Hon Charles Peter MOK’s amendment
(#Note: Bold and underlined: Additional wording; Deletion line: Deletion of original wording)
That, as Mr SNOWDEN, a former technical assistant for the Central Intelligence Agency of the United States (‘US’), disclosed during a media interview the matter on SNOWDEN, a former employee of the Central Intelligence Agency of the United States (‘US’), recently disclosed to the media the US Government’s surveillance of and hacking intoHong Kong’s communications networks, Hong Kong’s networks and computer systems and its collection of Hong Kong people’s information and data;this Council expresses strong dissatisfaction with the US Government in this regard, and urges the SAR Government to request clarification from the US Government, hold the US Government responsible, and request the US Government to stop its theft of Hong Kong’s network data and immediately dispose of the information obtained; this Council also urges the Government to implement the following measures, so as to safeguard the security of cyber communications in Hong Kong, and ensure the protection of Hong Kong people’s privacy:
(1) to formulate relevant policies to enhance the information security of Hong Kong’s small and medium enterprises, including assisting them in using more world-class and locally researched and developed information security technologies; and, by capitalizing on Hong Kong’s concern about information security arising from the SNOWDEN incident as an opportunity, to further support local research work on information technologies, and generate demands for local information technology products;
(2) to review the Computer Crimes Ordinance (including the relevant provisions of the Telecommunications Ordinance, the Crimes Ordinance and the Theft Ordinance) and the Interception of Communications and Surveillance Ordinance, targeting the enforcement loopholes in respect of governments, organizations, commercial organizations and individuals outside Hong Kong, so as to strengthen the combat against the relevant acts of communications interception and unauthorized retrieval and retentionof network information; and
(3) to review the approach and procedures for handling similar incidents in the future, including considering the circumstances under which the Central Government’s assistance will be sought in the relevant incidents.