{"id":13715,"date":"2026-01-06T15:00:05","date_gmt":"2026-01-06T08:00:05","guid":{"rendered":"https:\/\/cdlaf.vn\/?p=13715"},"modified":"2026-01-06T15:04:45","modified_gmt":"2026-01-06T08:04:45","slug":"differentiating-between-business-license-to-provide-cyber-information-security-services-and-product-and-business-license-for-civil-cryptography-products-and-services-confusions-to-eliminate","status":"publish","type":"post","link":"https:\/\/cdlaf.vn\/en\/differentiating-between-business-license-to-provide-cyber-information-security-services-and-product-and-business-license-for-civil-cryptography-products-and-services-confusions-to-eliminate\/","title":{"rendered":"Differentiating between Business License to provide cyber information security services and product and Business License for Civil Cryptography Products and Services: Confusions to Eliminate"},"content":{"rendered":"<p><em>The Business License to provide Cyber Information Security <\/em><em>S<\/em><em>ervices and\u00a0<\/em><em>P<\/em><em>roducts <\/em><em>(\u201c<strong>C<\/strong><\/em><strong><em>yber <\/em><\/strong><strong><em>I<\/em><\/strong><strong><em>nformation <\/em><\/strong><strong><em>S<\/em><\/strong><strong><em>ecurity <\/em><\/strong><strong><em>L<\/em><\/strong><strong><em>icense<\/em><\/strong><em>\u201d) <\/em><em>and the <\/em><em>Business License for Civil <\/em><em>C<\/em><em>ryptography Products and Services<\/em><em> (\u201c<\/em><strong><em>Civil Cryptography<\/em><\/strong><strong><em> License<\/em><\/strong><em>\u201d) <\/em><em>\u00a0are two types of independent licenses, which govern different scopes: (1) Cybersecurity management of systems, networks, data and protection services (such as security monitoring and assessment); (2) <\/em><em>Civil <\/em><em>c<\/em><em>ryptography<\/em> <em>governs products\/services with data encryption functions, managing cryptographic keys on the Regulated List (usually associated with HS codes when importing and exporting). Businesses need to differentiate based on the technical nature of the product or service instead of just relying on the generic term &#8220;security&#8221;.<\/em><\/p>\n<figure id=\"attachment_13684\" aria-describedby=\"caption-attachment-13684\" style=\"width: 599px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-13684\" src=\"http:\/\/cdlaf.vn\/wp-content\/uploads\/2026\/01\/pexels-divinetechygirl-1181298-1-599x400.jpg\" alt=\"\" width=\"599\" height=\"400\" srcset=\"https:\/\/cdlaf.vn\/wp-content\/uploads\/2026\/01\/pexels-divinetechygirl-1181298-1-599x400.jpg 599w, https:\/\/cdlaf.vn\/wp-content\/uploads\/2026\/01\/pexels-divinetechygirl-1181298-1-1198x800.jpg 1198w, https:\/\/cdlaf.vn\/wp-content\/uploads\/2026\/01\/pexels-divinetechygirl-1181298-1-768x513.jpg 768w, https:\/\/cdlaf.vn\/wp-content\/uploads\/2026\/01\/pexels-divinetechygirl-1181298-1.jpg 1432w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><figcaption id=\"caption-attachment-13684\" class=\"wp-caption-text\">Source: pexels-divinetechygirl-1181298<\/figcaption><\/figure>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of contents:<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #a32411;color:#a32411\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #a32411;color:#a32411\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/cdlaf.vn\/en\/differentiating-between-business-license-to-provide-cyber-information-security-services-and-product-and-business-license-for-civil-cryptography-products-and-services-confusions-to-eliminate\/#1_Why_do_businesses_confuse_Cyber_information_security_and_Civil_cryptography\" >1. Why do businesses confuse Cyber information security and Civil cryptography?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/cdlaf.vn\/en\/differentiating-between-business-license-to-provide-cyber-information-security-services-and-product-and-business-license-for-civil-cryptography-products-and-services-confusions-to-eliminate\/#2_The_different_nature_of_the_features_of_Cyber_information_security_and_Civil_cryptography_products\" >2. The different nature of the features of Cyber information security and Civil cryptography products<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/cdlaf.vn\/en\/differentiating-between-business-license-to-provide-cyber-information-security-services-and-product-and-business-license-for-civil-cryptography-products-and-services-confusions-to-eliminate\/#3_Current_legal_framework_for_product_management_of_Cyber_information_security_and_Civil_cryptography\" >3. Current legal framework for product management of Cyber information security and Civil cryptography<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/cdlaf.vn\/en\/differentiating-between-business-license-to-provide-cyber-information-security-services-and-product-and-business-license-for-civil-cryptography-products-and-services-confusions-to-eliminate\/#4_When_do_enterprises_need_to_apply_for_a_Cyber_Information_Security_License_or_Civil_Cryptography_License\" >4. When do enterprises need to apply for a Cyber Information Security License or Civil Cryptography License?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/cdlaf.vn\/en\/differentiating-between-business-license-to-provide-cyber-information-security-services-and-product-and-business-license-for-civil-cryptography-products-and-services-confusions-to-eliminate\/#5_Practical_confusions_drawn_from_the_CDLAF_experience\" >5. Practical confusions drawn from the CDLAF experience<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/cdlaf.vn\/en\/differentiating-between-business-license-to-provide-cyber-information-security-services-and-product-and-business-license-for-civil-cryptography-products-and-services-confusions-to-eliminate\/#SEND_CONSULTATION_REQUEST\" >SEND CONSULTATION REQUEST<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"1_Why_do_businesses_confuse_Cyber_information_security_and_Civil_cryptography\"><\/span>1. Why do businesses confuse Cyber information security and Civil cryptography?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>With many recent changes in governance needs from the state to private enterprises and accompanying digitalization policies, it has created a driving force to promote the strong development of business activities related to services and equipment in the field of technology,\u00a0 especially the group of products and services belonging to security and cybersecurity. However, the current legal regulations for groups of services and products belonging to cyber information security are currently only a general legal framework without detailed criteria or guidance. Therefore, businesses in this field will be forced to determine by themselves whether the group of products and services that the enterprise provides belongs to the group of cyber information security or the group of civil cryptography.<\/p>\n<p>In fact, there will be many businesses importing technology equipment, deploying cloud infrastructure or providing security solutions that often encounter the keywords &#8220;encryption&#8221; or &#8220;security&#8221;, and the default security is to apply for security, or with encryption is to apply for Civil Cryptography License. However, this determination is inaccurate, especially when Decree 211\/2025\/ND-CP was promulgated, which excludes many products that have encryption features <strong>(<\/strong>AES\/TLS) but are only internal protection mechanisms, for example, Database has TLS encryption Storage or encryption at rest. Or that product is not eligible for Civil cryptography License when the encryption function is not must be the primary purpose or function, not provide a standalone cryptographic service to the user&#8230;<\/p>\n<p>According to regulations, enterprises must be licensed to trade products before applying for an import license, applicable to both Cyber information security and Civil cryptography, the time for internal preparation of documents and licensing is quite long, so enterprises must accurately determine the type of products that the enterprise trades in the Cyber information security or Civil cryptography group to carry out the correct procedures necessary. Accurate identification from the initial stage will help enterprises not fall into the situation of delaying the implementation of relevant procedures, missing business opportunities or enterprises not meeting bidding requirements due to lack of corresponding licenses.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"2_The_different_nature_of_the_features_of_Cyber_information_security_and_Civil_cryptography_products\"><\/span>2. The different nature of the features of Cyber information security and Civil cryptography products<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>C<\/strong><strong>yber information security <\/strong><strong>m<\/strong><strong>anagement &#8211; \u201cSystem Safety\u201d<\/strong><\/p>\n<p>Security is understood as a protective layer that surrounds it. It revolves around ensuring the integrity, availability, and security of networks and information systems. If you sell services or products with network monitoring (SOC) or vulnerability assessment (Pentest) functions, you are providing services and products in the cybersecurity group.<\/p>\n<p><strong>Cyber information security products include:<\/strong><\/p>\n<ul>\n<li>Cyber information security inspection and assessment products are hardware and software devices with the following basic functions: Scanning, checking, analyzing the configuration, status, and log data of the information system; detecting vulnerabilities and weaknesses; conducting information security risk assessments;<\/li>\n<li>Network information security monitoring products are hardware and software devices with the following basic functions: Monitoring and analyzing data transmitted on the information system; collect and analyze log data in real time; detecting and issuing warnings of abnormal events that may cause information security risks \/ breaches;<\/li>\n<li>Anti-attack and intrusion products are hardware and software devices with the basic function of preventing attacks and intrusions into information systems.<\/li>\n<\/ul>\n<p><strong>Cyber information security services include:<\/strong><\/p>\n<ul>\n<li>Cyber information security monitoring service is a service of monitoring and analyzing data traffic transmitted on the information system; collect and analyze log data in real time; detecting and issuing warnings of abnormal events that may cause information insecurity;<\/li>\n<li>Cyber attack prevention and control services are services to prevent acts of attacking and intrusions information systems through monitoring, collecting and analyzing events that are happening on the information system;<\/li>\n<li>Cyber information security consulting service is a service that supports consulting, inspecting, evaluating, implementing, designing, and building solutions to ensure information security;<\/li>\n<li>Cyber information security incident response service is a service to promptly handle and remedy incidents that cause information insecurity to information systems;<\/li>\n<li>Data recovery service are services that recover data in an information system that has been deleted or damaged;<\/li>\n<li>Cyber information security inspection and assessment services are services of scanning, inspecting and analyzing the configuration, current status, and log data of information systems; detecting vulnerabilities and weaknesses; assessing of information security risks;<\/li>\n<li>Information security services that do not use civil cryptography are services that support users to ensure the confidentiality of information and information systems without using civil cryptography systems.<\/li>\n<\/ul>\n<p><strong>Civil <\/strong><strong>c<\/strong><strong>ryptography <\/strong><strong>g<\/strong><strong>overns &#8220;Encryption Technology&#8221;<\/strong><\/p>\n<p>Civil cryptography products are described as systems, devices, modules and integrated circuits, software specifically designed to protect information by cryptographic techniques using &#8220;symmetric cryptography algorithms&#8221; or &#8220;asymmetric cryptographic algorithms&#8221;, the list of product groups with features classified as civil cryptography includes:<\/p>\n<ul>\n<li>The product generates cryptographic keys, manages, or stores cryptographic keys.<\/li>\n<li>The product secures data retention.<\/li>\n<li>The product secures the data exchanged on the network.<\/li>\n<li>IP stream security products.<\/li>\n<li>Analog voice and digital voice security products.<\/li>\n<li>Radio information security products.<\/li>\n<li>Fax and telegraph security products.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"3_Current_legal_framework_for_product_management_of_Cyber_information_security_and_Civil_cryptography\"><\/span>3. Current legal framework for product management of Cyber information security and Civil cryptography<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>To accurately determine the features of the products sold by a business, the company&#8217;s technical department will need to rely on the features of the product shown in the accompanying documents such as product datasheets and relevant legal documents for each product group. For security products and services, businesses will need to base on the Law on Cyber Information Security 2015 and Decree No. 108\/2016\/ND-CP, in order to be consistent with actual activities, we believe that in the coming time, the legal regulations governing this group will have certain adjustments. Previously, the Department of Cyber Information Security under the Ministry of Information and Communications granted licenses, but from the beginning of 2025 this procedure has been transferred to the Ministry of Public Security, so it will be necessary to adjust the implementation regulations to be compatible with the current cybersecurity regulations as well as compatible with the new licensing agency.<\/p>\n<p>For civil cryptography products, enterprises will need to rely on Decree No. 211\/2025\/ND-CP effective from 9 September 2025 to determine and implement the necessary procedures. <strong>Notably, based on CDLAF\u2019s experience in <\/strong>consulting and carrying out procedures related to the above product groups, we now realize that many businesses are still using the old checklist according to Decree No. 58\/2016\/ND-CP when preparing documents as well as relying on old regulations and practices to determine product classification. To avoid wrong identification and dossier preparation accurately, resulting in returns and delays, businesses need to rely on the new regulations to determine as well as prepare documents.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"4_When_do_enterprises_need_to_apply_for_a_Cyber_Information_Security_License_or_Civil_Cryptography_License\"><\/span>4. When do enterprises need to apply for a Cyber Information Security License or Civil Cryptography License?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>We often recommend that customers who are businesses operating in the field of information technology need to have a long-term data and compliance plan so that businesses have time to complete the necessary legal procedures for obtaining permission, avoid putting businesses at risk of failure to meet bidding requirements, etc.\u00a0 or failing to import products or violations of contractual implementation schedules with their customers.<\/p>\n<p><strong>So when do businesses need to carry out the procedures for applying for a <\/strong><strong>C<\/strong><strong>yber <\/strong><strong>I<\/strong><strong>nformation <\/strong><strong>S<\/strong><strong>ecurity <\/strong><strong>License<\/strong><strong>?<\/strong> That&#8217;s when businesses:<\/p>\n<ul>\n<li><strong>Provision of cyber information security services<\/strong><strong>:<\/strong> You sign a contract to provide information security assessment, system monitoring (SOC), incident response or specialized security consulting.<\/li>\n<li><strong>Trading in <\/strong><strong>C<\/strong><strong>yber information security products:<\/strong> You import or manufacture devices such as firewalls, intrusion detection devices (IDS\/IPS) without emphasizing the specific cryptographic features in the Civil cryptography category.<\/li>\n<li><strong>Bidding dossiers: <\/strong>enterprises participating in bidding and enterprises must prove their capacity to perform information system security services through corresponding licenses.<\/li>\n<\/ul>\n<p><strong>When do businesses really need a Civil Cryptographic License?<\/strong><\/p>\n<p>Enterprises will need to work with the Government Cipher Committee to apply for a license to trade Civil cryptography products when the enterprise provides products\/services with cryptographic functions (encryption of stored data, encryption of exchange data, security of IP traffic, etc.). Actual signals such as when the product catalogue\/datasheet appears parameters: AES-256, RSA, Elliptic Curve, IPsec encryption, Key Management Module, etc., however, as analyzed above, there will be some cases where the product&#8217;s product has encryption features but is not classified as Civil cryptography.<\/p>\n<p><strong>Criteria table of <\/strong><strong>C<\/strong><strong>yber information security vs Civil <\/strong><strong>c<\/strong><strong>ryptography<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"85\">\n<p><strong>Criteria <\/strong><\/p>\n<\/td>\n<td width=\"318\">\n<p><strong>C<\/strong><strong>yber <\/strong><strong>I<\/strong><strong>nformation <\/strong><strong>S<\/strong><strong>ecurity <\/strong><strong>License<\/strong><\/p>\n<\/td>\n<td width=\"201\">\n<p><strong>Civil Cryptography License<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"85\">\n<p>Management Objectives<\/p>\n<\/td>\n<td width=\"318\">\n<p>Information Network &amp; System Security.<\/p>\n<\/td>\n<td width=\"201\">\n<p>Control cryptographic technology\/algorithms.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"85\">\n<p>Subject of management<\/p>\n<\/td>\n<td width=\"318\">\n<p>Information Network &amp; System Security.<\/p>\n<\/td>\n<td width=\"201\">\n<p>Products and services with encryption functions.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"85\">\n<p>Licensing Authority<\/p>\n<\/td>\n<td width=\"318\">\n<p>Ministry of Public Security <em>(from 2025)<\/em><\/p>\n<\/td>\n<td width=\"201\">\n<p>Government Cipher Committee<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"85\">\n<p>Grounds for determination<\/p>\n<\/td>\n<td width=\"318\">\n<p>Service description, operating process, datasheet<\/p>\n<\/td>\n<td width=\"201\">\n<p>Technical Datasheet, Algorithm, HS Code.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"85\">\n<p>Critical personnel<\/p>\n<\/td>\n<td width=\"318\">\n<p>Experts in cybersecurity, incident response, security, information security<\/p>\n<\/td>\n<td width=\"201\">\n<p>Information security and security<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"85\">\n<p>Management Documents<\/p>\n<\/td>\n<td width=\"318\">\n<p>Decree No. 108\/2016\/ND-CP.<\/p>\n<\/td>\n<td width=\"201\">\n<p>Decree No. 211\/2025\/ND-CP.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><span class=\"ez-toc-section\" id=\"5_Practical_confusions_drawn_from_the_CDLAF_experience\"><\/span>5. Practical confusions drawn from the CDLAF experience<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Mistake 1: &#8220;As long as there is encryption, you have to apply for <\/strong><strong>Civil Cryptography License <\/strong><strong>&#8220;.<\/strong> Fact: Encryption is a common feature. The law only regulates Civil cryptography for products in the specialized category. For example, regular HTTPS\/TLS may not require a license, but a dedicated channel security device does.<\/p>\n<p><strong>Mistake 2: &#8220;If you have a cyber information security <\/strong><strong>License<\/strong><strong>, you are exempt from Civil <\/strong><strong>c<\/strong><strong>ryptography&#8221;, <\/strong>this is incorrect, the license is issued according to the group of products and services provided by the company, not issued by the name of the company, a company that has trades in both Cyber information security and Civil cryptography products is required to obtain both types of licenses for different product groups in parallel.<\/p>\n<p><strong>Mistake 3: &#8220;I am only the implementer, so I don&#8217;t need a license&#8221;, <\/strong>if the business is named on the contract to provide conditional information security services or in the name of the importer of Civil cryptography goods, it is still required to hold the relevant license.<\/p>\n<p><strong><em>CDLAF &#8211; A unit specializing in providing services to obtain licenses to trade in cyber information security products and services and civil cryptography<\/em><\/strong><\/p>\n<p><em>New regulations are always accompanied by opportunities as well as operational \u201cbottlenecks.\u201d CDLAF is ready to support enterprises in reviewing their internal governance systems to ensure compliance with and alignment to current laws.<\/em><\/p>\n<ul>\n<li>\n<h4><strong>Advisory email<\/strong> info@cdlaf.vn<\/h4>\n<\/li>\n<li>\n<h4><strong>Hotline:<\/strong> (+84) 909 668 216<\/h4>\n<\/li>\n<\/ul>\n<p><strong><em>Time<\/em><\/strong><strong><em> of writing<\/em><\/strong><em>: 30\/12\/2025<\/em><\/p>\n<p><em>The article contains general information which is of reference value, in case you want to receive legal opinions on issues you need clarification on, please get in touch with our Lawyer \u00a0at\u00a0 <a href=\"https:\/\/mail.google.com\/mail\" target=\"_blank\" rel=\"noopener\"><strong>info@cdlaf.vn<\/strong><\/a><\/em><\/p>\n<div class=\"content-post-nd\">\n<div style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5519 size-full aligncenter\" src=\"http:\/\/cdlaf.vn\/wp-content\/uploads\/2023\/05\/CHUONG-TRINH-THANG.png\" alt=\"\" width=\"1080\" height=\"600\" srcset=\"https:\/\/cdlaf.vn\/wp-content\/uploads\/2023\/05\/CHUONG-TRINH-THANG.png 1080w, https:\/\/cdlaf.vn\/wp-content\/uploads\/2023\/05\/CHUONG-TRINH-THANG-720x400.png 720w, https:\/\/cdlaf.vn\/wp-content\/uploads\/2023\/05\/CHUONG-TRINH-THANG-768x427.png 768w\" sizes=\"auto, (max-width: 1080px) 100vw, 1080px\" \/><\/div>\n<\/div>\n<div class=\"content-post-nd\">\n<p><strong>Why choose CDLAF\u2019s service?<\/strong><\/p>\n<ul class=\"li-content\">\n<li>We provide effective and comprehensive legal solutions that help you save money and maintain compliance in your business;<\/li>\n<li>We continue to monitor your legal matters even after the service is completed and update you when there are any changes in the Vietnamese legal system;<\/li>\n<li>Our system of forms and processes related to labor and personnel is continuously built and updated and will be provided as soon as the customer requests it;<\/li>\n<li>As a Vietnamese law firm, we have a thorough understanding of Vietnam&#8217;s legal regulations, and grasp the psychology of employees, employers, and working methods at competent authorities;<\/li>\n<li>CDLAF&#8217;s team of lawyers has many years of experience in the field of labor and enterprises, as well as human resources and financial advisory.<\/li>\n<li>Strict information security procedures throughout the service performance and even after the service is completed.<\/li>\n<\/ul>\n<\/div>\n<p><strong style=\"color: #a32411;\">You can refer for more information:<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/cdlaf.vn\/en\/execution-of-electronic-labor-contracts-compliance-conditions-and-implementation-process\/\">Execution of Electronic Labor Contracts: Compliance Conditions and Implementation Process<\/a><\/li>\n<li><a href=\"https:\/\/cdlaf.vn\/en\/impacts-of-decree-no-337-2025-nd-cp-on-electronic-labour-contracts\/\">Impacts of Decree No. 337\/2025\/N\u0110-CP on Electronic Labour Contracts<\/a><\/li>\n<li><a href=\"https:\/\/cdlaf.vn\/en\/essential-clauses-in-an-overseas-foreign-party-processing-contract\/\">Essential clauses in an overseas processing contracts<\/a><\/li>\n<\/ul>\n\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f2681-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"2681\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/posts\/13715#wpcf7-f2681-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"2681\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f2681-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<h2 class=\"tt-form\"><span class=\"ez-toc-section\" id=\"SEND_CONSULTATION_REQUEST\"><\/span>SEND CONSULTATION REQUEST\n<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><label>Full name<\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"full-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"full-name\" \/><\/span><br \/>\n<label>Email<\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"email\" \/><\/span><br \/>\n<label>Phone Number<\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-text wpcf7-validates-as-tel\" aria-invalid=\"false\" value=\"\" type=\"tel\" name=\"phone\" \/><\/span><br \/>\n<label>Message<\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"coment\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" name=\"coment\"><\/textarea><\/span><br \/>\n<input class=\"wpcf7-form-control wpcf7-submit has-spinner btn-yellow\" type=\"submit\" value=\"Send\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>The Business License to provide Cyber Information Security Services and\u00a0Products (\u201cCyber Information Security License\u201d) and the Business License for Civil Cryptography Products and Services (\u201cCivil Cryptography License\u201d) \u00a0are two types of independent licenses, which govern different scopes: (1) Cybersecurity management of systems, networks, data and protection services (such as security monitoring and assessment); (2) Civil&#8230;<\/p>\n","protected":false},"author":4,"featured_media":13684,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[64],"tags":[],"class_list":["post-13715","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles"],"acf":[],"_links":{"self":[{"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/posts\/13715","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/comments?post=13715"}],"version-history":[{"count":3,"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/posts\/13715\/revisions"}],"predecessor-version":[{"id":13718,"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/posts\/13715\/revisions\/13718"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/media\/13684"}],"wp:attachment":[{"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/media?parent=13715"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/categories?post=13715"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cdlaf.vn\/en\/wp-json\/wp\/v2\/tags?post=13715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}