• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
location iconSuite 503, 5/F, St. George's Building, 2 Ice House Street, Central, Hong Kongphone-icon +852 2868 0696 linkedintwitterfacebook
OLN IP Services
close-btn
OLN IP Services
Get bespoke and commercially-driven advice to your Intellectual Property
Learn More
OLN IP Services
OLN Online
close-btn
OLN Online
Powered by Oldham, Li & Nie, the law firm of choice for Hong Kong’s vibrant startup and SME community, OLN Online is a forward-looking and seamless addition to traditional legal services – a true disruptor.
Learn More
OLN IP Services
  • 日本語
    • ENG
    • 简
    • 繁
    • FR
Oldham, Li & Nie
OLN IP Services
close-btn
OLN IP Services
Get bespoke and commercially-driven advice to your Intellectual Property
Learn More
OLN IP Services
OLN Online
close-btn
OLN Online
Powered by Oldham, Li & Nie, the law firm of choice for Hong Kong’s vibrant startup and SME community, OLN Online is a forward-looking and seamless addition to traditional legal services – a true disruptor.
Learn More
OLN IP Services
  • について
        • 受賞歴・ランキング
        • 企業の社会的責任
  • 業務内容
        • Canadian Notarization Services
        • チャイナ法務
        • 人事労務・就労系ビザ関連法
        • 破産法
        • 人身傷害に関する法
        • 税務
        • 企業法務
        • 家族法
        • 保険法
        • プライベートクライアント
        • 商取引上の不正・資産回復
        • フランス法務
        • 知的財産法
        • 金融サービス・許認可
        • 紛争解決
        • ファンドプラクティス
        • 公証業務
        • ジャパニーズ・プラクティス
        • スタートアップ
        • Canadian Notarization Services
        • チャイナ法務
        • 家族法
        • 金融サービス・許認可
        • 人事労務・就労系ビザ関連法
        • 保険法
        • 紛争解決
        • 破産法
        • プライベートクライアント
        • ファンドプラクティス
        • 人身傷害に関する法
        • 商取引上の不正・資産回復
        • 公証業務
        • 税務
        • フランス法務
        • ジャパニーズ・プラクティス
        • 企業法務
        • 知的財産法
        • スタートアップ
  • 弁護士紹介
  • インサイト
  • 事業拠点

Suite 503, St. George's Building,
2 Ice House Street, Central, Hong Kong

Tel. +852 2868 0696 | Send Email
linkedin twitter facebook
OLN Blue

OLN

  • Block Content Examples
  • Client Information & Registration
  • Contact Us
  • Cookie Policy (EU)
  • Globalaw
  • Oldham, Li & Nie
  • OLNと地域社会
  • OLNポッドキャスト
  • Our People
  • Privacy Policy
  • Review
  • Reviews
  • Standard Terms of Engagement
  • 事業拠点
  • 受賞歴・ランキング
  • 当事務所について
  • 当事務所の歴史
    • OLN | おける企業としての社会的責任
    • 受賞歴・ランキング
  • 採用を希望する方へ
  • 業務内容
  • 評判
  • について
        • 受賞歴・ランキング
        • 企業の社会的責任
  • 業務内容
        • Canadian Notarization Services
        • チャイナ法務
        • 人事労務・就労系ビザ関連法
        • 破産法
        • 人身傷害に関する法
        • 税務
        • 企業法務
        • 家族法
        • 保険法
        • プライベートクライアント
        • 商取引上の不正・資産回復
        • フランス法務
        • 知的財産法
        • 金融サービス・許認可
        • 紛争解決
        • ファンドプラクティス
        • 公証業務
        • ジャパニーズ・プラクティス
        • スタートアップ
        • Canadian Notarization Services
        • チャイナ法務
        • 家族法
        • 金融サービス・許認可
        • 人事労務・就労系ビザ関連法
        • 保険法
        • 紛争解決
        • 破産法
        • プライベートクライアント
        • ファンドプラクティス
        • 人身傷害に関する法
        • 商取引上の不正・資産回復
        • 公証業務
        • 税務
        • フランス法務
        • ジャパニーズ・プラクティス
        • 企業法務
        • 知的財産法
        • スタートアップ
  • 弁護士紹介
  • インサイト
  • 事業拠点

Essential Guide: Appointing an In-House Head of Computer System Security

Computer System Security

Essential Guide: Appointing an In-House Head of Computer System Security

3月 3, 2026 by OLN Marketing

Hong Kong’s Protection of Critical Infrastructures (Computer Systems) Ordinance (Cap. 653) sets tough standards for Critical Infrastructure Operators (CIOs) to protect their Critical Computer Systems (CCSs) from cyber risks. A key requirement? Appointing a dedicated in-house head to oversee computer system security. This can’t be outsourced—it must be an internal employee for full accountability.

While these guidelines are tailored to CIOs under Cap. 653, they also serve as best practices for employing any high-level management role, ensuring accountability, smooth transitions, and risk mitigation across organizations.

Based on Cap. 653, Code of Practice (v1.0), and insights from the Office of the Commissioner of Critical Infrastructure (Computer-system Security) (OCCICS) website and FAQs, here’s why this role matters and practical HR tips to handle it smoothly.

The Must-Have In-House Role: Why It Can’t Be Outsourced

CIOs need to set up a security management unit and appoint an employee to lead it (s.21(4); Code of Practice §5.3.2). This falls under Category 1 organizational duties.

  • Purpose: To build strong security governance tailored to your CIO’s unique risks.
  • In-House Requirement: The head must have “adequate professional knowledge” specific to your operations (OCCICS FAQ 6). Outsourcing of computer-system security management units is allowed but the head must be an employee appointed by the CIO (OCCICS FAQ 7).
  • Accountability: While suppliers can help with other tasks (via contracts), core oversight stays internal.
  • Risks of Non-Compliance: Fines up to HK$5 million for the organization (ss. 7, 26, 28 and 70)—but no personal penalties for individuals (OCCICS FAQ 24).

With potential designations looming as of January 16, 2026, prioritize this hire now to stay ahead.

HR Essentials: What to Focus On

Managing this role involves blending HR best practices with regulatory needs. Break it down into key areas:

1. Defining the Role and Finding the Right Fit

The head leads the security unit, handling everything from risk assessments to incident responses. This role is not just an IT function but spans cross-business units (BUs), integrating security with operations, finance, legal, and other areas to address enterprise-wide risks.

  • Core Duties: Create and implement a security plan, including access controls, training, and supply chain checks (Code of Practice §§6.2.5–6.2.27). They co-endorse the plan with top executives and review it every two years or after changes.
  • Qualifications Needed: Look for certifications like CISSP, CISM, or CISA, plus experience matching your CCS threats (Code of Practice §5.3.2).

HR Tip: Involve senior management in hiring to align with strategy—they must grasp its importance for compliance, co-endorsement (Code of Practice §6.2.1), and avoiding fines/risks across BUs (OCCICS FAQ 6). Highlight Ordinance and cross-BU aspects in job postings; verify credentials for OCCICS (Annex C of Code of Practice); onboard with team training (Code of Practice §6.2.27).

2. Handling Changes and Notifications

Any shift in this role counts as a “material change” that must be reported, including during employment termination to maintain continuity and avoid compliance gaps.

  • What Triggers Notification: New hires, departures (such as resignations or terminations), or anything affecting security (s.22(1); Annex D of Code of Practice; OCCICS FAQ 8).
  • How to Report: Use Annex C with details like name, qualifications, and start or end date (Code of Practice §5.3.3).

HR Tip: Include notification clauses in contracts; report to OCCICS immediately post-hire or termination. Require advance exit notice, successor planning, and handover to link with exit protocols and prevent disruptions.

3. Understanding Legal Risks for the Employee

The role is high-stakes, but liability is organizational.

  • No Personal Fines: Penalties hit the CIO, not the individual (OCCICS FAQ 24).
  • Internal Protections: Clear duties help avoid blame in disputes.

HR Tip: Add indemnity clauses (excluding wilful errors); link reviews to security goals for accountability, trust, and lower turnover.

4. Managing Exits: Termination, Garden Leave, and Handovers

Smooth transitions are crucial to maintain continuity (Category 1).

  • Key Concerns: Sudden exits could disrupt operations and require immediate reporting.
  • No Fixed Rules: But longer notice periods help with knowledge transfer.

HR Tip: Use 3–6 month notice periods for handovers (data/knowledge transfer, successor training); apply garden leave for secrecy (s.57, up to HK$1M fines); limit non-competes to sensitive data; ensure pay and audit support.

Wrapping Up: Make It a Smart Move

View this appointment as a boost to your cyber defenses, not just compliance. Keep detailed HR records—they can back due diligence defenses (ss.65–66).

For custom advice, reach out to Oldham Li & Nie. Aligning HR with Cap. 653 now strengthens your position in Hong Kong’s evolving critical infrastructure landscape.

Disclaimer: This article is for reference only. Nothing herein shall be construed as Hong Kong legal advice or any legal advice for that matter to any person. Oldham, Li & Nie shall not be held liable for any loss and/or damage incurred by any person acting as a result of the materials contained in this article.

Filed Under: 企業法務, 商取引上の不正・資産回復 Tagged With: Corporate governance, Cyber Security, Computer System Security

Primary Sidebar

This website uses cookies to optimise your experience and to collect information to customise content. By closing this banner, clicking a link or continuing to browse otherwise, you agree to the use of cookies. Please read the cookies section of our Privacy Policy to learn more. Learn more

Footer

OLN logo

Suite 503, 5/F, St George's Building
2 Ice House Street, Central
Hong Kong

Tel. +852 2868 0696 | Email us
について 弁護士紹介 事業拠点 OLN IP Services プライバシーポリシー
業務内容 インサイト 採用情報 OLN Online
について 業務内容 弁護士紹介 インサイト 事業拠点
採用情報 OLN IP Services OLN Online プライバシーポリシー
linkedin twitter facebook
OLN logo

© 2026 Oldham, Li & Nie. All Rights Reserved.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
お問い合わせ

メッセージの詳細をここで共有してください。すぐにご連絡させていただきます。

    x