{"id":13623,"date":"2025-12-29T13:19:51","date_gmt":"2025-12-29T06:19:51","guid":{"rendered":"https:\/\/cdlaf.vn\/?p=13623"},"modified":"2025-12-29T13:31:24","modified_gmt":"2025-12-29T06:31:24","slug":"guidance-on-making-a-business-plan-business-license-to-provide-cyber-information-security-services-and-products-part-1","status":"publish","type":"post","link":"https:\/\/cdlaf.vn\/en\/guidance-on-making-a-business-plan-business-license-to-provide-cyber-information-security-services-and-products-part-1\/","title":{"rendered":"Guidance on making a business plan &#8211; Business License to provide cyber information security services and products (Part 1)"},"content":{"rendered":"<h1>Develop a personnel organizational chart in the Business Plan<\/h1>\n<p>In the application for<strong> the <\/strong><strong>Business License to provide cyber information security services and products<\/strong>, <em>the business plan<\/em> is often misunderstood as a purely commercial-oriented document. In fact, this is the <strong>most obvious part of the actual operational capacity of the enterprise<\/strong><strong>, <\/strong>as well as an important basis for the management agency to assess whether the enterprise is capable of organizing, controlling and providing cyber information security services in real conditions.<\/p>\n<p>From the experience of reviewing and building documents for technology enterprises, it can be seen that many documents, although complete in terms of form, still face difficulties in the appraisal process, not because of the lack of legal conditions, but because <strong>\u00a0the Business Plan has not answered the core questions of the licensing agency<\/strong>:\u00a0 who is responsible at each level, how the corporate hierarchy is organized, and how the enterprise ensures the quality of cyber information security services when it is put into operation.<\/p>\n<p>Stemming from that practice, this article is built to <strong>guide businesses on how to present each item in the Business Plan \u2013 one of the mandatory documents in the license application dossier. In Part 1, we would like to guide businesses to present content related to building a personnel organizational chart in the Business Plan<\/strong><strong>,<\/strong> thereby helping businesses avoid common mistakes and improve the persuasiveness of the license application from the first part.<\/p>\n<p><em>Note that the enterprise will need to rely on the current structure of the company under the operating charter to make the presentation, the notes below are described as examples for the purpose of general guidance on how to present them.<\/em><\/p>\n<figure id=\"attachment_13511\" aria-describedby=\"caption-attachment-13511\" style=\"width: 600px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-13511\" src=\"http:\/\/cdlaf.vn\/wp-content\/uploads\/2025\/12\/pexels-pixabay-60504-600x400.jpg\" alt=\"\" width=\"600\" height=\"400\" srcset=\"https:\/\/cdlaf.vn\/wp-content\/uploads\/2025\/12\/pexels-pixabay-60504-600x400.jpg 600w, https:\/\/cdlaf.vn\/wp-content\/uploads\/2025\/12\/pexels-pixabay-60504-1200x800.jpg 1200w, https:\/\/cdlaf.vn\/wp-content\/uploads\/2025\/12\/pexels-pixabay-60504-768x512.jpg 768w, https:\/\/cdlaf.vn\/wp-content\/uploads\/2025\/12\/pexels-pixabay-60504-1536x1024.jpg 1536w, https:\/\/cdlaf.vn\/wp-content\/uploads\/2025\/12\/pexels-pixabay-60504-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><figcaption id=\"caption-attachment-13511\" class=\"wp-caption-text\">Source: pexels-pixabay-60504<\/figcaption><\/figure>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of contents:<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #a32411;color:#a32411\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #a32411;color:#a32411\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/cdlaf.vn\/en\/guidance-on-making-a-business-plan-business-license-to-provide-cyber-information-security-services-and-products-part-1\/#1_Chairman_of_the_company_Legal_representative\" >1. Chairman of the company Legal representative<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/cdlaf.vn\/en\/guidance-on-making-a-business-plan-business-license-to-provide-cyber-information-security-services-and-products-part-1\/#2_Director\" >2. Director<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/cdlaf.vn\/en\/guidance-on-making-a-business-plan-business-license-to-provide-cyber-information-security-services-and-products-part-1\/#3_Technical_Department\" >3. Technical Department:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/cdlaf.vn\/en\/guidance-on-making-a-business-plan-business-license-to-provide-cyber-information-security-services-and-products-part-1\/#4_Operations_Department_includes_personnel_doing_administrative_accounting_legal_work\" >4. Operations Department: includes personnel doing administrative, accounting, legal work<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/cdlaf.vn\/en\/guidance-on-making-a-business-plan-business-license-to-provide-cyber-information-security-services-and-products-part-1\/#SEND_CONSULTATION_REQUEST\" >SEND CONSULTATION REQUEST<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"1_Chairman_of_the_company_Legal_representative\"><\/span>1. Chairman of the company Legal representative<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In the Business Plan, when describing this position, businesses should not stop at recognizing the title, but need to clarify <strong>the actual role of the head in the field of cyber information security<\/strong><strong>.<\/strong> The Chairman is not only the one who sets long-term goals and represents the company in legal activities, but also the subject who shapes the overall strategy for cyber information security, promulgating core policies and procedures to ensure that services are provided efficiently and in line with market demand. Businesses need to ask themselves: in their current structure, who really decides the information security strategy, and are important policies and processes issued from the top?<\/p>\n<p>In addition to the strategic role, the description of the responsibilities for monitoring and directing information security consulting projects, as well as information security inspection and assessment activities, helps the appraisal agency clearly visualize<strong> the quality control mechanism at the highest level<\/strong>. Here, Businesses should consider for themselves: when implementing projects with a high level of complexity or specific technical requirements, who is the person who monitors the progress, who is ultimately responsible for quality, and how is the mechanism to support the project heads and teams designed? Specifically, it can be analyzed at the following points:<\/p>\n<ul>\n<li><strong>Strategy and Policies<\/strong>: Develop and direct the overall security strategy, establish policies and procedures to ensure effective service delivery and meet market demand.<\/li>\n<li><strong>Project Monitoring:<\/strong> Supervising and directing information security consulting projects and information security audits, ensuring projects are implemented as planned and of high quality, and supporting department heads and project teams as needed.<\/li>\n<li><strong>Expert Consulting:<\/strong> Providing expert advice on projects, especially in complex or technically demanding situations, to ensure solutions and recommendations are accurate and effective.<\/li>\n<li><strong>Service Development and Effectiveness Evaluation:<\/strong> Evaluate the effectiveness of consulting services, develop and improve consulting methods, technologies and processes to improve service quality and meet customer needs.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"2_Director\"><\/span>2. Director<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Functions and Duties:<\/strong> Manage and run the company&#8217;s day-to-day business activities. The Director is the one who organizes and implements the decisions of the Chairman of the company, ensuring that all activities of the company are implemented according to the set plan and goals. In operational practice, this is also a position that is directly responsible for handling arising problems, especially situations that require quick response or coordination of multiple departments at the same time, and optimize business efficiency on the basis of legal compliance and general strategic orientation. When building this content, businesses can ask themselves: in their current model, who is responsible for operating throughout and handling situations that arise on a daily basis related to cyber information security services?<\/p>\n<ul>\n<li><strong>Managing the company&#8217;s daily operations in terms of administration &#8211; human resources, legal, finance &#8211; accounting to ensure that the company operates efficiently and complies with legal regulations. <\/strong>This content is intended to show that the Director not only manages the technical side, but also controls the entire platform operation system of the enterprise. Businesses should consider and contact themselves: in reality, are HR, contract, finance, and compliance decisions centrally coordinated by a single point of operation, or are they being dispersed across different departments?<\/li>\n<li><strong>Project supervision:<\/strong> Supervise and direct information security incident response and data recovery projects, ensure that projects are implemented as planned and of high quality, and support department heads and project teams when necessary. This is the content that helps the appraisal agency clearly identify the command mechanism when an incident occurs. great. Businesses can ask themselves: when an information security incident arises or a data recovery request arises, who is the one who directly coordinates resources, makes timely decisions and is responsible for the progress and results of processing?<\/li>\n<li><strong>Professional Consulting:<\/strong> Providing professional advice on projects, especially in complex or technically demanding situations, to ensure that the solutions and recommendations provided are accurate and effective. The demonstration of this role at the Director level shows that the business has an intermediate layer of expertise, minimizing risk depending on a single individual at the top level. Businesses can consider for themselves: in the current structure, when it is necessary to make important professional decisions, who is involved in advising and responsible at the executive level?<\/li>\n<li><strong>Build a customer portfolio:<\/strong> This content reflects the role of the Director in developing the market and ensuring the feasibility of the Business Plan. When presenting, businesses can relate to themselves: how is the development and maintenance of customer portfolios in the field of cyber information security currently being organized, and how is the role of the executive level represented in that process?<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"3_Technical_Department\"><\/span>3. Technical Department:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><em>The enterprise will need to rely on the cyber information security services and products that the enterprise plans to provide to determine how many groups the technical department will be specifically divided into. Our notes below are examples based on the context of enterprises providing a variety of services and products.<\/em><\/p>\n<p>Functions and duties: Responsible for all professional and technical activities related to cyber information security services (CIS) that the company provides. Clearly identifying the technical department as the focal point for professional responsibility helps the appraisal agency see the &#8220;competency center&#8221; of the enterprise in the field of cyber information security. When developing this content, businesses should ask themselves: in their current model, are technical activities organized centrally or distributed, and who is ultimately responsible for professional quality? This department is divided into 4 professional groups, each group has specific functions as follows:<\/p>\n<p><strong>Cyber Information Security Consulting Team:<\/strong> Provides in-depth consulting services on security measures, risk assessments, and guidance to clients on how to protect their information systems against cybersecurity threats. The separation of the consulting group shows that businesses approach information security services not only from the perspective of handling incidents, but starting from the stage of assessment, prevention and solution design. Businesses can associate with themselves: in actual operation, who is responsible for approaching the customer&#8217;s overall problem before going into detailed technical implementation?<\/p>\n<ul>\n<li>Receiving and managing consulting projects: Receiving requests from customers: Identifying customer needs and requirements related to cyber information security.<\/li>\n<li>Project planning: Develop a detailed plan for each consulting project, including the implementation steps, time, and resources required. The emphasis on project planning shows that businesses manage consulting services according to a project mindset, have a clear roadmap and allocate resources.<\/li>\n<li>Consulting &amp; supporting the implementation of appropriate technical solutions according to customer needs. This content reflects the role of a bridge between consulting and implementation, helping the appraisal agency to see that the consultancy recommendation does not stop at theory but is supported to apply in practice.<\/li>\n<li>Progress Monitoring: Track the progress of each consulting project to ensure timelines and requirements are met on time.<\/li>\n<li>Quality Assurance: Ensure that the consulting services provided are of high quality and meet the standards and requirements of our clients. The inclusion of quality assurance content as a separate task shows that businesses are well aware of the risks of service quality in the field of cyber information security.<\/li>\n<li>Preparation of project reports: Provide periodic and end-of-project reports to clients, including audit results and security recommendations. The report is not only the final product, but also the legal and technical basis for customers to implement security measures.<\/li>\n<li>Evaluate service effectiveness: Collect feedback from customers and evaluate the effectiveness of implemented consulting solutions. This content shows that businesses consider consulting activities as a closed cycle, with re-evaluation and improvement.<\/li>\n<\/ul>\n<p><strong>Cyber Security Incident Response Team:<\/strong> Responsible for handling cybersecurity incidents as they occur, from detection, response, to remediation and recovery of the system after an incident. The separation of the incident response team shows that businesses have clearly identified the characteristics of cyber information security services: not only prevention, but also being ready to react in emergency situations. Businesses can ask themselves: in the current model, when a cybersecurity incident occurs, is there a dedicated focal point with sufficient authority and capacity to handle it throughout?<\/p>\n<ul>\n<li><strong>Receive incident information:<\/strong> Identify and record incident-related information from customers. This content is intended to show that incident handling starts from a controlled reception stage, avoiding discrete information or emotional handling.<\/li>\n<li><strong>Implement remediation:<\/strong> Implement corrective measures to minimize damage and prevent recurrence, including system isolation, patching, and data recovery.<\/li>\n<li><strong>Identify the cause:<\/strong> Analyze and investigate the root cause of the problem to understand the problem and the extent of its impact.<\/li>\n<li><strong>Impact Assessment:<\/strong> Assesses the extent of damage and the impact of the incident on systems and data. The separation of the impact assessment step shows that businesses have a risk management mindset, focusing not only on technical handling but also considering the overall consequences.<\/li>\n<li><strong>Recovery Support:<\/strong> Provides assistance in restoring systems and services to a state of normal operation after an incident.<\/li>\n<li><strong>Monitor the remediation process<\/strong>: Monitor the troubleshooting process to ensure that corrective measures are implemented efficiently and on schedule. The emphasis on supervision shows that businesses have an internal control mechanism throughout the rescue process, rather than only intervening at an early stage.<\/li>\n<li><strong>Recording and reporting:<\/strong> Record details of the incident, handling steps, and results, and prepare post-incident reports to provide stakeholders and serve to improve the process. This content clearly shows practical experience, because in the appraisal of documents, the management agency is often interested in whether the enterprise has the ability to trace and explain or not.<\/li>\n<\/ul>\n<p><strong>Data Recovery Team<\/strong>: Specializes in recovering data lost or damaged due to security incidents or system failures, ensuring the integrity and availability of critical data for customers.<\/p>\n<p><strong>Cyber Information Security Inspection and Assessment Team: <\/strong>Carry out periodic or on-demand inspections and assessments on the security level of the information system, identify vulnerabilities and propose remedial measures. Similar to other groups, when analyzing and presenting how the technical department in this group performs, businesses will need to implement the main points of: Receiving requests from customers; Planning inspections; Penetration testing; Vulnerability assessment; Compliance Audits; Progress monitoring; Quality Assurance; Preparation of inspection reports; Provide recommendations; Evaluation of effectiveness; Process improvement.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"4_Operations_Department_includes_personnel_doing_administrative_accounting_legal_work\"><\/span>4. Operations Department: includes personnel doing administrative, accounting, legal work<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Responsible for managing the company&#8217;s administrative, HR, accounting, and legal activities. This department ensures that the company operates organizationally stable, fully complies with applicable legal regulations and maintains an effective human resource system to support technical and management departments. When describing this department, businesses need to be aware that this is not a &#8220;pure logistics&#8221; department, but a <strong>pillar to ensure the legality and sustainability of the cyber information security business<\/strong>. Businesses may ask themselves: in the current model, who is responsible for ensuring legal compliance and maintaining operational order when technical departments focus on professional handling? <strong>Specifically:<\/strong><\/p>\n<p><strong>Administrative Management:<\/strong> Performs daily administrative tasks, including organizing work schedules, handling office requests, and managing company document records, contracts, and important documents. This content shows that the business has designed a focal point responsible for managing documents and records, which is especially important in the field of cyber information security \u2013 where service contracts, technical reports and project documents have high legal value. Businesses should contact themselves: are important records and documents currently being managed centrally or distributed, and are there access control mechanisms?<\/p>\n<p><strong>Human Resource Management:<\/strong> Recruit, train, and develop employees according to the needs of the company. Handle HR-related issues such as timekeeping, payroll, benefits, and labor policies. Manage records and papers related to employees. The full description of this content helps the appraisal agency assess that the enterprise is capable of maintaining a stable, trained and managed personnel in accordance with the high technical characteristics of the field of cyber information security. Businesses may ask themselves: are the current technical team recruited and trained according to a long-term plan or only meet the short-term needs of each project?<\/p>\n<p><strong>Project management:<\/strong> Track the progress of internal projects and ensure timelines are implemented on time. Plan, organize, and coordinate project activities, including progress reporting and quality control. Receive, process and monitor the process of handling customer complaints. This content shows that the operations department does not stand outside of service activities, but participates in coordinating and controlling progress and quality from a management perspective. Businesses should consider for themselves: when there are complaints or feedback from customers, has there been a point of reception and follow-up throughout until the final handling is completed?<\/p>\n<p><strong>Working with outsourced services:<\/strong> This content reflects how the business organizes resources in the event that it does not fully maintain the internal dedicated department, and at the same time shows the initiative in ensuring compliance with the law through professional partners.<\/p>\n<p><strong>Accounting:<\/strong> Cooperating with accounting services to ensure that financial activities, preparing financial statements and handling tax-related issues are carried out in accordance with regulations. Clearly stating this content helps the appraisal agency see that the enterprise has anticipated the financial control mechanism and tax obligations, instead of handling it situationally. Businesses can contact themselves: are current financial and tax obligations monitored regularly and consistently?<\/p>\n<p><strong>Legal:<\/strong> Work with legal services to ensure that contracts, legal documents and legal issues are handled correctly and in compliance with the law. This content demonstrates a clear awareness of the legal peculiarities of the cyber information security sector \u2013 where service contracts, security commitments and liabilities play a key role.<\/p>\n<p>In the business plan of the application for the<strong> Business License to provide cyber information security services and product, the organizational chart<\/strong> of personnel is not merely a description of the internal apparatus, but is the basis for the licensing agency to assess <strong>the organizational capacity, risk control ability and operational readiness of the enterprise<\/strong> in a field with high technical requirements and liability. Building an organizational chart in a methodical way, with a clear stratification between management \u2013 operation \u2013 engineering \u2013 operation, and at the same time attaching specific responsibilities to each functional group, will help the Business Plan show logic and feasibility. More importantly, this content forces businesses to review their own models: who is responsible at each level, what is the coordination mechanism between departments, and how the ability to react when problems arise is designed.<\/p>\n<p><strong><em>Time<\/em><\/strong><strong><em> of writing<\/em><\/strong><em>: 23\/12\/2025<\/em><\/p>\n<p><em>The article contains general information which is of reference value, in case you want to receive legal opinions on issues you need clarification on, please get in touch with our Lawyer \u00a0at\u00a0 <a href=\"https:\/\/mail.google.com\/mail\" target=\"_blank\" rel=\"noopener\"><strong>info@cdlaf.vn<\/strong><\/a><\/em><\/p>\n<div class=\"content-post-nd\">\n<div style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5519 size-full aligncenter\" src=\"http:\/\/cdlaf.vn\/wp-content\/uploads\/2023\/05\/CHUONG-TRINH-THANG.png\" alt=\"\" width=\"1080\" height=\"600\" srcset=\"https:\/\/cdlaf.vn\/wp-content\/uploads\/2023\/05\/CHUONG-TRINH-THANG.png 1080w, https:\/\/cdlaf.vn\/wp-content\/uploads\/2023\/05\/CHUONG-TRINH-THANG-720x400.png 720w, https:\/\/cdlaf.vn\/wp-content\/uploads\/2023\/05\/CHUONG-TRINH-THANG-768x427.png 768w\" sizes=\"auto, (max-width: 1080px) 100vw, 1080px\" \/><\/div>\n<\/div>\n<div class=\"content-post-nd\">\n<p><strong>Why choose CDLAF\u2019s service?<\/strong><\/p>\n<ul class=\"li-content\">\n<li>We provide effective and comprehensive legal solutions that help you save money and maintain compliance in your business;<\/li>\n<li>We continue to monitor your legal matters even after the service is completed and update you when there are any changes in the Vietnamese legal system;<\/li>\n<li>Our system of forms and processes related to labor and personnel is continuously built and updated and will be provided as soon as the customer requests it;<\/li>\n<li>As a Vietnamese law firm, we have a thorough understanding of Vietnam&#8217;s legal regulations, and grasp the psychology of employees, employers, and working methods at competent authorities;<\/li>\n<li>CDLAF&#8217;s team of lawyers has many years of experience in the field of labor and enterprises, as well as human resources and financial advisory.<\/li>\n<li>Strict information security procedures throughout the service performance and even after the service is completed.<\/li>\n<\/ul>\n<\/div>\n<p><strong style=\"color: #a32411;\">You can refer for more information:<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/cdlaf.vn\/en\/guidelines-for-drafting-the-personal-data-protection-plan-in-the-cross-border-personal-data-transfer-impact-assessment-dossier-part-2\/\">Guidelines for Drafting the Personal Data Protection Plan in the Cross-Border Personal Data Transfer Impact Assessment Dossier (Part 2)<\/a><\/li>\n<li><a href=\"https:\/\/cdlaf.vn\/en\/guidelines-for-drafting-the-personal-data-protection-plan-in-the-cross-border-personal-data-transfer-impact-assessment-dossier-part-1\/\">Guidelines for Drafting the Personal Data Protection Plan in the Cross-Border Personal Data Transfer Impact Assessment Dossier (Part 1)<\/a><\/li>\n<li><a href=\"https:\/\/cdlaf.vn\/en\/reviewing-payment-terms-under-double-taxation-agreements\/\">Reviewing payment terms under double taxation Agreements<\/a><\/li>\n<li><a href=\"https:\/\/cdlaf.vn\/en\/procedures-for-handling-delayed-capital-contribution-in-an-investment-project\/\">Procedures for handling delayed capital contribution in an Investment project<\/a><\/li>\n<li><a href=\"https:\/\/cdlaf.vn\/en\/legal-issues-arising-from-delays-in-extending-the-operational-term-of-investment-projects\/\">Legal issues arising from delays in extending the Operational term of Investment Projects<\/a><\/li>\n<\/ul>\n\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f2681-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"2681\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/posts\/13623#wpcf7-f2681-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"2681\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f2681-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<h2 class=\"tt-form\"><span class=\"ez-toc-section\" id=\"SEND_CONSULTATION_REQUEST\"><\/span>SEND CONSULTATION REQUEST\n<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><label>Full name<\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"full-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"full-name\" \/><\/span><br \/>\n<label>Email<\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"email\" \/><\/span><br \/>\n<label>Phone Number<\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-text wpcf7-validates-as-tel\" aria-invalid=\"false\" value=\"\" type=\"tel\" name=\"phone\" \/><\/span><br \/>\n<label>Message<\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"coment\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" name=\"coment\"><\/textarea><\/span><br \/>\n<input class=\"wpcf7-form-control wpcf7-submit has-spinner btn-yellow\" type=\"submit\" value=\"Send\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Develop a personnel organizational chart in the Business Plan In the application for the Business License to provide cyber information security services and products, the business plan is often misunderstood as a purely commercial-oriented document. In fact, this is the most obvious part of the actual operational capacity of the enterprise, as well as an&#8230;<\/p>\n","protected":false},"author":4,"featured_media":13511,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[64],"tags":[],"class_list":["post-13623","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles"],"acf":[],"_links":{"self":[{"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/posts\/13623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/comments?post=13623"}],"version-history":[{"count":2,"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/posts\/13623\/revisions"}],"predecessor-version":[{"id":13625,"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/posts\/13623\/revisions\/13625"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/media\/13511"}],"wp:attachment":[{"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/media?parent=13623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/categories?post=13623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/tags?post=13623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}