Joke Collection Website - News headlines - Unsecured computer management system

Unsecured computer management system

Non-classified computer security management system (for Trial Implementation)

First, computer operators must abide by the relevant laws of the state, and no one may use computers to engage in illegal activities.

Two, computer operators without the approval of the superior leadership, shall not provide internal information and materials, as well as user names, passwords and other content.

Three, network equipment must be installed with anti-virus tools, and has the function of vulnerability scanning and intrusion protection, so as to carry out real-time monitoring and regular detection.

Four, computer operators should always check the computer system to prevent loopholes, prohibit the transmission of classified documents through the network, and prohibit the cross use of classified software, CD-ROM, USB flash drive and mobile storage media between classified and non-classified computers.

5. When a computer with Internet access authority accesses the Internet and other networks, it is forbidden to browse, download, disseminate or publish illegal information; It is strictly forbidden to receive mails of unknown origin.

Six, important data should be regularly backed up and copied to prevent data loss caused by damage to storage tools. Backup tools can use special CD, hard disk, U disk, etc. , and keep it properly.

Seven, computer operators should hand over the relevant materials, documents and software to other staff, and keep the contents that need to be kept confidential strictly after the handover. The replacement personnel should readjust the system and reset the user name and password.

Eight, in violation of regulations, leaks, will be held accountable according to the seriousness of the case.

Nine, this system shall be implemented from the date of issuance.