Unofficial transfer (c) Soyuzpravoinform LLC
of May 16, 2023 No. 497
About approval of the Procedure for search and detection of potential vulnerability of the information (automated), electronic communication, information and communication systems, electronic communication networks
According to Item 2 of the Section II "Final provisions" of the Law of Ukraine "About introduction of amendments to the Criminal code of Ukraine concerning increase in efficiency of fight against cybercrime in the conditions of action of warlike situation" the Cabinet of Ministers of Ukraine decides:
Prime Minister of Ukraine
D. Shmygal
Approved by the Resolution of the Cabinet of Ministers of Ukraine of May 16, 2023, No. 497
1. This Procedure determines the mechanism of implementation of search and detection of potential vulnerability of the information (automated), electronic communication, information and communication systems, electronic communication networks (further - search of potential vulnerability of system) by development and carrying out programs of search and detection of vulnerabilities for remuneration and the approved disclosure of vulnerabilities.
Action of this Procedure does not extend to the information (automated), electronic communication, information and communication systems, electronic communication networks in which the office information and/or information which is the state secret, prospecting secret, bank secrecy is processed.
2. In this Procedure terms are used in the following value:
Disclaimer! This text was translated by AI translator and is not a valid juridical document. No warranty. No claim. More info
Database include more 50000 documents. You can find needed documents using search system. For effective work you can mix any on documents parameters: country, documents type, date range, teams or tags.
More about search system
If you cannot find the required document, or you do not know where to begin, go to Help section.
In this section, we’ve tried to describe in detail the features and capabilities of the system, as well as the most effective techniques for working with the database.
You also may open the section Frequently asked questions. This section provides answers to questions set by users.