
On 16 March 2026, the Ministry of Public Security finalized a draft decree on preventing and combating cybercrime and high-tech crime (the “Draft”) to solicit feedback from agencies, organizations and individuals. One of the key bases for proposing the Draft is to promptly combat and address the increasingly complex landscape of cyberattacks, fraud and the dissemination of false information both domestically and internationally. This is a necessary step by policymakers toward tightening oversight and control over criminal activities occurring in cyberspace.
Although the Draft is still at the initial consultation phase and the public still needs to await more information from the competent authorities, given its significant objectives, it is expected to propose notable legal provisions and have a strong impact on the awareness of relevant stakeholders. This article will highlight and analyze the key points of the Draft to provide stakeholders with a preliminary understanding and to get ready for next actions.
The Draft was open for feedback for ten (10) days and concluded on 26 March 2026.
Key Takeaways
- Specifying Certain Key Definitions: The definitions of service providers and online fraud are introduced as an initial step to clarify their scope and better reflect the nature of these concepts in practice.
- Compliance Responsibilities in Cyberspace: The Draft includes a separate provision outlining general compliance responsibilities for both service providers and users. Specifically for managing online groups and communities in cyberspace, the Draft clearly defines the compliance obligations not only for participants, administrators and moderators, but also for the service providers themselves. All of these provisions, in part, allocate responsibilities to the relevant parties and also enable them to better safeguard themselves in the context of compliance in cyberspace.
- Online Fraud and Child Abuse in Cyberspace: The Draft details specific acts of online fraud and child abuse in cyberspace, aiming to help the public recognize the complexity of these crimes and protect themselves when participating in online activities.
Specifying Certain Key Definitions
The Draft introduces the concept of “service provider” to broaden the scope of application to relevant entities. This is a notable and timely addition, as previous provisions lacked specificity, leading to difficulties in identifying the entities subject to regulation. Accordingly, service providers are defined as domestic and foreign enterprises, organizations, individuals that provide products, services in cyberspace within Vietnam, including: internet services, postal and telecommunications services, hosting services, servers, domain names, virtual private network, proxy servers, cloud computing services, social networks, websites, telecommunications services, financial institutions, credit institutions, banks, branches of foreign banks in Vietnam, e-wallets, payment intermediaries, stock exchanges, digital asset exchanges, e-commerce platforms, logistics services, digital television, online games, artificial intelligence, quantum, anonymous server services, and other products, services in cyberspace.
In addition, the detailed description of “online fraud” is also considered a fundamental new feature of the Draft compared to previous regulations. It’s not simply about specifying a concept, but also reflects how lawmakers seek to enable the public to more accurately understand this type of crime. This is particularly important given that the methods, increasingly sophisticated tactics and growing complexity of online fraud show no signs of abating in cyberspace, causing significant harm to unsuspecting victims. Initially, the Draft proposes that “online fraud” refers to acts involving the use of computer networks, telecommunications networks, the internet, electronic devices, artificial intelligence, information technology software, malware, and other similar digital technologies to create and disseminate false information, images, audio, video clips, to impersonate individuals or organizations, in order to deceive victims into believing and following instructions, or to threaten and intimidate victims into providing sensitive information or transferring money, assets for misappropriation. Although the definition remains preliminary, it generally reflects how online fraud is currently carried out in practice.
Compliance Responsibilities in Cyberspace
Responsibilities for Providing and Using Services
The Draft dedicates a separate chapter to clearly outlining the authority and responsibilities of relevant stakeholders in preventing and combating cybercrime and high-tech crime. In this context, service providers and users in cyberspace are no exception, with clearly separated responsibilities for each entity.
Some notable and key responsibilities under the Draft are set out below:
| Entities | Service Providers | Service Users |
| Responsibilities
|
|
|
Responsibilities for Managing Online Groups and Communities
In addition to the general provisions, compliance responsibilities are also proposed to apply to all relevant parties, from participants, to administrators and moderators, as well as without excluding service providers, reflecting a clear intent to tighten control over the operation of online groups and communities in cyberspace. Specifically:
| Entities | Participants | Administrators and Content Moderators on Social Media | Service Providers of Internet, Telecommunications, and Social Media |
| Responsibilities
|
|
|
|
At first glance, these provisions may seem quite general, but in practice, they are likely to impose a wide range of requirements not only from a legal perspective but also from a technical standpoint (e.g., control systems, technical measures, etc.,) that relevant stakeholders, specially service providers, must meet. Although this will cause some difficulties for entities, at this point, entities should begin considering the review and verification of user information, creating appropriate monitoring and management mechanisms for the use of services in cyberspace.
Acts of Using Cyberspace for Online Fraud
In addition to defining online fraud, the Draft also sets out specific acts involving the use of cyberspace for online fraud. Including this list not only fills existing legal gaps but also accurately reflects the forms of online fraud that are actually occurring. This also helps the public identify, prevent, and protect themselves against conduct indicative of criminal activity.
Some notable acts identified and enumerated include:
- Impersonating law enforcement authorities, state agencies, corporate employees, individuals or organizations to commit online fraud;
- Soliciting investments in financial exchanges, foreign exchange markets, stock exchanges, cryptocurrency exchanges, and other similar platforms in cyberspace to commit online fraud;
- Using forged or false images and information, including payment receipts, citizen ID cards, bank cards, employee ID cards, etc., to approach potential victims; and
- Using cyberspace to post false content in order to misappropriate property.
In order to promptly detect and handle violations, competent authorities are required to transfer information on online fraud accounts to specialized authorities responsible for combating high-tech crimes, and for coordination with commercial banks, financial institutions, and asset trading platforms to block, suspend related transactions.
Acts of Child Abuse in Cyberspace
All acts of abuse against children, as a vulnerable group requiring special protection, in cyberspace are strictly prohibited. Accordingly, some notable acts of child abuse in cyberspace include:
- Using cyberspace to entice, lure, coerce children to commit abusive acts; approaching children for abusive purposes through social media; threatening, coercing children to provide images or personal data for abusive purposes, etc;
- Distributing, sharing, transmitting child abuse content on the internet; providing links, private groups, platforms for exchanging child abuse content, etc;
- Using children’s images, information for illicit gain; coercing, enticing children to participate in online activities for unlawful profit, etc;
- Threatening, insulting, humiliating, defaming the honor, dignity of children; unlawfully disclosing children’s personal information, private life, etc;
- Illegally collecting, trading, exchanging children’s personal data; using such data for abusive purposes, fraud, asset misappropriation, etc; and
- Providing platforms, tools, services to facilitate child abuse; concealing, obstructing the detection, reporting, handling of child abuse, etc.
The above-listed acts demonstrate that authorities have been closely monitoring the actual occurrence of child abuse. The comprehensive and detailed reflection in the Draft also contributes to addressing gaps in previous legal frameworks.
Conclusion
The Draft clearly reflects the principle of proactive prevention, the protection of personal data, and a risk-based approach (the higher the risk – the tighter the control). Although the Draft has not yet been officially approved and will likely undergo further consultation, initially identifying the roles and taking appropriate actions will help stakeholders proactively respond to upcoming legal developments.
All stakeholders must always be aware of their responsibilities in complying with regulations in cyberspace, especially participants, administrators and moderators, as well as service providers in managing groups and communities. At the same time, stakeholders should pay particular attention to online fraud and child abuse in cyberspace to identify and address any potentially criminal behavior promptly.