{"id":78311,"date":"2026-03-03T10:16:33","date_gmt":"2026-03-03T10:16:33","guid":{"rendered":"https:\/\/oln-law.com\/?p=78311"},"modified":"2026-03-03T10:16:36","modified_gmt":"2026-03-03T10:16:36","slug":"essential-guide-appointing-an-in-house-head-of-computer-system-security","status":"publish","type":"post","link":"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/","title":{"rendered":"Essential Guide: Appointing an In-House Head of Computer System Security"},"content":{"rendered":"\n<p>Hong Kong\u2019s Protection of Critical Infrastructures (Computer Systems) Ordinance (Cap. 653) sets tough standards for Critical Infrastructure Operators (CIOs) to protect their Critical Computer Systems (CCSs) from cyber risks. A key requirement? Appointing a dedicated in-house head to oversee computer system security. This can\u2019t be outsourced\u2014it must be an internal employee for full accountability.<\/p>\n\n\n\n<p>While these guidelines are tailored to CIOs under Cap. 653, they also serve as best practices for employing any high-level management role, ensuring accountability, smooth transitions, and risk mitigation across organizations.<\/p>\n\n\n\n<p>Based on Cap. 653, Code of Practice (v1.0), and insights from the Office of the Commissioner of Critical Infrastructure (Computer-system Security) (OCCICS) website and FAQs, here\u2019s why this role matters and practical HR tips to handle it smoothly.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>The Must-Have In-House Role: Why It Can\u2019t Be Outsourced<\/strong><\/h5>\n\n\n\n<p>CIOs need to set up a security management unit and appoint an employee to lead it (s.21(4); Code of Practice \u00a75.3.2). This falls under Category 1 organizational duties.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Purpose<\/strong>: To build strong security governance tailored to your CIO\u2019s unique risks.<\/li>\n\n\n\n<li><strong>In-House Requirement<\/strong>: The head must have \u201cadequate professional knowledge\u201d specific to your operations (OCCICS FAQ 6). Outsourcing of computer-system security management units is allowed but the head must be an employee appointed by the CIO (OCCICS FAQ 7).<\/li>\n\n\n\n<li><strong>Accountability<\/strong>: While suppliers can help with other tasks (via contracts), core oversight stays internal.<\/li>\n\n\n\n<li><strong>Risks of Non-Compliance<\/strong>: Fines up to HK$5 million for the organization (ss. 7, 26, 28 and 70)\u2014but no personal penalties for individuals (OCCICS FAQ 24).<\/li>\n<\/ul>\n\n\n\n<p>With potential designations looming as of January 16, 2026, prioritize this hire now to stay ahead.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>HR Essentials: What to Focus On<\/strong><\/h5>\n\n\n\n<p>Managing this role involves blending HR best practices with regulatory needs. Break it down into key areas:<\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><strong>1. Defining the Role and Finding the Right Fit<\/strong><\/h6>\n\n\n\n<p>The head leads the security unit, handling everything from risk assessments to incident responses. This role is not just an IT function but spans cross-business units (BUs), integrating security with operations, finance, legal, and other areas to address enterprise-wide risks.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Core Duties<\/strong>: Create and implement a security plan, including access controls, training, and supply chain checks (Code of Practice \u00a7\u00a76.2.5\u20136.2.27). They co-endorse the plan with top executives and review it every two years or after changes.<\/li>\n\n\n\n<li><strong>Qualifications Needed<\/strong>: Look for certifications like CISSP, CISM, or CISA, plus experience matching your CCS threats (Code of Practice \u00a75.3.2).<\/li>\n<\/ul>\n\n\n\n<p><strong>HR Tip<\/strong>: Involve senior management in hiring to align with strategy\u2014they must grasp its importance for compliance, co-endorsement (Code of Practice \u00a76.2.1), and avoiding fines\/risks across BUs (OCCICS FAQ 6). Highlight Ordinance and cross-BU aspects in job postings; verify credentials for OCCICS (Annex C of Code of Practice); onboard with team training (Code of Practice \u00a76.2.27).<\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><strong>2. Handling Changes and Notifications<\/strong><\/h6>\n\n\n\n<p>Any shift in this role counts as a \u201cmaterial change\u201d that must be reported, including during employment termination to maintain continuity and avoid compliance gaps.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>What Triggers Notification<\/strong>: New hires, departures (such as resignations or terminations), or anything affecting security (s.22(1); Annex D of Code of Practice; OCCICS FAQ 8).<\/li>\n\n\n\n<li><strong>How to Report<\/strong>: Use Annex C with details like name, qualifications, and start or end date (Code of Practice \u00a75.3.3).<\/li>\n<\/ul>\n\n\n\n<p><strong>HR Tip<\/strong>: Include notification clauses in contracts; report to OCCICS immediately post-hire or termination. Require advance exit notice, successor planning, and handover to link with exit protocols and prevent disruptions.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><strong>3. Understanding Legal Risks for the Employee<\/strong><\/h6>\n\n\n\n<p>The role is high-stakes, but liability is organizational.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>No Personal Fines<\/strong>: Penalties hit the CIO, not the individual (OCCICS FAQ 24).<\/li>\n\n\n\n<li><strong>Internal Protections<\/strong>: Clear duties help avoid blame in disputes.<\/li>\n<\/ul>\n\n\n\n<p><strong>HR Tip<\/strong>: Add indemnity clauses (excluding wilful errors); link reviews to security goals for accountability, trust, and lower turnover.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><strong>4. Managing Exits: Termination, Garden Leave, and Handovers<\/strong><\/h6>\n\n\n\n<p>Smooth transitions are crucial to maintain continuity (Category 1).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Key Concerns<\/strong>: Sudden exits could disrupt operations and require immediate reporting.<\/li>\n\n\n\n<li><strong>No Fixed Rules<\/strong>: But longer notice periods help with knowledge transfer.<\/li>\n<\/ul>\n\n\n\n<p><strong>HR Tip<\/strong>: Use 3\u20136 month notice periods for handovers (data\/knowledge transfer, successor training); apply garden leave for secrecy (s.57, up to HK$1M fines); limit non-competes to sensitive data; ensure pay and audit support.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Wrapping Up: Make It a Smart Move<\/strong><\/h5>\n\n\n\n<p>View this appointment as a boost to your cyber defenses, not just compliance. Keep detailed HR records\u2014they can back due diligence defenses (ss.65\u201366).<\/p>\n\n\n\n<p>For custom advice, reach out to Oldham Li &amp; Nie. Aligning HR with Cap. 653 now strengthens your position in Hong Kong\u2019s evolving critical infrastructure landscape.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><em>Disclaimer: This article is for reference only. Nothing herein shall be construed as Hong Kong legal advice or any legal advice for that matter to any person. Oldham, Li &amp; Nie shall not be held liable for any loss and\/or damage incurred by any person acting as a result of the materials contained in this article.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hong Kong\u2019s Protection of Critical Infrastructures (Computer Systems) Ordinance (Cap. 653) sets tough standards for Critical Infrastructure Operators (CIOs) to protect their Critical Computer Systems (CCSs) from cyber risks. A key requirement? Appointing a dedicated in-house head to oversee computer system security. This can\u2019t be outsourced\u2014it must be an internal employee for full accountability. While &#8230;<\/p>\n","protected":false},"author":20,"featured_media":78312,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[35,34],"tags":[560,611,612],"featured_post":[144],"class_list":{"0":"post-78311","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-corporate-and-commercial-law","8":"category-commercial-fraud","9":"tag-corporate-governance","10":"tag-cyber-security","11":"tag-computer-system-security","12":"featured_post-featured-home","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Essential Guide: Appointing an In-House Head of Computer System Security | OLN<\/title>\n<meta name=\"description\" content=\"Hong Kong\u2019s Protection of Critical Infrastructures (Computer Systems) Ordinance (Cap. 653) sets tough standards for Critical Infrastructure Operators to protect their Critical Computer Systems from cyber risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Essential Guide: Appointing an In-House Head of Computer System Security | OLN\" \/>\n<meta property=\"og:description\" content=\"Hong Kong\u2019s Protection of Critical Infrastructures (Computer Systems) Ordinance (Cap. 653) sets tough standards for Critical Infrastructure Operators to protect their Critical Computer Systems from cyber risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/\" \/>\n<meta property=\"og:site_name\" content=\"OLN\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-03T10:16:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-03T10:16:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/oln-law.com\/wp-content\/uploads\/sites\/25\/2026\/03\/Fotolia_134476636_Subscription_Monthly_M-1080x675-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"OLN Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"OLN Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/\"},\"author\":{\"name\":\"OLN Marketing\",\"@id\":\"https:\/\/oln-law.com\/zh-cn\/#\/schema\/person\/40feb57ef264bf780becaba28e43367f\"},\"headline\":\"Essential Guide: Appointing an In-House Head of Computer System Security\",\"datePublished\":\"2026-03-03T10:16:33+00:00\",\"dateModified\":\"2026-03-03T10:16:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/\"},\"wordCount\":789,\"publisher\":{\"@id\":\"https:\/\/oln-law.com\/zh-cn\/#organization\"},\"image\":{\"@id\":\"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/oln-law.com\/wp-content\/uploads\/sites\/25\/2026\/03\/Fotolia_134476636_Subscription_Monthly_M-1080x675-1.jpg\",\"keywords\":[\"Corporate governance\",\"Cyber Security\",\"Computer System Security\"],\"articleSection\":[\"Corporate and Commercial Law\",\"Commercial Fraud and Asset Tracing\"],\"inLanguage\":\"en-CN\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/\",\"url\":\"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/\",\"name\":\"Essential Guide: Appointing an In-House Head of Computer System Security | OLN\",\"isPartOf\":{\"@id\":\"https:\/\/oln-law.com\/zh-cn\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/oln-law.com\/wp-content\/uploads\/sites\/25\/2026\/03\/Fotolia_134476636_Subscription_Monthly_M-1080x675-1.jpg\",\"datePublished\":\"2026-03-03T10:16:33+00:00\",\"dateModified\":\"2026-03-03T10:16:36+00:00\",\"description\":\"Hong Kong\u2019s Protection of Critical Infrastructures (Computer Systems) Ordinance (Cap. 653) sets tough standards for Critical Infrastructure Operators to protect their Critical Computer Systems from cyber risks.\",\"breadcrumb\":{\"@id\":\"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/#breadcrumb\"},\"inLanguage\":\"en-CN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CN\",\"@id\":\"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/#primaryimage\",\"url\":\"https:\/\/oln-law.com\/wp-content\/uploads\/sites\/25\/2026\/03\/Fotolia_134476636_Subscription_Monthly_M-1080x675-1.jpg\",\"contentUrl\":\"https:\/\/oln-law.com\/wp-content\/uploads\/sites\/25\/2026\/03\/Fotolia_134476636_Subscription_Monthly_M-1080x675-1.jpg\",\"width\":1080,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\",\"item\":\"https:\/\/oln-law.com\/zh-cn\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u6700\u65b0\u6d88\u606f\u548c\u520a\u7269\",\"item\":\"https:\/\/oln-law.com\/zh-cn\/news-articles\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u516c\u53f8\u548c\u5546\u4e1a\u6cd5\",\"item\":\"https:\/\/oln-law.com\/zh-cn\/news-articles\/corporate-and-commercial-law\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Essential Guide: Appointing an In-House Head of Computer System Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/oln-law.com\/zh-cn\/#website\",\"url\":\"https:\/\/oln-law.com\/zh-cn\/\",\"name\":\"OLN\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/oln-law.com\/zh-cn\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/oln-law.com\/zh-cn\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CN\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/oln-law.com\/zh-cn\/#organization\",\"name\":\"OLN\",\"url\":\"https:\/\/oln-law.com\/zh-cn\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CN\",\"@id\":\"https:\/\/oln-law.com\/zh-cn\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/oln-law.com\/wp-content\/uploads\/sites\/25\/2023\/12\/OLN-Blue.svg\",\"contentUrl\":\"https:\/\/oln-law.com\/wp-content\/uploads\/sites\/25\/2023\/12\/OLN-Blue.svg\",\"width\":2562,\"height\":925,\"caption\":\"OLN\"},\"image\":{\"@id\":\"https:\/\/oln-law.com\/zh-cn\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/oln-law.com\/zh-cn\/#\/schema\/person\/40feb57ef264bf780becaba28e43367f\",\"name\":\"OLN Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CN\",\"@id\":\"https:\/\/oln-law.com\/zh-cn\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6b57e75a0d6810e47f6dbcc92f236ad9419dedb1074e2a5c1ce0654cf4038d06?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6b57e75a0d6810e47f6dbcc92f236ad9419dedb1074e2a5c1ce0654cf4038d06?s=96&d=mm&r=g\",\"caption\":\"OLN Marketing\"},\"url\":\"https:\/\/oln-law.com\/zh-cn\/author\/olnmarketing\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Essential Guide: Appointing an In-House Head of Computer System Security | OLN","description":"Hong Kong\u2019s Protection of Critical Infrastructures (Computer Systems) Ordinance (Cap. 653) sets tough standards for Critical Infrastructure Operators to protect their Critical Computer Systems from cyber risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/","og_locale":"en_US","og_type":"article","og_title":"Essential Guide: Appointing an In-House Head of Computer System Security | OLN","og_description":"Hong Kong\u2019s Protection of Critical Infrastructures (Computer Systems) Ordinance (Cap. 653) sets tough standards for Critical Infrastructure Operators to protect their Critical Computer Systems from cyber risks.","og_url":"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/","og_site_name":"OLN","article_published_time":"2026-03-03T10:16:33+00:00","article_modified_time":"2026-03-03T10:16:36+00:00","og_image":[{"width":1080,"height":675,"url":"https:\/\/oln-law.com\/wp-content\/uploads\/sites\/25\/2026\/03\/Fotolia_134476636_Subscription_Monthly_M-1080x675-1.jpg","type":"image\/jpeg"}],"author":"OLN Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"OLN Marketing","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/#article","isPartOf":{"@id":"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/"},"author":{"name":"OLN Marketing","@id":"https:\/\/oln-law.com\/zh-cn\/#\/schema\/person\/40feb57ef264bf780becaba28e43367f"},"headline":"Essential Guide: Appointing an In-House Head of Computer System Security","datePublished":"2026-03-03T10:16:33+00:00","dateModified":"2026-03-03T10:16:36+00:00","mainEntityOfPage":{"@id":"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/"},"wordCount":789,"publisher":{"@id":"https:\/\/oln-law.com\/zh-cn\/#organization"},"image":{"@id":"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/#primaryimage"},"thumbnailUrl":"https:\/\/oln-law.com\/wp-content\/uploads\/sites\/25\/2026\/03\/Fotolia_134476636_Subscription_Monthly_M-1080x675-1.jpg","keywords":["Corporate governance","Cyber Security","Computer System Security"],"articleSection":["Corporate and Commercial Law","Commercial Fraud and Asset Tracing"],"inLanguage":"en-CN"},{"@type":"WebPage","@id":"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/","url":"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/","name":"Essential Guide: Appointing an In-House Head of Computer System Security | OLN","isPartOf":{"@id":"https:\/\/oln-law.com\/zh-cn\/#website"},"primaryImageOfPage":{"@id":"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/#primaryimage"},"image":{"@id":"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/#primaryimage"},"thumbnailUrl":"https:\/\/oln-law.com\/wp-content\/uploads\/sites\/25\/2026\/03\/Fotolia_134476636_Subscription_Monthly_M-1080x675-1.jpg","datePublished":"2026-03-03T10:16:33+00:00","dateModified":"2026-03-03T10:16:36+00:00","description":"Hong Kong\u2019s Protection of Critical Infrastructures (Computer Systems) Ordinance (Cap. 653) sets tough standards for Critical Infrastructure Operators to protect their Critical Computer Systems from cyber risks.","breadcrumb":{"@id":"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/#breadcrumb"},"inLanguage":"en-CN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-CN","@id":"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/#primaryimage","url":"https:\/\/oln-law.com\/wp-content\/uploads\/sites\/25\/2026\/03\/Fotolia_134476636_Subscription_Monthly_M-1080x675-1.jpg","contentUrl":"https:\/\/oln-law.com\/wp-content\/uploads\/sites\/25\/2026\/03\/Fotolia_134476636_Subscription_Monthly_M-1080x675-1.jpg","width":1080,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/oln-law.com\/zh-cn\/essential-guide-appointing-an-in-house-head-of-computer-system-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"","item":"https:\/\/oln-law.com\/zh-cn\/"},{"@type":"ListItem","position":2,"name":"\u6700\u65b0\u6d88\u606f\u548c\u520a\u7269","item":"https:\/\/oln-law.com\/zh-cn\/news-articles\/"},{"@type":"ListItem","position":3,"name":"\u516c\u53f8\u548c\u5546\u4e1a\u6cd5","item":"https:\/\/oln-law.com\/zh-cn\/news-articles\/corporate-and-commercial-law\/"},{"@type":"ListItem","position":4,"name":"Essential Guide: Appointing an In-House Head of Computer System Security"}]},{"@type":"WebSite","@id":"https:\/\/oln-law.com\/zh-cn\/#website","url":"https:\/\/oln-law.com\/zh-cn\/","name":"OLN","description":"","publisher":{"@id":"https:\/\/oln-law.com\/zh-cn\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/oln-law.com\/zh-cn\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CN"},{"@type":"Organization","@id":"https:\/\/oln-law.com\/zh-cn\/#organization","name":"OLN","url":"https:\/\/oln-law.com\/zh-cn\/","logo":{"@type":"ImageObject","inLanguage":"en-CN","@id":"https:\/\/oln-law.com\/zh-cn\/#\/schema\/logo\/image\/","url":"https:\/\/oln-law.com\/wp-content\/uploads\/sites\/25\/2023\/12\/OLN-Blue.svg","contentUrl":"https:\/\/oln-law.com\/wp-content\/uploads\/sites\/25\/2023\/12\/OLN-Blue.svg","width":2562,"height":925,"caption":"OLN"},"image":{"@id":"https:\/\/oln-law.com\/zh-cn\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/oln-law.com\/zh-cn\/#\/schema\/person\/40feb57ef264bf780becaba28e43367f","name":"OLN Marketing","image":{"@type":"ImageObject","inLanguage":"en-CN","@id":"https:\/\/oln-law.com\/zh-cn\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6b57e75a0d6810e47f6dbcc92f236ad9419dedb1074e2a5c1ce0654cf4038d06?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6b57e75a0d6810e47f6dbcc92f236ad9419dedb1074e2a5c1ce0654cf4038d06?s=96&d=mm&r=g","caption":"OLN Marketing"},"url":"https:\/\/oln-law.com\/zh-cn\/author\/olnmarketing\/"}]}},"featured_image_src":"https:\/\/oln-law.com\/wp-content\/uploads\/sites\/25\/2026\/03\/Fotolia_134476636_Subscription_Monthly_M-1080x675-1-600x400.jpg","featured_image_src_square":"https:\/\/oln-law.com\/wp-content\/uploads\/sites\/25\/2026\/03\/Fotolia_134476636_Subscription_Monthly_M-1080x675-1-600x600.jpg","author_info":{"display_name":"OLN Marketing","author_link":"https:\/\/oln-law.com\/zh-cn\/author\/olnmarketing\/"},"_links":{"self":[{"href":"https:\/\/oln-law.com\/zh-cn\/wp-json\/wp\/v2\/posts\/78311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/oln-law.com\/zh-cn\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oln-law.com\/zh-cn\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oln-law.com\/zh-cn\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/oln-law.com\/zh-cn\/wp-json\/wp\/v2\/comments?post=78311"}],"version-history":[{"count":0,"href":"https:\/\/oln-law.com\/zh-cn\/wp-json\/wp\/v2\/posts\/78311\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/oln-law.com\/zh-cn\/wp-json\/wp\/v2\/media\/78312"}],"wp:attachment":[{"href":"https:\/\/oln-law.com\/zh-cn\/wp-json\/wp\/v2\/media?parent=78311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oln-law.com\/zh-cn\/wp-json\/wp\/v2\/categories?post=78311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oln-law.com\/zh-cn\/wp-json\/wp\/v2\/tags?post=78311"},{"taxonomy":"featured_post","embeddable":true,"href":"https:\/\/oln-law.com\/zh-cn\/wp-json\/wp\/v2\/featured_post?post=78311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}