Comments on "Cybersecurity Vulnerabilities Administrative Regulation"