The Hong Kong Legislative Council passed the Protection of Critical Infrastructures (Computer Systems) Bill (the “CI Bill”) on March 19, 2025, and it became effective on January 1, 2026. It is the first dedicated cybersecurity law in Hong Kong to protect the security of the critical computer systems (CCS) of critical infrastructures (CIs), to regulate CIs’ operators (i.e., critical infrastructure operators (CIO)), and to provide for the investigation into, and response to, computer-system security threats and incidents.
The first version of the Code of Practice (CoP), released on January 1, 2026, by the Office of the Commissioner of Critical Infrastructure (Computer-system Security), provides practical guidance on how a CIO complies with category obligations.
The regulation covers two major categories of critical infrastructure (CI):
Examples:
Critical Computer Systems (CCS)
CCSs refer to computer systems that are relevant to the provision of essential service of the core functions of computer systems, and those systems which, if interrupted or damaged, will seriously impact the normal functioning of the critical infrastructure.
Critical Infrastructure Operators (CIO)
Designated operators which operate a Specified CI.
CIO will need to fulfill three types of obligations below:
The Code of Practice (Code) of the Protection of Critical Infrastructures (Computer Systems) Ordinance is issued in respect of CIO obligations to set out recommended standards and provide practical guidance to CIOs to fulfil the obligations.
The Chief Executive of Hong Kong appointed a new Commissioner of Critical Infrastructure (Computer-system Security), who, along with the designated authorities in Schedule 2 of the CI Bill for specific sectors (currently the Monetary Authority and the Communications Authority), (“Designated Authorities”), will serve as the regulating authorities.
Concerning the relevant legislation of the UK and EU, the penalties under the Bill will only include fines, with maximum level ranging from HK$500,000 to HK$5 million, and additional daily fines for persistent non-compliance for certain continuing offences, the maximum of which range from HK$50,000 to HK$100,000.
The obligations and requirements under the Bill which will result in offences and penalties for non-compliance will be imposed on CIOs at the organizational level only, and are not designed to target at their staff at individual level.
Explore solutions for The Protection of Critical Infrastructures (Computer Systems) Ordinance (PCICSO) by simplifying compliance and automating security reducing the burden on security and compliance teams.
The Protection of Critical Infrastructures (Computer Systems) Ordinance strengthens the cybersecurity of critical infrastructure and minimize disruption of essential services in Hong Kong; Thales’ solutions can help CIOs address the requirements in the Code of the Ordinance by simplifying compliance and automating security reducing the burden on security and compliance teams.
Protection of Critical Infrastructures Bill Compliance Solutions
Protect applications and APIs at scale in the cloud, on-premises, or in a hybrid model. Our market leading product suite includes Web Application Firewall (WAF), protection against Distributed Denial of Service (DDoS) and malicious BOT attacks, security for APIs, a secure Content Delivery Network (CDN), and Runtime Application Self-Protection (RASP).
Discover and classify sensitive data across hybrid IT and automatically protect it anywhere, whether at rest, in motion, or in use, using encryption tokenization and key management. Thales solutions also identify, evaluate, and prioritize potential risks for accurate risk assessment as well as identify anomalous behavior, and monitor activity to verify compliance, allowing organizations to prioritize where to spend their efforts.
Provide seamless, secure and trusted access to applications and digital services for customers, employees and partners. Our solutions limit the access of internal and external users based on their roles and context with granular access policies and Multi-Factor Authentication that help ensure that the right user is granted access to the right resource at the right time.
Data Security
Identity & Access Management
Identity & Access Management
Data Security
Data Security
Identity & Access Management
Identity & Access Management
Application Security
Data Security
Identity & Access Management
Application Security
Data Security