To dedicate a company to the management of computer system use _IT industry

Source: Internet
Author: User
As if someone wanted this, this is in the past when the company and colleagues in accordance with some of the foreign information developed by the IT regulations, the crystallization of collective wisdom, but also not original, just want to take out for the need of the Ccfer for reference, many of the terms listed also because the company has been a number of similar events.
I have been away from this company for almost two years, and I miss the more than 2000 days and nights of the company and those lovely brothers!


Regulations on the management of company computer system use
(Information Technology Users Policies)
This Regulation applies to: all * * * Employees
General
When a company's employees are licensed to use the company's computer system, this ordinance considers that the employee fully accepts any setting and policy restrictions on their computers and other ancillary facilities by the company's computer department and fully accepts all the terms and conditions set out in this regulation. If you have any objections to this Regulation, please terminate the use of the computer immediately and please provide relevant instructions to the relevant departments and the responsible person and apply for the waiver of the use of the company computer system requirements.

1. Hardware Management

1.1 The company's computer systems and related ancillary equipment (such as printers, scanners, network equipment, etc.) procurement, use, scrap and so on must be approved by the computer Department of Audit; The computer department is not obligated to provide any type of service support for computer equipment that has not been audited by the computer department.
1.2 In order to manage and apply the company's computer more effectively, the computer department numbers and registers all the computers and related equipment in the company, including the model number, the use department, the user and the use of each machine. No person may change the computer configuration without permission from the computer department.
1.3 The Assets management rights of the company's computer equipment belong to each use department. Employees of the company shall not misuse the computer equipment, the user is obligated to the computer equipment they use the assets of the responsibility, the computer hardware equipment damage, loss, stolen, and so on, must promptly notify the relevant responsible person and the computer department.
1.4 Notebook and other computer users who use mobile devices may not place the equipment overnight in an unattended, open office environment, any damage or loss of any related assets should be responsible for all related costs, and in accordance with the actual situation is responsible for some or all of the maintenance, replacement costs incurred.
1.5 The reasons for the failure of the computer equipment of the company is responsible for the computer department, not computer department personnel or departments of computer failure to determine the cause of any effect; if the company staff in the use of computers encountered abnormal use or difficulties, please fill out the repair contact sheet, indicating the machine number and fault phenomenon, Inform the computer department personnel to determine the cause of the failure and repair.
1.6 Computer equipment by the computer department maintenance personnel to determine the need for external repair, the computer department is responsible for the opening of a single outward, repaired by the computer department to confirm the use of the Department from the computer department to collect maintenance equipment, related maintenance costs by the corresponding departments to pay.
1.7 Non-Computer department personnel shall not disassemble and repair computer hardware and equipment.
1.8 The company's computer room and other computer department of the use of premises, such as the computer department is not allowed to enter without permission.

2. Software Management

2.1 The use of computer software, procurement, related technical training must be approved by the computer department; If there is no software application approved by the computer Department, the computer department does not provide all the related service support.
2.2 The user of the company computer and its related application system must be the company personnel authorized by the superior Supervisor and department. Non-company employees are strictly prohibited from using the company's computer and computer-related resources, and no one may obtain non-public related data from other people's computers and related application systems without superior leadership or department permission.
2.3 All computer users must receive relevant computer training prior to using the company's computer equipment and related production systems for the first time, or using a new operating system or software that has not been used before.
2.4 The computer software in the company is unified by the computer department to manage and install, the computer user must not change, delete or install any software without permission. When the computer software failure damage, should promptly notify the computer department to update and record.
2.5 without violating the previous 2.3 rule, the company's computer users are, by default, considered to be fully receptive to the terms of the licensing agreement for all software in the computer system to which they are using, and if there are objections to some of the software or certain software terms, please apply to the relevant department and the person in charge The computer department helps them to delete the relevant software and its applications.
2.6 The computer Department should establish the company's software archive, the company's work needs of the various software to be backed up in time, often check the update, maintain its availability.
2.7 The computer users of the company may not change the relevant software settings of the computer system (especially: computer name, IP address, browser related configuration, etc.); If the work requires a series of changes to the computer's software settings, it must be approved by the Supervisor and the department.
2.8 for the company's production management system and other network application system users, please exit the system in time after using the system.
2.9 Do not install the wallpaper and screen saver program on the company's computer system, this kind of program will occupy a lot of system resources, reduce the running speed of the computer system and reduce the efficiency of the users.
2.10 Forbid to install or play computer game on the company's computer system! Company computer department personnel will not regularly check the company's computers, such as the discovery of a game is the user responsible. At the same time to hold the responsibility of department heads.

3. Confidentiality and Virus protection

3.1 Company for all computer users to open computer network system login account, the account password should be updated two months, the password itself must use a non-empty, not the account itself in the form of passwords, passwords must not be in any written form of records or representations. All kinds of computer system accounts by the computer department to unify the management, the computer department should make a special file, strict implementation of the management process.
3.2 The company's corresponding production management system users should strictly confidential their account password; users are strictly prohibited to disclose all information about the computer account (including account ID, password, account attribute, relevant instructions, etc.) to others by means of any method, and the MIS user has changed the personnel for work or other reasons. Please inform the computer department in time to modify the relevant information of the user account or deactivate the account number.
3.3 All employees must receive the corresponding computer safety education, know the company's Computer Management regulations, and accept the related security management setup and operation of the computer department of the company.
3.4 All sensitive data or confidential data must be encrypted in a certain way and backed up by a certain physical security.
3.5 All computers must have a screen saver and its additional password, and the trigger time is 10 minutes or less, and the computer system should be in a password-protected state or a user's account logoff status when no one is using it.
3.6 Each computer must have anti-virus software installed. If the virus is found, the computer department should be notified in time to prevent the virus from spreading to other computer users on the network; Please computer department to ensure the normal operation of anti-virus software on the user's computer and timely virus code updates work properly, prohibit the use of computer systems not installed anti-virus software.
3.7 All mobile data storage media (including floppy disk, zip disk, USB drive, mobile hard disk, etc.) before use, must be a computer virus to the killing.
3.8 Attention to data backup, the computer users should be in time for their own data backup, it is best to do their own data once a floppy disk (or USB) backup and a hard disk backup.
3.9 The same computer if there are a number of users, each computer users please put their own files to their own subdirectory, to operate their own subdirectories, as far as possible not to change the subdirectories of others.
3.10 The company's network of various data and reports should be strictly controlled within the company, no one should disclose the company's production data. Beathers!
3.11 company security to strictly control the computer data storage media (including floppy disk, CD-ROM, MO, CCF, hard disk, zip disk, USB drive, etc.) access to the factory. If the work needs to bring the media to and from the factory, the computer department and its relevant departments of the responsible person to confirm the rear.
3.12 Use the folder sharing function of the computer system carefully, when making folder sharing, clear all the actions (please consult the computer Department for related information). If the result of data loss, data leakage, illegal intrusion (including virus and hacker behavior) caused by the folder sharing function, the parties bear all the consequences.

4. Network Management

4.1 For the use of some shared resources within the company, please each user by the superior Supervisor or department to the computer department to submit the corresponding application; no one shall arbitrarily access unauthorized network resources and shall not enter other people's hosts and their shared folders at will.
4.2 Company computer users found that the network interruption or network system is not available, please notify the computer Department of repair immediately.
4.3 Computer network equipment (including power supply and other ancillary equipment) should be marked with a significant indication of its existence, no person without permission of the computer department to change the physical location of the physical equipment of the company's computer network (including power and wiring); Blocking cable and other behavior).
4.4 In order to ensure the company's internal computer security and network data communication Normal, by the company's computer department authorized by the special personnel of all computer equipment, systems, network transmission for any time monitoring.
4.5 No person shall use any means to eavesdrop or steal electronic information such as data, data flow, etc. on the company's network.

5.Email System Management

5.1 Internal email system should not be used to promote feudal superstition, obscenity, pornography, gambling, violence, murder, terror, abetting crime tools.
5.2 Do not use the company's email system to openly insult others or fabricate facts to slander others, or to conduct other malicious attacks.
5.3 The company's email system is not used for "chain letter", "advertising", games and other work-related information content transmission, no one can use the company's email system to send and receive personal letters.
5.4 Employees are not allowed to use internal email to send any electronic information to the external email address without the permission of the superior Supervisor and department.
5.5 Non-authorized users are prohibited from sending email to #all user.
5.6 Company to ensure the speed of email system and its network communication, the relevant departments for all users of the company's email mailbox set the relevant parameter size, please minimize the space you occupy on the email server, and periodically empty unnecessary emails; Download the email you use as a memo to a personal folder on your local computer (a single personal folder size cannot exceed 2G, users can create multiple personal folders at once, and please control the size of each outgoing email to below 2MB (please refer to the computer Department for detailed technical information).
The public folder in the 5.7 email system is to share information such as the relevant electronic messages in the work, not to store large amounts of data; the owner of the relevant public folder needs to be fully responsible for the monitoring and maintenance of the public folders; The public folder should not be abused and the user's permission should be revoked.
5.8 for the protection of the normal operation of the company's email system, but also to ensure that the email system to better serve you, please exit the email system after the normal shutdown.
5.9 Users who use the company's email must install the appropriate anti-virus software and minimize the use of the company's email system to transmit. exe files and Office document files. In case the virus spreads through email.
5.10 to prevent viruses and other destructive information from threatening the safety of the company's network, employees must not open or preview any additional files or macros that are sent to the company by email, or open or click on the ads attached to the email, other unknown links, or other attached emails, Please delete the email at the first time and empty the Junk Bin folder in Outlook.

6. Internet Service Management

In order to make reasonable use of the Internet resources provided by the company and improve the efficiency, this regulation is formulated.
(This rule applies to all employees who are employed, especially those who have access to the Internet, who must comply with the provisions of these rules.)
6.1. All employees to access the Internet application must indicate the nature of the work, and the department responsible for the confirmation of their actual work within the scope of the application can be submitted to the general manager for approval. Only authorized users can use the Internet service projects provided by the company, authorized users must comply with the company's Internet Services management regulations, to accept the management of relevant institutions and administrators.
6.2. Employees who have access to the Internet must make use of Internet services within their work hours during their working days, do not allow private use, and may not lend their accounts to other employees. Once discovered, remove Internet access rights.
6.3. Users of fixed web sites that are required to work, and according to the leadership's advice, the computer department uses a phased approach to open Internet services for these special users. Users who need to be able to log in to some of the required sites during this period of time. Specific Internet policies are notified separately. To protect the company's Internet lines, the company prohibits employees from downloading large files at once or downloading large amounts of data frequently, and the relevant management and IT administrators have the right to interpret the regulations.
6.4. The computer department will screen out parts of the site based on the content of the site (involving pornography, reactionary content of the site or not related to work and may waste your time and reduce your efficiency of the site).
6.5. In addition to adopting the above shielding measures, company employees in the use of Internet services, the company will consider that the employee fully accept the company's behavior on the Internet monitoring, if there is any objection to this article, please submit an application for cancellation of Internet authorization. To ensure a more efficient use of Internet services by the user, the computer department analyzes the proxy server logs on a weekly basis and periodically sends each person's access record to the department head. It is the responsibility of the department heads to review whether their employees are using Internet services for their work.
6.6. Open all Internet services during non working hours, and users with Internet access have unrestricted access to Internet resources (in addition to pornography, reactionary, state-run sites and partially screened sites, if users visit illegal sites, We will confirm the visitor identity according to the proxy server log, investigate the related responsibility. Company employees are not allowed to use the company's Internet access and internal e-mail subscriptions related to the Internet transmission of news, magazines, periodicals and other electronic publications.
6.7. No information about the company may be disclosed outside the Internet. It is not allowed to use internet lines of the company to carry out acts that endanger national security, disclose state secrets, violate national social collectivity and citizens ' lawful rights and interests. You may not use the company's Internet resources to make, reproduce, and propagate the following information in the context of your access to the Internet:
(a) incitement to resist and undermine the implementation of the Constitution and laws and administrative regulations;
(ii) Inciting subversion of state power and overthrowing the socialist system;
(iii) Incitement to divide the country and undermine national unity;
(iv) Incitement to ethnic hatred, ethnic discrimination and the destruction of national unity;
(e) Fabricating or distorting facts, spreading rumours and disturbing social order;
(vi) Advocating feudal superstition, obscenity, pornography, gambling, violence, murder, terror, abetting the crime;
(vii) openly insulting others or fabricating facts to slander others or engage in other malicious attacks;
(eight) damage to the credibility of State organs;
(ix) Other violations of the Constitution and the administrative regulations of the law;
(10) The conduct of commercial advertising.

7. Other
7.1 * * * The computer department has the right to interpret the above regulations and reserves further rights.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.