What is the network supervision brigade of the Public Security Bureau?

Network monitoring.

Network supervisor is a newly added kind of police in the Ministry of Public Security. From the Ministry of Public Security to the Public Security Bureau, to the public security bureaus of districts and cities, and then to the county-level public security bureaus, corresponding departments will be set up, whose functions are to crack down on crime prevention and investigate and deal with Internet information crimes, which is the so-called "public information network security supervision". So his establishment is not just for minors.

Generally speaking, network monitoring can find out the name, gender, date of birth, ID number, birthplace, place of residence, family members, criminal records, public security punishment records, traffic violation records, drug abuse and gambling records, escape records, prison release records, hotel accommodation records, entry and exit records, illegal petition records, etc.

1. Organize, coordinate, guide and participate in the investigation and investigation of computer and Internet criminal cases, collect criminal evidence, and conduct technical appraisal on the evidence of criminal cases;

2, responsible for guiding and organizing the implementation of public information network and Internet security management, supervision and protection;

3, responsible for organizing, guiding and participating in the prevention and disposal of computer disasters and accidents such as computer information leakage and computer virus spread;

4, responsible for the supervision and management of computer information system security product sales;

5. Responsible for filing Internet users;

6, responsible for the Internet service business premises (Internet cafes, etc.). ) computer security protection and management;

7. Supervise, guide and inspect the safety protection work of key computer information units;

8, responsible for the training and management of computer security officer;

9, the implementation and research of information security countermeasures and technical specifications;

10, to undertake other tasks assigned by superiors.

Legal basis: Cyber Security Law of the People's Republic of China.

Article 1 This Law is formulated for the purpose of ensuring network security, safeguarding cyberspace sovereignty, national security and social interests, protecting the legitimate rights and interests of citizens, legal persons and other organizations, and promoting the healthy development of economic and social informatization.

Article 2 This Law is applicable to the construction, operation, maintenance and use of networks in People's Republic of China (PRC), as well as the supervision and management of network security.

Article 3 The State adheres to the principle of paying equal attention to network security and informatization development, and follows the principles of active utilization, scientific development, management according to law and ensuring security, promoting the construction and interconnection of network infrastructure, encouraging the innovation and application of network technology, supporting the training of network security personnel, establishing and improving the network security guarantee system and improving the network security protection capability.

Article 4 The state formulates and constantly improves the network security strategy, defines the basic requirements and main objectives for ensuring network security, and puts forward the network security policies, tasks and measures in key areas.

Article 5 The State shall take measures to monitor, defend and respond to cyber security risks and threats from the people of China and at home and abroad, protect important information infrastructure from attacks, intrusions, interference and destruction, punish illegal and criminal activities on the Internet according to law, and maintain security and order in cyberspace.

Article 6 The State advocates honest, trustworthy, healthy and civilized cyber behavior, promotes the dissemination of socialist core values, and takes measures to raise the awareness and level of cyber security of the whole society, thus forming a good environment for the whole society to participate in promoting cyber security. Article 7 The State shall actively carry out international exchanges and cooperation in cyberspace governance, research and development of network technology, standard setting and combating cybercrime, promote the construction of a peaceful, safe, open and cooperative cyberspace, and establish a multilateral, democratic and transparent network governance system.

Article 8 The National Network Information Department is responsible for coordinating network security and related supervision and management. The State Council telecommunications authorities, public security departments and other relevant departments are responsible for network security protection, supervision and management within the scope of their respective responsibilities and in accordance with this Law and relevant laws and administrative regulations. The responsibilities of network security protection and supervision and management of relevant departments of local people's governments at or above the county level shall be determined in accordance with relevant state regulations.

Article 9 When engaging in business and service activities, network operators must abide by laws and administrative regulations, respect social ethics, abide by business ethics, be honest and trustworthy, fulfill their obligations of network security protection, accept government and social supervision, and assume social responsibilities.

Article 10 When constructing and operating a network or providing services through the network, technical measures and other necessary measures shall be taken in accordance with the provisions of laws, administrative regulations and mandatory requirements of national standards to ensure the safe and stable operation of the network, effectively respond to network security incidents, prevent illegal and criminal activities on the network, and maintain the integrity, confidentiality and availability of network data.