Joke Collection Website - Public benefit messages - What are the medical insurance network security management systems in Guizhou Province?

What are the medical insurance network security management systems in Guizhou Province?

Medical Insurance Information System Management System 1. The medical insurance information system is managed uniformly by the Hospital Information Department and is used uniformly in accordance with the network management system. 2. Dedicated personnel are responsible for the installation, maintenance and management of the medical insurance information system. 3. Medical insurance system operators are not allowed to access data without permission, and are not allowed to modify or delete medical insurance system database information (including central databases and local databases). Medical insurance information is not allowed to be shared externally. 4. The medical insurance route is a dedicated line, and no one is allowed to illegally access the medical insurance information management network through improper means. 5. When a system failure occurs, troubleshoot it yourself first. If it cannot be solved, notify the medical insurance center in time and ask the medical insurance center to help solve the problem.

In order to ensure that medical insurance network computer applications can be normal, efficient and safe

Operation to achieve the goals of system security, data security, network security and application security

, the "Medical Insurance Network Computer Information Security Management System" is specially formulated.

1. Personnel Management

(1)

All staff in the system should be regularly reviewed from the perspective of political ideology,

professional level,

Evaluate work performance and other aspects

to ensure the safety and reliability of these personnel as much as possible.

Personnel who are not suitable for contact with information systems should be transferred in a timely manner.

(2)

In addition to professional training,

all staff must also take corresponding computer security courses

Only after training can you enter the system to work.

(3)

A dedicated person is responsible for the medical insurance network computer and the system password is changed regularly.

2. Computer Security Management

(1)

Except for medical insurance application-related programs,

it is strictly prohibited to install other software at will.

Important

data files must be stored in multiple copies on different disks.

(2)

It is strictly prohibited to use USB flash drives, portable disks, compact discs and other mobile peripherals to copy files to medical insurance network computers.

(3)

It is strictly prohibited to modify or delete files on medical insurance network computers.

(4)

Passwords must be set for medical insurance network computers, and the generation, registration, and replacement of passwords must be strictly managed. The password should preferably be more than 8 characters.

(5)

It is strictly forbidden to use the Internet on the computer connected to the Internet. No inspection or copying may be provided to others without approval.

(6)

,

Medical insurance lines are dedicated lines, and no one is allowed to illegally enter the medical insurance information system network through improper means.