Cybersecurity (Critical Information Infrastructure) Regulations 2018
Table of Contents
Enacting Formula
Part 1 Preliminary
1 Citation and commencement
2 Definitions
Part 2 Providing information to Commissioner
3 Information to ascertain if computer, etc., fulfils criteria of critical information infrastructure
4 Information relating to critical information infrastructure
5 Report of cybersecurity incident in respect of critical information infrastructure, etc.
6 Cybersecurity risk assessment
Part 3 Appeal to Minister
Division 1 Notice of appeal
7 Notice of appeal
8 Receipt of notice of appeal
9 Summary dismissal of appeal
10 Amendment of notice of appeal
11 Withdrawal of notice of appeal
Division 2 Response to notice of appeal
12 Defence
13 Amendment of defence
Division 3 Reply and rejoinder
14 Reply by appellant
15 Rejoinder by Commissioner
16 New matter in reply or rejoinder prohibited
Division 4 Management of proceedings
17 Appeals Secretary
18 Consolidation of appeal
19 Failure to comply with direction or time limits
20 Irregularities
21 Calculation of time
22 Extension of time
Part 4 Appeals Advisory Panel
23 Dissolution of Appeals Advisory Panel