the safe, stable and continuous operation of the computer network

b. To manage configuration, resources and users on the network

c. To fully setup regimes on network security control. To use equipped tools to check and timely detect weak-points easy to be injured and illegal accesses into the network system. To examine, detect connections, equipments, software illegally installed in the network on regular basis.

d. To detect and timely deal with the gaps in the security of the network system

dd. To guide, support the users to protect accounts, resources on the network, to install the anti-virus software and timely deal with network access breakdowns

e. To check and disconnect computers of the users who fail to comply with provisions of the units on virus prevention and anti-virus and other provisions on the network security

Article 14. Prudence of databases

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



a. It runs on the network and is independent of the server, operating system

b. It runs stably; it can process, archive a great volume of data upon the operational requirement;

c. It can protect and grant  access right for the database resources;

d. It manages, ensures the consistence of relational data tables and of each operational act processed on the database

dd. The system must integrate structured query language tool (SQL)

e. The system must support online archive of database and restoration of database from archived version;

g. The system of is capable of updating new version

2. Only database that has been tested through factual operations of similar credit institutions inside and outside the country shall be used

3. Responsibilities of the database administrator:

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



b. To change default passwords right after the database is put into use

c. To grant the access right of resources to database users

d. To prepare plan of, carry out the data archive and check the archive result;

dd. To check, ensure the entire restoration of the database from the archived version when necessary

e. To strictly manage archived versions to avoid the danger of loss, danger of being changed and illegally exploited;

g. To regularly check the status of database both physically and logically. To timely update error versions from the supplier

Article 15. Prudence of application software

1. General requirements:

a. Technical documents:

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



- Documents attached to packed software, which is supplied by external supplier, shall include technical documents and the documents guiding the use of software

b. The software must integrate solutions of authentication, access control and data encryption in accordance with the provisions in Article 8, Article 9 and Article 10 of this Regulation;

c. The software must run stably, process data accurately and ensure the consistence of the data;

d. Operational software and technical documents must be duplicated and safely archived at two separate places at the minimum

2. Analysis, design and software writing

a. Requirements on prudence, confidentiality of operations must be determined in advance and organized, deployed in an entire process of software development from the analysis to deployment and running;

b. Documents on prudence, confidentiality of the software must be systematized and archived, used under the “Confidential” regime

3. Check, test of software

All software must experience the following test and trial steps before being deployed and put into use:

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



b. Carrying out the trial on a separate environment. Preparing a report on trial result to submit to competent level for their approval and putting into use;

c. The use of real data during the trial process must be supported by preventive measures to avoid being benefited or making mistakes

4. Deploying, running the software:

a. The deployment of the software must not affect the prudence, confidentiality of the available IT systems;

b. Prior to the deployment of the software, all the risks of the deployment process for the operational activities, related IT systems must be assessed then drawing up and deploying solutions for restraining and overcoming risks

5. Management of software version

a. In respect of the request for the change of software, it is required to analyze, assess the effect of the change on the operation and other related IT systems of the units;

b. After software versions are successfully tested they must be strictly managed to avoid being illegally modified and to be ready for the deployment

c. There must be clear instructions on changing contents, guidance on the software update and other related information attached to the new software version

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



6. Management of software source code

a. Source codes of the software shall be strictly managed to avoid being used or modified illegally

b. There must have agreements on the management, correction of the source codes used for the maintenance in case where those softwares are developed by external partners and the source codes of which are not handed over

7. To comply with other provisions on prudence, confidentiality stipulated in the Decision No. 1630/2003/QD-NHNN dated 19/12/2003 of the Governor of the State Bank of Vietnam issuing the regulation on technical standards in the processing, procurement of banking operation software

Article 16. Prudence of the operating system of the server

1. The operating system to be selected must satisfy the following requirements:

a. It can run safely and stably;

b. Its readiness is high

c. It can manage the users, protect and grant the resource access right

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



dd. It must update the new version

e. It must check, restore the system in the event of breakdown

2. Only the operating system that has experienced the factual operations of similar organizations inside and outside the country shall be used

3. Responsibilities of the operating system administrator

a. To ensure that the operating system which is installed on the server can work continuously, stably and safely

b. To regularly check configuration, files on working diary of the operating system, timely detect and deal with breakdowns if any;

c. To grant access right and manage the access of the users on the server which install the operating system

d. To manage changes in technical configurations of the operating system

dd. To regularly update error versions of the operating system from the supplier;

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



Article 17. Prevention from computer virus and anti-virus

1. The units must deploy the virus prevention and anti-virus for their entire IT systems. To follow up and timely give notice to the users of new viruses and the way of prevention

2. Responsibilities for the virus prevention and anti-virus of the users

a. To regularly check and delete virus

b. Software, data and information carriers received from the outside must be scanned prior to using

c. It is not permitted to open strange mail, attached files or links in strange mails for preventing virus

d. It is not permitted to access website without clear origin

dd. To timely update types of virus and new anti-virus software

e. In case where virus is detected but cannot be deleted, the user must immediately inform to the system administrator for settlement

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



1. The connection with the outside shall be carried out under the principle of not affecting the security and normal operation of the network system of the units

2. Local area network system of the units shall be separated physically or logically from the externally connected network

3. The connection, data exchange with the outside shall be provided in details in terms of connection standards, services to be used, access right, data syntax and exchanging process

4. Steps of connection deployment

a. To investigate, design system configuration, connection method and services to be used on the network

b. To analyze effects, danger of unsafeness and select an appropriate security solution, prevent from illegal access

c. To submit to the Head of the units for approving the connection plan, the way of data exchange

d. To install, check, test successfully then put into official operation

dd. To deploy measures of preventing from illegal penetration from the outside

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



1. The units must issue internal regulations on management and use of Internet, ensuring the safe, efficient use of Internet and compliance with provisions of applicable Laws.

2. Computers used for Internet connection must be labeled for easy recognition and shall not be directly connected to the operation processing network if the IT division of the units has not yet determined that they have fully satisfied conditions of prudence protection. It is not permitted to archive the documents, data belonging to the State Secret in the computers which are connected to Internet

3. In case where there is a design of separate network system used for Internet connection of many users, that network system must ensure the following requirements:

a. The network separately used for Internet connection must be separated physically from the operation processing network or they must be separated by a firewall system which is fully capable of controlling entire accesses between the two networks and must ensure the prudence of operation of the software, data in the operation network

b. Sockets specially used for Internet connection must be labeled to help the users easily recognize that it is an Internet connection port

c. There must have a system of supervision, management of the Internet users, management of bands and time of Internet exploitation

4. Responsibilities of the Internet users

a. To be responsible for protecting the network system of the units, to be watchful over the flip side of Internet. To take full responsibility under provisions of applicable laws if screening or permitting other to use their equipment, password for carrying out illegal acts

b. To be subject to the examination, supervision of the units and functional agencies of the State for the information sent to Internet and take legal responsibility for that information

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



d. To be responsible for compliance with provisions on the content of information posted in the Internet and undertaking to correctly comply with those provisions

dd. Not to be permitted to commit acts that obstruct or destroy Internet’s activities; not to be permitted to affect other information system through Internet, or violate interests, honour of other individuals

e. Not to use instruments, software and technical measures in any form to appropriate transmission line bands, to make network blocked;

g. To comply with internal regulation on using Internet of the units and provisions of the State, of the industry on exploitation and use of Internet

Article 20. Data archive

1. Requirements of the archive system:

a. Ensuring the integrity and sufficiency of archived data during the archive period in accordance with applicable provisions;

b. Each type of data must be archived correctly and in full period of time in accordance with provisions of the State and the industry;

c. The data which are necessary for the maintenance or restoration of the unit’s operation, in case of breakdown, must be archived in two separate places at the minimum;

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



2. Responsibilities of the units:

a. To have a plan on equipment, technical process on archive, checking, preservation and exploitation of archived data which is approved by a competent authority;

b. To ensure conditions of place, environment for archive, preservation of information carrier in a prudential and scientific manner;

c. To maintain equipments, software used for archive, exploitation in a simultaneous way with the archived data or to convert the archived data in line with changes of the archive solution so as to ensure that the archived data is exploited at any time;

d. To stipulate scope, frequency of archive in line with each type of operational data so that it can restore, maintain the continuous activity of the operation in case where the major operating data meets breakdowns;

dd. To control and reconcile data against the related operational processing phases for the purpose of ensuring the accuracy, correctness and sufficiency of the data prior to the archive;

e. To record in the book to follow up the place, time, list of data, the person who performs the archive and exploitation of data;

g. To issue and deploy the archive process: copying and saving data; exploiting the archived data; checking, supervising the prudence of the archived data; method of preventing and overcoming risk for the archived data; to destroy the archived data which expires; and other contents relating to the techniques of prudential and efficient archive and preservation of archived data;

h. To comply with other provisions of the State and Banking area on the preservation, archive of electronic vouchers.

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



a. To correctly comply with provisions on archive, preservation of the archived data and take responsibility for the risk of the archived data caused by their subjective reasons;

b. Not entitled to permit any organization, individual to exploit, use the archived data without a written approval of the leader of their organization or an authorized person;

c. In case of risk or detecting a danger of risk for the archived electronic data, to make a report immediately to a competent person for a timely method of settling and overcoming.

Article 21. Standby activity against disaster

1. Units shall, upon the scale and importance of each IT system for the operation of the unit, choose and deploy an appropriate standby solution against disaster.

2. Units, which have a centralized IT system, must build up and maintain the operation of a standby center satisfying the following requirements:

a. Issuing provisions on management and operation of the backup center;

b. The backup center must be located at least 30 km far from the main processing center under the straight line connecting between the two centers;

c. The standby center must have full capacity of material, technical foundation and human resources, be ready to undertake all the role of the main processing center where required;

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



dd. The database for operational activities shall be immediately archived from the major center to the standby center;

e. Organizing a security system to ensure the prudence for the data and technical equipment system of the center;

e. The time for putting the standby center into operation to absolutely replace the main processing center shall not be in excess of 04 hours.

3. For units, which have not organized a centralized operation system, the organization of the standby system must satisfy the following requirements:

a. The standby system shall not be located in the same building with the main processing system;

b. The standby system must have full technical capacity, be ready to undertake all the role of the main system, which terminates the operation;

c. The design of wire line must be separated from the main system. To equip the electric generator, electric charging device for supplying a continuous, stable power source which satisfies the normal requirement of work settlement;

d. To organize the absolute security, safety for the data and technical equipment system;

dd. The database of the operational activities must be at once copied for backup from the main center to the standby center;

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



4. Operation of the standby system:

a. Operation from the main system to the standby system shall only be performed in the situation where the main system terminates operation and must be approved by the head of the unit for the performance;

b. The standby system shall be put into practice in compliance with the approved scenarios;

c. The exercise of changing the operation from the main system to the standby system must be performed on the annual basis at the minimum;

d. The standby system must be inspected, supervised to ensure a good operation.

5. Deployment rate of the standby system:

Units should have a plan on the deployment of the standby system against the disaster for the IT system in line with the rate of progress provided for by the State Bank.

Article 22. Requirements and responsibilities of the operators

1. They must be equipped with basic knowledge about IT: computer network (Server, clients and net equipment), operating system, and database in use.

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



3. They shall be only entitled to perform the assigned works, comply with the operational, technical process, the running technical process.

4. They shall take responsibility for the error, lateness, unsafeness caused by their subjective reasons.

5. They shall be responsible for timely informing the administrator of the system about the breakdown of the IT system if any.

Article 23. Internal inspection

1. Units shall organize by themselves the inspection of the compliance with provisions on the prudence, confidentiality of the IT system in accordance with provisions of this Regulation on the annual basis at the minimum.

2. Inspection contents:

a. Evaluating the policy on the IT security;

b. Inspecting the compliance with the policy on the IT security;

c. Evaluating risk which may occur and suggesting treatment

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



dd. The inspection contents must be stated in the report and submitted to competent levels.

3. Responsibilities of the head of units:

a. To conduct, inspect and facilitate the IT management division and related divisions to have a plan of immediately overcoming the petitions after the inspection;

b. To inspect the performance of petition under the plan;

c. To determine the reason and responsibility of individuals, organizations in respect of inspection petitions which have not yet been settled from the previous inspection if any.

Article 24. Inspection, maintenance of the IT system

1. Units shall set up a plan on the regular inspection, maintenance in order to ensure a continuous, stable and prudential operation of the IT system. On an annual basis, to arrange appropriate expense, resources for the maintenance activity.

2. All IT systems must be periodically maintained. Upon the importance of each IT system to the operation of the unit, an appropriate maintenance level shall be set up and carried out, providing that each system shall be maintained at least once a year

3. Minimum standby capacity of IT equipments must be kept at least equivalent to 20% against the processing requirements at the peak time.

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



a. The entire maintenance process of the IT system must be recorded in a diary to follow up changes in design, configuration of the IT system during the repair, upgrading, replacement or new installation;

b. Diary files of a system must be examined regularly, systematically saved and analyzed under different ways. On that basis, breakdown, signal of unsafeness shall be timely found out and overcome.

5. Maintenance activity:

a. Maintenance activity must be performed under plan, scenarios, ensuring that the maintenance activity has no effect to the normal operational activities of the unit;

b. Equipment, software, database must be checked, supervised and timely dealt with breakdown, signal of instability or overload; timely updating error version and filling up the gaps in security.

c. Inspecting, supervising external maintenance units for carrying out the maintenance in conformity with the approved scenarios.

Article 25. Making report on the IT security

1. Units shall be responsible for making the following written reports or electronic reports to the State Bank of Vietnam (the Banking Informatics Technology Department):

a. An internal inspection report of the unit in accordance with provisions in Article 23 of this Regulation. The reporting period shall be 60 days at the latest since the completion of the inspection;

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



2. Contents of unexpected report:

a. Date, place where the case occurs;

b. Reason of the case;

c. Evaluation of the risk, effect to the IT system and operations at the place where the case occurs and other related places;

d. Methods performed by the unit to stop, overcome and prevent risk;

dd. Proposal, suggestion to the State Bank.

Chapter III

IMPLEMENTING PROVISIONS

Article 26. Dealing with violation

...

...

...

Please sign up or sign in to your Pro Membership to see English documents.



Article 27. Implementing responsibilities

1. The Banking Informatics Technology Department shall be responsible for providing guidance on, following up and examining the compliance with this Regulation by units of the State Bank and credit institutions.

2. The State Bank’s Inspectorate shall be responsible for the coordination with the Banking Informatics Technology Department to inspect the compliance with this Regulation by credit institutions.

3. The General Control Department shall be responsible for conducting the internal inspection activity and performing the internal audit for the compliance with this Regulation by units of the State Bank.

4. Heads of units of the State Bank, Manager of the State Bank branches in provinces, cities under the Central Government’s management, Chairperson of the Board of Directors, General Director (Director) of credit institutions shall be responsible for the deployment and inspection of the compliance with the provisions of this Regulation in their units.

Article 28. Any amendment, supplement of this Regulation shall be decided upon by the Governor of the State Bank.