Vietnam’s Cybersecurity and Data Protection Rules: A Compliance Roadmap for Businesses

Posted by Written by Tom Sedzro Reading Time: 5 minutes

As Vietnam’s digital economy continues to grow, businesses must navigate an increasingly complex landscape of cybersecurity and data protection regulations to ensure compliance and maintain customer trust.


Vietnam’s rapidly growing digital economy underscores the urgent need for stronger management frameworks to ensure cybersecurity and enhance personal data protection. For both foreign and local businesses, compliance is becoming essential to maintaining operational continuity, building customer trust, and enabling swift incident response.

Recent public-sector and industry activity in Ho Chi Minh City, including live cybersecurity drills focused on data resilience, signals a stronger emphasis on preparedness and coordination among stakeholders. Meanwhile, companies must navigate an evolving regulatory landscape that includes Vietnam’s Personal Data Protection Law, which took effect on January 1, 2026, together with Decree No. 356/2025/ND-CP, which provides implementing guidance.

Cybersecurity regulatory framework

The regulatory landscape can be grouped into three practical categories that investors and operating teams should monitor: cybersecurity-related requirements and implementing guidance, personal data protection rules, and broader policy signals that may shape future enforcement priorities.

Regulation

What it covers

Who is in scope

Cybersecurity Law (Law No. 24/2018/QH14)

Baseline cybersecurity framework for national security and social order in cyberspace

Agencies, organizations, and individuals with responsibilities under the law

Decree 53/2022/ND-CP (detailing the 2018 Cybersecurity Law)

Implementing decree detailing selected provisions of the Cybersecurity Law, including mechanisms linked to data storage and local presence in specified cases

Enterprises covered by the implementing provisions, including certain telecommunications, internet, and value-added service providers operating in Vietnam’s cyberspace, and entities subject to cybersecurity inspection or requests under the decree

Law on Cyberinformation Security (Law No. 86/2015/QH13)

Cyberinformation security regime covering information system security, civil cryptography, standards, services, and state management

Vietnamese agencies, organizations, and individuals; and foreign organizations and individuals involved in, or related to, cyberinformation security activities in Vietnam

Personal Data Protection Law (PDPL) (Law No. 91/2025/QH15)

Core personal data protection law covering principles, roles, and rights and obligations

Vietnamese agencies, organizations, and individuals; and foreign agencies, organizations, and individuals in Vietnam

Decree 356/2025/ND-CP (guiding PDPL implementation)

Implementing measures to operationalize Personal Data Protection Law obligations.

Personal data controllers, controller processors, and processors, with specified flexibilities for certain small, start-ups, and micro entities

Law on Cybersecurity (Law No. 116/2025/QH15; effective July 1, 2026)

Consolidated cybersecurity framework effective July 1, 2026

Vietnam-based entities; foreign entities in Vietnam; and foreign entities connected with cybersecurity protection activities or cybersecurity products and services in Vietnam

Note: The Cybersecurity Law (Law No. 24/2018/QH14) and the Law on Cyberinformation Security (Law No. 86/2015/QH13) remain relevant until June 30, 2026.

Several policy signals suggest that cybersecurity compliance in Vietnam is increasingly framed around resilience, capability building, and coordination. Recent public-sector activity in Ho Chi Minh City, such as live-fire cybersecurity drills paired with training, highlights a practical emphasis on testing incident response and improving cross-stakeholder preparedness.

At the institutional level, the National Cybersecurity Association has expanded its footprint with a southern branch in Ho Chi Minh City, positioning itself as a coordinating body for workforce development, awareness-raising, and strengthening digital defense capabilities. In parallel, businesses can expect continued attention to skills and culture-building through initiatives such as the proposed “Open Vietnam Cyber Range” and messaging that encourages companies to embed cybersecurity into corporate culture over time.

Key compliance challenges for businesses operating in Vietnam

Companies usually encounter a few recurring challenges when translating cybersecurity and personal data requirements into daily controls.

Key considerations

What it means in practice

Business implications

Scoping and data mapping

Identifying where personal data sits and how it flows across systems and functions

Supports consistent controls and faster incident handling

Vendor reliance and third-party risk

Clarifying vendor roles, access, and contractual safeguards across outsourced services

Reduces exposure through suppliers and improves auditability

Localization and local-presence questions

Assessing whether specific services or data categories trigger local storage or local presence planning

Helps avoid late remediation and operational disruption

Workforce capacity constraints

Building internal capability through role clarity, training cadence, and escalation paths

Improves control consistency and response readiness

Cybersecurity governance and operational readiness

Effective compliance begins with ownership and repeatable controls backed by documentation that can be produced quickly during reviews or in the event of an incident.

Focus area

Baseline expectations

Evidence to retain

Governance and accountability

Named owner; roles and escalation path

Governance charter; meeting minutes; responsibility matrix

Data inventory and policy foundation

Data inventory and key flows mapped; core policies approved

Data map; policy pack; approvals and version history

Vendor and outsourcing management

Vendor tiering; minimum security and data clauses

Vendor list; due diligence file; contract addenda

Access and endpoint security

Multi-factor authentication for key systems; least privilege; managed devices

Access reviews; authentication coverage; device and endpoint reports

Monitoring and vulnerability management

Central logging; alerts for high-risk events; patch cadence

Log retention policy; monitoring reports; patch and scan evidence

Resilience and incident readiness

Tested backups and restore drills; incident response plan and exercise

Backup logs; restore test results; incident playbook; exercise notes

Workforce and training

Regular awareness training; role-based training where needed

Training logs; communications materials; completion records

Personal data handling and transfers

Consent or lawful basis tracked; request workflow; transfer register

Notices; consent records; request log; transfer documentation

Implementation and coordination roadmap

An effective approach is to implement compliance readiness in phases over 90 days, using a simple timeline that moves from visibility to operational readiness without overwhelming internal teams.

Foreign investors and Vietnam-based operators can use this structure to prioritize foundational controls early and build evidence for ongoing compliance.

  • In the first 30 days, companies should complete a data inventory, map key data flows, assign a governance owner, and implement controls that provide quick wins, such as tighter privileged access, multi-factor authentication for critical systems, and verified backup coverage.
  • From days 31 to 60, businesses should strengthen execution by tightening vendor and outsourcing controls, clarifying shared responsibilities, and drafting an incident response playbook supported by tabletop exercises and baseline staff training.
  • During days 61–90, organizations should focus on resilience testing (including restoration exercises), compiling an evidence pack for audits or incident follow-up, and introducing a limited number of monitoring metrics.

In parallel, companies should establish an authority engagement protocol, define what to document and preserve, and add optional participation activities as the program matures.

Scenario

What to prepare and document

Routine compliance inquiries or information requests

Request log; scope and deadlines; relevant policies; system and data inventory excerpt; response record

Formal notice, inspection, or audit activity

Evidence index; document control pack; access and activity logs; interview notes; remediation tracker

Cybersecurity incident suspected (first 24–48 hours)

Incident timeline; affected systems list; containment actions; evidence preservation notes; decision log

Confirmed incident with possible personal data exposure

Personal data scope summary; affected groups and categories; notification decision record; communications drafts; vendor involvement record

Vendor or cloud service incident affecting your environment

Vendor incident report; shared responsibility summary; access logs; contract and service level terms; follow-up plan

Cross-border transfer, outsourcing, or new system rollout

Data flow map; vendor due diligence file; transfer documentation where applicable; approvals record; go-live checklist

Participation in cybersecurity drills

Exercise objectives; scenario and scripts; participant list; after-action report; improvement plan

Joining industry or national initiatives or associations

Participation charter; information-sharing rules; membership records; training plan; lessons learned summary

Ongoing point-of-contact readiness

Named points of contact; escalation tree; contact directory; review cadence records; evidence retention rules

Key takeaways

Vietnam’s cybersecurity and personal data compliance expectations are strengthening. January 1, 2026, is an important operational milestone for personal data governance under the Personal Data Protection Law and related Decree 356/2025 implementation guidance. For many companies, the main challenge is not interpreting requirements but implementing them consistently across systems, vendors, and people, especially amid workforce capacity constraints.

A robust readiness program emphasizes clear ownership, practical controls, regular employee training, and rehearsed incident response supported by tested backup and recovery procedures. Public drills and national initiatives also signal that resilience and coordination are becoming core expectations for businesses operating in Vietnam, alongside day-to-day compliance.

Cybersecurity and Compliance Advisory

Dezan Shira & Associates provides cybersecurity and compliance advisory tailored for Asia’s regulatory landscape. Our services include IT infrastructure audits, Zero Trust implementation, security training, and multi-jurisdictional data privacy compliance. Contact our Vietnam team to schedule a consultation: Vietnam@dezshira.com.

About Us

Vietnam Briefing is one of five regional publications under the Asia Briefing brand. It is supported by Dezan Shira & Associates, a pan-Asia, multi-disciplinary professional services firm that assists foreign investors throughout Asia, including through offices in Hanoi, Ho Chi Minh City, and Da Nang in Vietnam. Dezan Shira & Associates also maintains offices or has alliance partners assisting foreign investors in China, Hong Kong SAR, Indonesia, Singapore, Malaysia, Mongolia, Dubai (UAE), Japan, South Korea, Nepal, The Philippines, Sri Lanka, Thailand, Italy, Germany, Bangladesh, Australia, United States, and United Kingdom and Ireland.

For a complimentary subscription to Vietnam Briefing’s content products, please click here. For support with establishing a business in Vietnam or for assistance in analyzing and entering markets, please contact the firm at vietnam@dezshira.com or visit us at www.dezshira.com