Delegation of the National Assembly of the Republic of Belarus to the CSTO PA consists of 7 deputies from the House of Representatives of the National Assembly of the Republic of Belarus and 4 deputies from the Council of the Republic of the National Assembly of the Republic of Belarus.
Plenipotentiary representative of the National Assembly of the Republic of Belarus: Viktor Kogut
Website of the House of Representatives of the National Assembly of the Republic of Belarus: http://house.gov.by/en/
Website of the Council of the Republic of the National Assembly of the Republic of Belarus: http://www.sovrep.gov.by/ru/
Delegation of the Parliament of the Republic of Kazakhstan to the CSTO PA consists of 8 deputies from the Mazhilis of the Parliament of the Republic of Kazakhstan and 8 members of the Senate of the Parliament of Kazakhstan.
Plenipotentiary Representative of the Parliament of the Republic of Kazakhstan, deputy Executive Secretary of the CSTO Parliamentary Assembly: Viktor Rogalev
Delegation of the Supreme Council of the Kyrgyz Republic to the CSTO PA consists of 7 deputies.
Plenipotentiary Representative of the Supreme Council of the Kyrgyz Republic: Shabdanbek Alishev
Website of the Supreme Council of the Kyrgyz Republic: http://www.kenesh.kg/
Delegation of the Federal Assembly of the Russian Federation to the CSTO PA consists of 10 deputies of the State Duma of the Russian Federation and 12 members of the Federation Council of the Russian Federation.
Plenipotentiary representative of the Federal Assembly of the Russian Federation - deputy Executive Secretary of the CSTO Parliamentary Assembly: Mikhail Krotov
Delegation of the Supreme Assembly of the Republic of Tajikistan to the CSTO PA consists of 6 deputies of the National Assembly of the Supreme Assembly of the Republic of Tajikistan and 6 deputies of the Assembly of Representatives of the Supreme Assembly of the Republic of Tajikistan.
The Assembly adopted the model law on Information Security
30 November 2021
The Assembly adopted the model law on Information Security
The CSTO model law On Information Security was adopted at the CSTO PA plenary session on November 29, 2021.
The draft model law was presented by Anatoly Vyborny, Chairman of the CSTO Parliamentary Assembly Standing Commission on Defence and Security, deputy Chairman of the Committee on Security and Corruption Control of the State Duma of the Federal Assembly of the Russian Federation. He said that its development was dictated by many reasons, including both the direct expansion of the range of threats to information security, including changes in their nature and intensity; and attempts by foreign states to obtain confidential national cybersecurity data.
It is known that the development of programmes to disrupt the software of various automated systems and theft and destruction of information have now become an industry of sorts. The number of so-called virus programmes is constantly growing, they are improving and becoming more and more dangerous.
The automation of various industrial and administrative processes means that malware is essentially becoming a weapon, not only for private individuals but also for public authorities.
And every day new cyberthreats and cyberattacks require more and more rapid response through joint actions of the CSTO States within the framework of common legal mechanisms.
That is why the innovations laid down in the model law are a logical development of a number of provisions of the CSTO model law On National Security and recommendations on ensuring information and communication security.
The law defines the content of information security activities, which includes identifying and assessing threats, developing and implementing modern technologies with information protection, compiling a unified list of individuals and organizations that carry out cyberattacks in order to establish effective mechanisms and rules for countering them.
Given the cross-border nature of the information space, the model law allows for the timely detection and countering of hybrid threats initiated by Western intelligence services and transnational corporations, and for the development of joint plans to repel information attacks, the introduction of secure information exchange technology between allies and joint steps to combat the deployment and financing of so-called “colour revolutions,” among other things.