THE
NATIONAL ASSEMBLY Number:
51/2005/QH11 |
SOCIALIST REPUBLIC OF VIET NAM Independence - Freedom - Happiness Ha Noi , November 29, 2005 |
LAW
On e-transactions
Pursuant to the 1992 Constitution of the Socialist Republic of Vietnam,
which was amended under Resolution 51/2001/QH10 of
December 25, 2001, of the Xth National Assembly, the 10th session;
This Law provides for e-transactions.
Chapter I
GENERAL
PROVISIONS
Article 1- Governing scope
This Law provides for e-transactions in the operations of
state agencies; the civil, business, commercial and other sectors prescribed by
law.
The provisions of this Law shall not apply to the grant of
certificates of land use rights, house ownership right and immovable
properties, inheritance documents, marriage certificates, divorce decisions,
birth certificates, death certificates, bills of exchange and other valuable
papers.
Article 2.- Subjects
of application
This Law shall apply to agencies, organizations and
individuals opting for transactions by electronic means.
Article 3.- Application
of the Law on E-Transactions
In case of difference between the provisions of the Law on
E-Transactions and other provisions of law on the same matter related to
e-transactions, the provisions of the Law on E-Transactions shall apply.
Article 4.- Term interpretation
In this Law, the following terms are construed as follows:
1. An e-certificate means
a data message issued by an e-signature certification service-providing
organization in order to verify that the certified agency, organization or
individual is the person having made the e-signature.
2. Certification of an e-signature means
verification that the certified agency, organization or individual is the
person having made the e-signature.
3. Electronic signing program means
a computer program established to operate independently or through equipment,
information system, other computer programs in order to create an e-signature
typical for the person who signs data messages.
4. Database means
a compilation of data arranged and organized for access, exploitation,
management and updating of information through electronic means.
5. Data mean
information in form of symbol, script, numeral, image, sound or the like.
6. An e- transaction means a transaction implemented
by electronic means
7. An automatic e-transaction means an e-transaction
which is automatically performed in part or in whole through a pre-established
information system.
8. An information system means
a system established for sending, receiving, storing, displaying or another
processing with respect to data messages.
9. An intermediary means an
agency, organization or individual, that represents another agency,
organization or individual to send, receive or store a data message or to
provide other services relating to such data message.
10. An electronic means is
a means that operates based on electric, electronic, digital, magnetic,
wireless, optical, electro-magnetic technologies or similar technologies.
11. A security control process is a process used to
verify sources of data messages, e-signatures; to discover changes or mistakes
appearing in the content of a data message in the process of transmission,
receipt and storage.
12. A data message means
information created, transmitted, received and stored by electronic means.
13. An e-signature certification
service-providing organization means an organization carrying
out e-signature certification activities in accordance with the provisions of
law.
14. An online service-providing
organization means an organization providing transmission line
infrastructure and other relevant services to carry out e-transactions. Online
service-providing organizations include Internet access providers, Internet
service providers and online service providers.
15. Electronic data interchange
(EDI) means the transfer of information from one computer to
another by electronic means in accordance with an agreed standard on
information structure.
Article 5.- General
principles in e-transactions
1. To voluntarily select electronic means for transactions.
2. To mutually agree on the selection of type of technology
for e-transactions.
3. No technology shall be considered the sole [technology]
in e-transactions.
4. To ensure equality and security in e-transactions.
5. To protect lawful rights and interests of agencies,
organizations, individuals, interests of the State and public interests.
6. E-transactions of State agencies must comply with the
principles stipulated in Article 40 of this Law.
Article 6.- Policies
on development and application of e-transactions
1. To give priority to the development of technological
infrastructure and training of human resources related to e-transactions.
2. To encourage agencies, organizations and individuals to
invest in and apply e-transactions in accordance with the provisions of this
Law.
3. To support e-transactions in public services.
4. To step up the implementation of e-commerce,
transactions by electronic means and computerization of the state bodies'
operations.
Article 7.- Contents
of the state management of e-transactions
1. To issue and organize the implementation of strategies,
plannings, plans and policies for developing and applying e-transactions in the
socio-economic, defence and security domains.
2. To promulgate, propagate and implement legal documents
on e-transactions.
3. To promulgate and recognize e-transaction standards.
4. To manage organizations providing services related to
e-transactions.
5. To manage the development of technological
infrastructure for e-transaction activities.
6. To organize and manage the training, fostering and
building of the contingent of personnel and experts in the e-transaction
domain.
7. To inspect and supervise the implementation of law on
e-transactions; to settle complaints and denunciations, to handle acts of
violating law on e-transactions.
8. To manage and carry out activities of international
cooperation on e-transactions.
Article 8.- Responsibilities
of the state management of e-transactions
1. The Government shall exercise the uniform management
over e-transaction activities.
2. The Ministry of Post and Telematics shall take
responsibility before the Government, assuming the prime responsibility for,
and coordinating with relevant ministries and branches in, exercising the state
management of e-transaction activities.
3. Ministries and ministerial-level agencies shall, within
the ambit of their tasks and powers, have to exercise the state management over
e-transaction activities.
4. People's Committees of provinces or centrally-run cities
shall, within the ambit of their tasks and power, exercise the state management
of e-transaction activities in their respective localities.
Article 9.- Prohibited acts in e-transactions
1. Obstructing the selection of the use of e-transactions.
2. Illegally obstructing or preventing the process of
transmitting, sending and receiving data messages.
3. Illegally modifying, deleting, cancelling,
counterfeiting, copying, disclosing, displaying or moving part or whole of a
data massage.
4. Creating or disseminating software programs that
trouble, change or destroy operating system or committing other acts to destroy
the technological infrastructure on e-transactions.
5. Creating data messages in order to commit illegal acts.
6. Tricking, wrongly identifying, appropriating or illegal
using e-signatures of others.
Chapter
II
DATA
MESSAGE
Section 1. LEGAL VALIDITY OF DATA MESSAGES
Article 10.- Formats
of data message
A data message may be shown in the form of electronic data
interchange, electronic documents, e-mails, telegrams, telegraphs, facsimiles
and other similar forms.
Article 11.- Legal
validity of data message
Information in data messages cannot have its legal validity
disclaimed for the sole reason that it is expressed in the form of data
messages.
Article 12.- Data messages being as valid as
documents
Where the law requires information to be in writing, a data
message shall be considered having met this condition if the information
contained therein is accessible and usable for reference when necessary.
Article 13.- Data message being as
valid as original copy
A data message shall be as valid as an original copy when
satisfying the following conditions:
1. The contents of the data message are kept intact since
its first origination in the form of a complete data message.
The contents of a data message are considered intact when
they remain unchanged, except for changes in their appearance, which arise in
the process of sending, storage or display of the data message.
2. The contents of the data message are accessible and
usable in its integrity for reference when necessary.
Article 14.- Data message being as
valid as evidence
1. A data message cannot be disclaimed in terms of its
validity as evidence for the sole reason that it is a data message.
2. The validity as evidence of a data message shall be
determined based on the reliability of the manner in which the data message was
generated, stored or communicated; the manner to ensure and maintain the
integrity of the data message; the manner in which its originator was
identified, and on other relevant factors.
Article 15.- Storage of data message
1. In cases where the law requires records, files or
information to be stored, such records, files or information can be stored in
the form of data messages when the following conditions are satisfied:
a/ The information in the data message is accessible and
usable for reference when necessary;
b/ The contents of such data message are stored in the very
format in which it was originated, sent or received, or in a format which can
be demonstrated to represent accurately its contents;
c/ Such data message is stored in a manner to enable the
identification of its origin, destination, and the date and time when it was
sent or received.
2. Contents and time limit for storage of data message
shall comply with the provisions of law on storage.
Section 2. SENDING AND RECEIPT OF DATA MESSAGES
Article 16.- Originator of a data
message
1. The originator of a data message shall be an agency,
organization or individual that creates or sends the data message before such
message is stored, excluding any intermediary transmitting the data message.
2. Where parties to a transaction do not agree otherwise,
the identification of the originator of a data message shall be as follows:
a/ A data message is considered as that of the originator
if it is sent by the originator or by an information system established and
designated by the originator to operate automatically;
b/ The recipient may consider a data message as being that
of the originator if [the recipient] has applied the verification methods
approved by the originator and such methods give the result that such data
message is of the originator;
c/ As from the time the recipient becomes aware of
technical errors in the transmission of a data message or has applied
error-detecting methods approved by the originator, the provisions of Points a
and b of this Clause shall not apply.
3. The originator shall take responsibility before law for
the contents of the data message he/she/it has originated.
Article 17.- Time and place of sending
a data message
Unless otherwise agreed upon by the parties to a
transaction, the time and place of sending a data message is provided for as
follows:
1. The time of sending a data message is the point of time
when such data message enters an information system outside the control of the
originator;
2. Place of sending a data message is the headquarters of
the originator if the originator is an agency or organization or the permanent
residence of the originator if the originator is an individual. If the
originator has more than one headquarters, the place of sending the data
message is the one which has the closest relationship with the transaction.
Article 18.- Receipt
of a data message
1. The recipient of a data message is the person who is
designated to receive the data message from its originator but does not mean
any intermediary transmitting such data message.
2. Unless otherwise agreed upon by the parties to the
transaction, the receipt of a data message is provided for as follows:
a/ The recipient of a data message is deemed in receipt of
such message if the message is entered into an information system designated by
him/her/it and accessible;
b/ The recipient may consider each data message an
independent one unless such message is a copy of another data message and the
recipient knows or ought to know that it is a copy;
c/ Where the originator has required or agreed with the
recipient before or during the sending of a data message that the recipient
must send an acknowledgement of the receipt of such message, the recipient must
comply with such request or agreement;
d/ Where the originator, before or during the sending of a
data message, has stated that such message will be valid only when he/she/it
receives an acknowledgement, such data message shall be considered having not
been sent till the originator receives a written acknowledgement of the receipt
of such message from the recipient;
e/ Where the orginator has already sent a data message
without stating that the recipient must send an acknowledgement and has not yet
received the acknowledgement, the originator may notify the recipient that no
acknowledgement has been received and set a reasonable duration for the
recipient to send the acknowledgement. If the originator still fails to receive
any acknowledgement within the specified duration, he/she/it may treat the data
message as though it had never been sent.
Article 19.- Time and place of receiving a
data message
Unless otherwise agreed upon by the parties to the
transaction, the time and place of receiving a data message are provided for as
follows:
1. If the recipient has designated an information system
for receiving a data message, the mesage-receiving time shall be the time when
the data message enters the designated information system; if the recipient has
not designated a specific information system for receiving the data message,
the mesage-receiving time shall be the time when the data message enters any
information system of the recipient.
2. The place of receiving a data message shall be the
headquarters of the recipient if the recipient is an organization or the
permanent residence of the recipient if the recipient is an individual. If the
recipient has more than one headquarters, the place of receiving the data
message shall be the headquarters, which has the closest relationship with the
transaction.
Article 20.- Automatic sending and
receipt of data messages
If the orginator or the recipient has designated one or
several information systems for the purpose of automatic sending or receipt of
data messages, the provisions of Articles 16, 17, 18 and 19 of this Law shall
apply.
Chapter
III
E-SIGNATURES
AND CERTIFICATION OF E-SIGNATURES
Section 1. LEGAL VALIDITY OF E-SIGNATURES
Article 21.- E-signatures
1. An e-signature is established in the form of words,
letters, numerals, symbols, sounds or other forms by electronic means,
logically attached or associated with a data message and capable of certifying
the person who has signed it as well as the approval of such person to the
content of the signed data message.
2. An e-signature shall be considered secured if it
satisfies the conditions stipulated in Clause 1, Article 22 of this Law.
3. E-signatures may be certified by e-signature
certification service providing organizations.
Article 22.- Conditions to ensure
security of e-signatures
1. An e-signature is considered secured if it is verified
by a security verifying process agreed upon by transacting parties and
satisfying the following conditions:
a/ E-signature creation data are attached only to the
signatory in the context that such data are used;
b/ E-signature creation data are under the control of only
the signatory at the time of signing;
c/ All changes to the e-signature after the time of signing
are detectable;
d/ All changes to the contents of the data message after
the time of signing are detectable.
2. E-signatures certified by e-signature certification
service-providing organizations shall be considered having satisfied the
security conditions mentioned in Clause 1 of this Article.
Article 23.- Principles of using e-signatures
1. Unless otherwise provided for by law, the parties to a
transaction have rights to reach agreement:
a/ To use or not to use e-signatures to sign data message
in the transaction process; b/ To use or not to use the certified e-signature;
c/ To select an e-signature certification service-providing
organization in cases where there is an agreement on the use of the certified
e-signature.
2. E-signatures of state agencies must certified by
e-signature certification service providing organizations defined by competent
state agencies.
Article 24.- Legal validity of e-signatures
1. Where the law requires a document to be signed, such
requirement with respect to a data message shall be considered having been met
if an e-signature used for signing such data message satisfies the following
conditions:
a/ The method of creating the e-signature permits to
identify the signatory and to indicate his/her approval of the contents of the
data message;
b/ Such method is sufficiently reliable and appropriate to
the purpose for which the data message was originated and sent.
2. Where the law requires a document to be stamped with
seal of the concerned agency or organization, such requirement with respect to
a data message shall be considered having been met if the data message has an
e-signature of the agency or organization that satisfies the conditions
stipulated in Clause 1, Article 22 of this Law and the e-signature is
certified.
3. The Government shall specify the management and use of
e-signatures by agencies and organizations.
Article 25.- Obligations of the signatory of
an e-signature
1. A signatory of an e-signature
or his/her legal representative is the person who controls the electronic
signing program and uses such equipment to certify his/her will regarding the
signed data message.
2. A signatory of an e-signature
shall have the following obligations:
a/ To take measures to avoid unauthorized use of his/her
e-signature-creating data;
b/ To promptly use appropriate means to notify parties that
accept the e-signature and the e-signature certification service-providing
organization in case the e-signature is certified, when discovering that the
e-signature may not be under his/her control;
c/ To apply necessary measures to ensure the accuracy and
integrity of information included in the e-certificate in case such certificate
is used to certify the e-signature.
3. A signatory shall take
responsibility before law for all consequences of his/her failure to comply
with the provisions of Clause 2 of this Article.
Article 26.- Obligations
of the party accepting e-signatures
1. A party accepting e-signatures is the one that has
implemented the contents in the received data messages based on the reliability
of such e-signatures and e-certificates of the sender.
2. A party accepting e-signatures shall have the following
obligations:
a/ To take necessary measures to verify the reliability of
an e-signature before accepting it;
b/ To take necessary measures to verify legal validity of
an e-certificate and any limitation with respect to the e-certificate in case
such e-certificate is used to certify an e-signature.
3. The party accepting e-signatures shall take
responsibility before law for consequences of non-compliance with the
provisions of Clause 2 of this Article.
Article 27.- Recognition
of foreign e-signatures and e-certificates
1. The Government recognizes the legal validity of foreign
e-signatures and e-certificates if such e-signatures or e-certificates have the
same level of reliability as those provided for by law. The determination of
the reliability of foreign e-signatures and e-certificates must be based on
recognized international standards, on treaties to which the Socialist Republic
of Vietnam is a contracting party and other relevant factors.
2. The Government shall specify the recognition of foreign
e-signatures and e-certificates.
Section 2. E-SIGNATURE CERTIFICATION SERVICES
Article 28.- E-signature certification
service activities
1. Issuing, extending, suspending, restoring and revoking
e-certificates.
2. Providing necessary information to assist the
certification of e-signatures of persons who sign data messages.
3. Providing other services related to e-signatures and
e-signature certification in accordance with the provisions of law.
Article 29.- Contents of an
e-certificate
1. Information on the
e-signature certification service-providing organization.
2. Information on the agency, organization or individual to
whom the e-certificate is issued.
3. The identification number of the e-certificate.
4. The valid term of the e-certificate.
5. The data for examining the e-signature of the person who
is granted the e-certificate.
6. The e-signature of e-signature certification
service-providing organization.
7. Limitations on the purpose or scope of using the
e-certificate.
8. Limitations on legal liabilities of the e-signature
certification service-providing organization.
9. Other contents as provided for by the Government.
Article 30.- E-signature certification
service-providing organizations
1. E-signature certification
service-providing organizations include public e-signature certification
service-providing organizations and specialized e-signature certification
service-providing organizations which are licensed to carry out e-signature
certification activities in accordance with the provisions of law.
2. A public e-signature certification service-providing
organization is an organization providing e-signature certifications services
to agencies, organizations or individuals for use in public activities.
Activities of providing public e-signature certification services are
conditional business activities as provided for by law.
3. A specialized e-signature certification
service-providing organization is an organization providing e-signature
certification services to agencies, organizations or individuals for use in
specialized activities or domains. Activities of providing specialized
e-certification services must be registered with state management bodies in
charge of e-signature certification services.
4. The Government shall specify the establishment,
organization, business registration, operation and mutual recognition of
e-signature certification service-providing organizations defined in Clauses 2
and 3 of this Article.
Article 31.- Rights and obligations of
e-signature certification service- providing organizations
1. E-signature certification service-providing
organizations shall have the following rights and obligations:
a/ To carry out the e-signature certification service
activities specified in Article 28 of this Law;
b/ To comply with the provisions of law on e-signature
certification service-providing organizations;
c/ To use reliable technical equipment, processes and
resources to perform their tasks;
d/ To guarantee the accuracy and integrity of substantial
contents of e-certificates they have issued;
e/ To publicize information on e-certificates, which have
been issued, extended, suspended, restored or revoked;
f/ To provide appropriate facilities to enable the
e-signature-accepting parties and competent state agencies to rely on
e-certificates to ascertain the origin of data messages and e-signatures;
g/ To notify the relevant parties of all incidents, which
affect the certification of e-signatures.
h/ To publicize and notify the e-certificate grantees, and
relevant management agencies of the suspension or termination of their
operation within 90 days prior thereto.
i/ To archive information related to e-certificates they
have issued for at least five years after such e-certificates become invalid.
j/ Other obligations as provided by law.
2. The Government shall specify the rights and obligations
of e-signature certification service-providing organizations defined in Clause
1 of this Article.
Section 3. MANAGEMENT OF E-SIGNATURE CERTIFICATION SERVICES
Article 32.- Conditions for providing
e-signature certification services
1. E-signature certification service-providing
organizations must fully meet the following conditions:
a/ Having adequate professional technical and managerial
staff to provide e-signature certification services.
b/ Having adequate technical means and equipment suitable
to national security and safety standards;
c/ Registering the provision of e-signature certification
services with the state management bodies.
2. The Government shall specify the following contents:
a/ Order and procedures for registration of e-signature
certification service- providing activities.
b/ Technical standards, processes, human resources and
other conditions necessary for e-signature certification service-providing
activities.
c/ Contents and forms of e-certificates.
d/ Procedures for issuance, extension, suspension,
restoration and revocation of e-certificates.
e/ The storage and disclosure of information related to
e-certificates issued by e-certification service-providing organizations.
f/ Conditions and procedures for foreign e-signature
certification service-providing organizations to provide e-signature
certification services in Vietnam.
g/ Other contents necessary for e-signature certification
service-providing activities.
Chapter
IV
ENTRY
INTO AND EXECUTION OF E-CONTRACTS
Article 33.- E-contracts
E-contracts mean contracts established in the form of data
messages provided for in this Law.
Article 34.- Recognition of legal
validity of e-contracts
The legal validity of an e-contract cannot be disclaimed
for the sole reason that it is expressed as a data message.
Article 35.- Principles of entry into
and execution of e-contracts
1. Participating parties shall have the right to reach
agreement on the use of electronic means in the entry into and execution of
contracts.
2. The entry into and execution of an e-contract shall
comply with the provisions of this Law and law on contracts.
3. When entering into and executing e-contracts, the
parties shall have the right to reach agreement on technical requirements,
certification, conditions to ensure integrity and confidentiality related to
such e-contracts.
Article 36.- Entry into e-contracts
1. Entry into e-contracts means the use of data messages to
execute part or whole of transactions in the process of entering into
contracts.
2. In the process of entering into contracts, unless
otherwise agreed upon by concerned parties, an offer to enter into a contract
and acceptance of the offer to enter into the contract may be carried out
through data messages.
Article 37.- Receipt, sending, time, location
of sending or receiving data messages in entering into and execution of
e-contracts
The receipt, sending, time, location of sending or
receiving data messages in entering into and execution of e-contracts shall be
comply with Articles 17, 18, 19 and 20 of this Law.
Article 38.- Legal
validity of a notice in entry into and execution of e-contracts
In the process of entering into and execution of an
e-contract, a notice in the form of a data message shall be legally valid as a
notice in another traditional form.
Chapter V
E-TRANSACTIONS
OF STATE AGENCIES
Article 39.- Types of e-transactions of state
agencies
1. E-transactions within a state agency;
2. E-transactions among different state agencies;
3. E-transactions between state agencies and other
agencies, organizations and individuals.
Article 40.- Principles for conducting
e-transactions of state agencies
1. Principles are provided for in Clauses 3, 4 and 5 of
Article 5 of this Law.
2. E-transactions of state agencies must comply the
provisions of this Law and relevant provisions of law.
3. A state agency shall, within its tasks and powers, take
initiative in carrying out a part or all of transactions within it or with
other state agencies by electronic means.
4. Based on socio-economic development conditions and their
specific situations, state agencies shall determine a rational roadmap for the
use of electronic means in the transaction types stipulated in Article 39 of
this Law
5. Agencies, organizations and individuals shall have the
right to select modes of transaction with state agencies if such state agencies
concurrently accept transactions both in traditional forms and by electronic
means, unless otherwise provided for by law.
6. When conducting e-transactions, state agencies must
specify the following:
a/ Formats and forms of data messages;
b/ Types of e-signature, certification of e-signatures, for
transactions requiring e-signatures or certification of e-signatures;
c/ Processes to ensure the integrity, security and
confidentiality of e-transactions.
7. The provision of public services by state agencies in
electronic forms shall be based on their respective regulations which, however,
must not be contrary to the provisions of this Law and relevant provisions of
law.
Article 41.- Security, confidentiality
and storage of electronic information in state agencies
1. Periodically examining and ensuring security of
electronic data systems of their respective agencies in e-transaction process.
2. Ensuring confidentiality of information related to
e-transactions; not using information for other purposes contrary to the
regulations on the use of such information; not disclosing information to a
third party under the provisions of law.
3. Ensuring the integrity of data messages in
e-transactions they conduct; ensuring security in operation of their computer
networks;
4. Creating databases of corresponding transactions,
ensuring information security and having standby systems to recover information
in case of errors of the electronic information system.
5. Ensuring security, confidentiality and storage of
information in accordance with the provisions of this Law and other relevant
provisions of law.
Article 42.- Responsibilities of state
agencies in case of errors of e-information systems
1. Where the e-information system of a state agency has
errors, failing to ensure the security of data messages, such agency shall have
to immediately notify the users thereof and take necessary measures to correct
the errors.
2. State agencies shall take responsibility before the law
for failure to comply with the provisions of Clause 1 of this Article.
Article 43.- Responsibilities
of agencies, organizations and individuals in e-transactions with state
agencies
Agencies, organizations and individuals, when conducting
e-transactions with state agencies, shall comply with the provisions of this
Law, the regulations on e-transactions, issued by competent state agencies and
other relevant provisions of law.
Chapter
VI
SECURITY,
SAFETY, PROTECTION, CONFIDENTIALITY IN E-TRANSACTIONS
Article 44.- Ensuring security and
safety in e-transactions
1. Agencies, organizations and individuals shall have the
right to select measures to ensure security and safety in accordance with the
provisions of law when conducting e-transactions.
2. Agencies, organizations and individuals conducting
e-transactions must take necessary measures to ensure smooth operations of
information systems under their control; if causing technical errors to such
information systems which cause damage to other agencies, organizations and/or
individuals, they shall be handled in accordance with the provisions of law.
3. Agencies, organizations and individuals must not take
any action that prevents or adversely affects the protection of security and
safety in e-transactions.
Article 45.- Protection of data
messages
Agencies, organizations and individuals must not take any
action that adversely affects the integrity of data messages of other agencies,
organizations and/or individuals.
Article 46.- Information
confidentiality in e-transactions
1. Agencies, organizations and individuals shall have the
right to select security measures in accordance with the provisions of the law
when conducting e-transactions.
2. Agencies, organizations and individuals must not use,
provide or disclose information on private and personal affairs or information
of other agencies, organizations and/or individuals which is accessible by them
or under their control in e-transactions without the latter's consents, unless
otherwise provided for by law.
Article 47.- Responsibility of online
service-providing organizations
1. Online service-providing organizations shall have to
co-coordinate with concerned agencies in elaborating management regulations and
adopting technical measures to prevent and stop the use of their network
services for dissemination of data messages which are against the cultural
traditions, national ethics, or prejudicial to the national security, public
order and safety or violate other provisions of law.
2. Online service-providing organizations shall take
responsibility before law for delayed removal of data messages defined in
Clause 1 of this Article, when they have received notices from competent state
agencies.
Article 48.- Responsibilities of agencies,
organizations and individuals upon the request of competent state agencies
1. When requested by competent state agencies, agencies,
organizations and/or individuals shall have the following responsibilities:
a/ To store a particular data message, including the
transfer of data to another computer system or another storage place;
b/ To maintain the integrity of a particular data message;
c/ To present or provide a particular data message,
including its password and other encryption methods which they have or control;
d/ To present or provide information on the user of
services in cases where the requested agencies, organizations or individuals
are service providers controlling such information;
e/ Other responsibilities provided for by law.
2. Competent state agencies shall take responsibility
before law for their requests.
Article 49.- Rights and
responsibilities of state agencies
1. Competent state agencies shall have the following
rights:
a/ To search or access part or all of a computer system and
data messages in such system;
b/ To seize part or all of the computer system;
c/ To copy and store copies of data messages;
d/ To prevent access to a computer system;
e/ Other rights provided for by law.
2. When exercising the rights stipulated in Clause 1 of
this Article, competent state agencies shall take responsibility before law for
their decisions.
Chapter
VII
DISPUTE
SETTLEMENT AND VIOLATION HANDLING
Article 50.- Handling of violations of
law on e-transactions
1. Any person violating law on e-transactions shall,
depending on the nature and seriousness of their violations, be disciplined,
administratively sactioned or examined for penal liabilities and, if causing
damage, pay compensation under the provisions of law.
2. Agencies or organizations that commit acts of violating
law on e-transactions shall, depending on the nature and seriousness of their
violations, be administratively sanctioned, suspended from operation, and if
causing damage, pay compensation therefor under the provisions of law.
Article 51.- Disputes in e-transactions
Disputes in e-transactions are disputes arising in the
course of transaction by electronic means.
Article 52.- Settlement of disputes in
e-transactions
1. The State encourages the disputing parties in
e-transactions to settle disputes by themselves through concilliation.
2. Where the parties cannot resolve their disputes, the
competence, order and procedures for the settlement of disputes over
e-transactions shall comply with the provisions of law.
Chapter
VIII
IMPLEMENTATION
PROVISIONS
Article 53.- Effect
This Law shall take effect as from March 1, 2006.
Article 54.- Implementation guidance
The Government shall detail and guide the implementation of
this Law.
This Law was passed on November 29, 2005, by the XIth
National Assembly of the Socialist Republic of Vietnam at its 8th session.
CHỦ
TỊCH QUỐC HỘI |
|||
(Signed) |
|||
|
|||
Nguyen Van An |
Không có nhận xét nào:
Đăng nhận xét