The National Assembly has passed the Law on Network Security (amended), this law takes effect from July 1, 2026.
This law stipulates many prohibited cybersecurity acts.
Accordingly, it is prohibited to fabricate, slander, false information, infringe on the dignity, honor, and prestige of others or cause damage to the legitimate rights and interests of other agencies, organizations, and individuals.
Prohibit false information causing panic among the people, causing damage to socio-economic activities, causing difficulties for the normal operation of state agencies or law enforcement officers, and infringing upon the legitimate rights and interests of other agencies, organizations, and individuals.
At the same time, prohibit fabricated and untrue information about products, goods, money, bonds, bills of lading, bonds, checks and other valuable papers; fabricated and untrue information in the fields of finance, banking, e-commerce, multi-level marketing, and securities.
In particular, prohibit appropriation, purchase, sale, seizure, intentional disclosure of information belonging to state secrets, work secrets, business secrets, personal secrets, family secrets and private life affecting the honor, prestige, dignity, rights and legitimate interests of agencies, organizations, and individuals.
This law also stipulates the prohibition of intentionally eavesdropping, illegally recording audio and video of conversations in cyberspace; disclosure of information about civil cryptography products, information about customers legally using civil cryptography products; use and business of civil cryptography products of unknown origin.
Prohibit fraud and appropriation of property; organizing gambling, online gambling; propaganda, advertising, buying and selling goods and services on the list of prohibited items according to the provisions of law;
Forging websites of agencies, organizations, and individuals; forging, circulating, stealing, buying and selling, illegally collecting and exchanging credit card information, bank account information, encrypted assets, and digital assets of others; forging documents of agencies and organizations.
Do not use artificial intelligence (AI) or new technologies to imitate videos, images, or voices of others in violation of the law; collect, use, disseminate, exchange, transfer, or do business illegally in personal information and data of others.
Prohibit illegal intrusion into telecommunications networks, computer networks, information systems, information processing and control systems, databases, and electronic means of others.
Combating or obstructing the operation of network security forces; attacking and illegally neutralizing network security measures, losing their effectiveness.
Exploiting or abusing network security protection activities to infringe upon sovereignty, interests, national security, social order and safety, legitimate rights and interests of agencies, organizations, individuals or for personal gain.