• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
location icon香港中环雪厂街二号圣佐治大厦五楼503室phone-icon +852 2868 0696 linkedintwitterfacebook
OLN IP Services
close-btn
OLN IP Services
Get bespoke and commercially-driven advice to your Intellectual Property
Learn More
OLN IP Services
OLN Online
close-btn
OLN Online
Powered by Oldham, Li & Nie, the law firm of choice for Hong Kong’s vibrant startup and SME community, OLN Online is a forward-looking and seamless addition to traditional legal services – a true disruptor.
Learn More
OLN IP Services
  • 简
    • ENG
    • 繁
    • FR
    • 日本語
Oldham, Li & Nie
OLN IP Services
close-btn
OLN IP Services
Get bespoke and commercially-driven advice to your Intellectual Property
Learn More
OLN IP Services
OLN Online
close-btn
OLN Online
Powered by Oldham, Li & Nie, the law firm of choice for Hong Kong’s vibrant startup and SME community, OLN Online is a forward-looking and seamless addition to traditional legal services – a true disruptor.
Learn More
OLN IP Services
  • 关于
        • 奖项与排名
        • 企业社会责任
  • 专业服务
        • 加拿大公证服务
        • 中国事务
        • 破产法
        • 人身伤害法
        • 新创公司
        • 中国委托公证服务
        • 争议解决
        • 长者法律服务
        • 公司和商业法
        • 家事法
        • 保险
        • 香港雇佣法和商业移民法律服务
        • 私人客户 – 遗产规划和遗嘱认证
        • 税务咨询部
        • 投资基金
        • 商业诈骗和资产追踪
        • 法国事务
        • 知识产权法
        • 日本事务
        • 合规、调查和执法
        • 公证服务
        • 金融服务监管部
        • 加拿大公证服务
        • 中国事务
        • 公司和商业法
        • 商业诈骗和资产追踪
        • 争议解决
        • 香港雇佣法和商业移民法律服务
        • 家事法
        • 法国事务
        • 投资基金
        • 破产法
        • 保险
        • 知识产权法
        • 公证服务
        • 人身伤害法
        • 私人客户 – 遗产规划和遗嘱认证
        • 金融服务监管部
        • 新创公司
        • 税务咨询部
        • 日本事务
        • 长者法律服务
        • 合规、调查和执法
        • 中国委托公证服务
  • 律師團隊
  • 最新消息
  • 办事处

Suite 503, St. George's Building,
2 Ice House Street, Central, Hong Kong

Tel. +852 2868 0696 | Send Email
linkedin twitter facebook
OLN Blue

OLN

  • Block Content Examples
  • Client Information & Registration
  • Contact Us
  • Cookie Policy (EU)
  • Globalaw
  • OLN Podcasts
  • Privacy Policy
  • Review
  • 专业服务
  • 关于我们
  • 办事处
  • 加入我们
  • 律師團隊
  • 我们的历史
    • 奖项与排名
    • 高李严律师行的企业社会责任
  • 所获奖项
  • 标准服务条款
  • 联系我们
  • 评价
  • 评语
  • 高李严律师事务所和社区
  • 高李严律师行
  • 关于
        • 奖项与排名
        • 企业社会责任
  • 专业服务
        • 加拿大公证服务
        • 中国事务
        • 破产法
        • 人身伤害法
        • 新创公司
        • 中国委托公证服务
        • 争议解决
        • 长者法律服务
        • 公司和商业法
        • 家事法
        • 保险
        • 香港雇佣法和商业移民法律服务
        • 私人客户 – 遗产规划和遗嘱认证
        • 税务咨询部
        • 投资基金
        • 商业诈骗和资产追踪
        • 法国事务
        • 知识产权法
        • 日本事务
        • 合规、调查和执法
        • 公证服务
        • 金融服务监管部
        • 加拿大公证服务
        • 中国事务
        • 公司和商业法
        • 商业诈骗和资产追踪
        • 争议解决
        • 香港雇佣法和商业移民法律服务
        • 家事法
        • 法国事务
        • 投资基金
        • 破产法
        • 保险
        • 知识产权法
        • 公证服务
        • 人身伤害法
        • 私人客户 – 遗产规划和遗嘱认证
        • 金融服务监管部
        • 新创公司
        • 税务咨询部
        • 日本事务
        • 长者法律服务
        • 合规、调查和执法
        • 中国委托公证服务
  • 律師團隊
  • 最新消息
  • 办事处

Essential Guide: Appointing an In-House Head of Computer System Security

Computer System Security

Essential Guide: Appointing an In-House Head of Computer System Security

March 3, 2026 by OLN Marketing

Hong Kong’s Protection of Critical Infrastructures (Computer Systems) Ordinance (Cap. 653) sets tough standards for Critical Infrastructure Operators (CIOs) to protect their Critical Computer Systems (CCSs) from cyber risks. A key requirement? Appointing a dedicated in-house head to oversee computer system security. This can’t be outsourced—it must be an internal employee for full accountability.

While these guidelines are tailored to CIOs under Cap. 653, they also serve as best practices for employing any high-level management role, ensuring accountability, smooth transitions, and risk mitigation across organizations.

Based on Cap. 653, Code of Practice (v1.0), and insights from the Office of the Commissioner of Critical Infrastructure (Computer-system Security) (OCCICS) website and FAQs, here’s why this role matters and practical HR tips to handle it smoothly.

The Must-Have In-House Role: Why It Can’t Be Outsourced

CIOs need to set up a security management unit and appoint an employee to lead it (s.21(4); Code of Practice §5.3.2). This falls under Category 1 organizational duties.

  • Purpose: To build strong security governance tailored to your CIO’s unique risks.
  • In-House Requirement: The head must have “adequate professional knowledge” specific to your operations (OCCICS FAQ 6). Outsourcing of computer-system security management units is allowed but the head must be an employee appointed by the CIO (OCCICS FAQ 7).
  • Accountability: While suppliers can help with other tasks (via contracts), core oversight stays internal.
  • Risks of Non-Compliance: Fines up to HK$5 million for the organization (ss. 7, 26, 28 and 70)—but no personal penalties for individuals (OCCICS FAQ 24).

With potential designations looming as of January 16, 2026, prioritize this hire now to stay ahead.

HR Essentials: What to Focus On

Managing this role involves blending HR best practices with regulatory needs. Break it down into key areas:

1. Defining the Role and Finding the Right Fit

The head leads the security unit, handling everything from risk assessments to incident responses. This role is not just an IT function but spans cross-business units (BUs), integrating security with operations, finance, legal, and other areas to address enterprise-wide risks.

  • Core Duties: Create and implement a security plan, including access controls, training, and supply chain checks (Code of Practice §§6.2.5–6.2.27). They co-endorse the plan with top executives and review it every two years or after changes.
  • Qualifications Needed: Look for certifications like CISSP, CISM, or CISA, plus experience matching your CCS threats (Code of Practice §5.3.2).

HR Tip: Involve senior management in hiring to align with strategy—they must grasp its importance for compliance, co-endorsement (Code of Practice §6.2.1), and avoiding fines/risks across BUs (OCCICS FAQ 6). Highlight Ordinance and cross-BU aspects in job postings; verify credentials for OCCICS (Annex C of Code of Practice); onboard with team training (Code of Practice §6.2.27).

2. Handling Changes and Notifications

Any shift in this role counts as a “material change” that must be reported, including during employment termination to maintain continuity and avoid compliance gaps.

  • What Triggers Notification: New hires, departures (such as resignations or terminations), or anything affecting security (s.22(1); Annex D of Code of Practice; OCCICS FAQ 8).
  • How to Report: Use Annex C with details like name, qualifications, and start or end date (Code of Practice §5.3.3).

HR Tip: Include notification clauses in contracts; report to OCCICS immediately post-hire or termination. Require advance exit notice, successor planning, and handover to link with exit protocols and prevent disruptions.

3. Understanding Legal Risks for the Employee

The role is high-stakes, but liability is organizational.

  • No Personal Fines: Penalties hit the CIO, not the individual (OCCICS FAQ 24).
  • Internal Protections: Clear duties help avoid blame in disputes.

HR Tip: Add indemnity clauses (excluding wilful errors); link reviews to security goals for accountability, trust, and lower turnover.

4. Managing Exits: Termination, Garden Leave, and Handovers

Smooth transitions are crucial to maintain continuity (Category 1).

  • Key Concerns: Sudden exits could disrupt operations and require immediate reporting.
  • No Fixed Rules: But longer notice periods help with knowledge transfer.

HR Tip: Use 3–6 month notice periods for handovers (data/knowledge transfer, successor training); apply garden leave for secrecy (s.57, up to HK$1M fines); limit non-competes to sensitive data; ensure pay and audit support.

Wrapping Up: Make It a Smart Move

View this appointment as a boost to your cyber defenses, not just compliance. Keep detailed HR records—they can back due diligence defenses (ss.65–66).

For custom advice, reach out to Oldham Li & Nie. Aligning HR with Cap. 653 now strengthens your position in Hong Kong’s evolving critical infrastructure landscape.

Disclaimer: This article is for reference only. Nothing herein shall be construed as Hong Kong legal advice or any legal advice for that matter to any person. Oldham, Li & Nie shall not be held liable for any loss and/or damage incurred by any person acting as a result of the materials contained in this article.

Filed Under: 公司和商业法, 商业诈骗和资产追踪 Tagged With: Corporate governance, Cyber Security, Computer System Security

Primary Sidebar

This website uses cookies to optimise your experience and to collect information to customise content. By closing this banner, clicking a link or continuing to browse otherwise, you agree to the use of cookies. Please read the cookies section of our Privacy Policy to learn more. Learn more

Footer

OLN logo

香港中环雪厂街二号圣佐治大厦
五楼503室

电话 +852 2868 0696 | 电邮我们
关于 律师团队 办事处 OLN IP Services 私隐政策
专业服务 最新消息 加入我们 OLN Online
关于 专业服务 律师团队 最新消息 办事处
加入我们 OLN IP Services OLN Online 私隐政策
linkedin twitter facebook
OLN logo

© 2026 Oldham, Li & Nie. All Rights Reserved.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
联系我们

请在此处分享您的消息的详细信息。我们会尽快与您联系。

    x