However he explicitly emphasizes that the extension of the deadline refers to draft laws on cyber security and the amending law not to decrees where the original deadline of July apparently applies. At the same time implementing decrees can be the proverbial detail offering the devil a hiding place.It will undoubtedly be interesting for us to see how the comment centers i.e. defending the interests of industry and entrepreneurs react to the completely new national regulation of cyber security.
Therefore we will devote a separate section to these comments when they are fully Indonesia WhatsApp Number Data published.But today we have a deeper dive into the narrower of the pair of decrees we will look at the obligations imposed in the milder regime i.e. what specific security measures must be met by entities in the important category .Right from the beginning the decree divides the persons involved in cyber security solutions according to the degree of their authorization.
At the bottom level we have the user which can be both a natural and a legal person or even a public authority that uses the assets. Above it is the privileged user whose actions are believed to have a significant impact on the security of the regulated service. In principle it will still be a user but with higher privileges. And at the very top we find the administrator . This is always a privileged user ensuring the management operation maintenance and security of the technical asset.