《2022年公司IT管理制度 .pdf》由会员分享,可在线阅读,更多相关《2022年公司IT管理制度 .pdf(13页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。
1、精品办公文档朝阳港华燃气有限公司IT 管理制度文件号:CYGH/IT-01 版本:20170630 编制部门:技术设备部审核:批准:生效时间:备注:精品办公文档目录一、前言 .3二、定义 .3三、制度内文 .43.1、计算机硬件管理.43.2、计算机软件管理.53.3、信息安全管理.7附件一耗材申请单 .10附件二权限申请单 .11附件三数据修改申请单 .12文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F
2、3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH
3、2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F
4、3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH
5、2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F
6、3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH
7、2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F
8、3精品办公文档一、前言为了规范公司 IT 各项工作,提高IT 系统的可靠性,提高IT 系统与设备的总体服务水平,并使得相关工作具有持续改善性及相互协作性,特制定统一的IT规范及标准,包括建立统一的硬件设备管理规范,统一的IT 网络、软件安全标准,统一的系统管理维护流程以及信息安全管理的目的与责任等。根据公司计算机应用的需要,由技术设备部制定本管理制度。二、定义本制度适用于公司内所有硬件(包含公司所有计算机及外围设备)、软件(包含 TMS、TCIS 及辅助 TCIS 的所有子系统、GIS、巡检系统、安检系统、热线系统)和网络安全等。文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7
9、W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8
10、Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7
11、W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8
12、Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7
13、W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8
14、Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7
15、W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3精品办公文档三、制度内文3.1、计算机硬件管理3.1.1、公司的所有计算机及外围设备是公司的固定资产,根据实际工作需要配备给各部门人员使用,各部门使用人员必须加以爱护、保持整洁,并保证良好的使用环境。若用户使用的设备发生人为损坏、设备遗失等,需要按具体规章制度执行赔偿。3.1.2、由技术设备部对公司所有计算机设备进行统一编号,建立计算机硬件明细台帐,并定期对硬件进行维护、检查各部门使用情况。3.1.3、硬件故障:各部门使
16、用人员发现硬件故障时,应及时向技术设备部说明情况,由技术设备部进行确定并及时处理,各部门人员不得擅自拆装更换硬件设备。3.1.4、部门如需申请耗材,需到每月25 日前填写申请单(附件一),经主管副总批准后,由技术设备部购买进行发放。3.1.5、计算机的使用人即为该设备的责任人,使用部门为责任部门。未经责任部门经理批准,任何人不得使用其他部门或他人计算机。3.1.6、原则上非公司电脑设备不得接入公司网络,公司员工的个人私有电脑(非公司资产)如有特殊原因,必须经使用部门提出申请,由部门主管同意后,由技术设备部检查系统安全性后并统一安装公司防毒软件和补丁升级等系统安全程序方可加入公司网络。3.1.7
17、、技术设备部负责对公司所有电脑硬件使用情况的督查和监控。3.1.8、公司内部开会需使用笔记本时,需提前与技术设备部沟通,并在使用结束后及时归还技术设备部,如当日无法归还时,需及时向技术设备部说明情文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档
18、编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2
19、I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档
20、编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2
21、I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档
22、编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2
23、I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3精品办公文档况。如需把笔记本外带时,需经技术设备部经理同意。3.2、计算机软件管理3.2.1、软件的使用情况系统名称使用部门主要使用功能TMS 财务管理部财务日常的
24、相关工作物资管理部物资的采购工程管理部客服管理中心集团所需报表管网中心资产管理生产运行部资产管理技术设备部资产管理各部门报销专员各部门资金申请TCIS 及辅助TCIS的所 有子系统客服管理中心民工商用户报装、收费、欠费催缴、抄收、维修业务财务管理部发票管理、民工商用户扎帐物资管理部表具出入库管理工商事务部地址管理、民工商用户报装业务技术设备部系统维护、数据修改、权限管理GIS 管网中心管网抢修、维修管网定位巡检系统管网中心监督巡检员安检安检中心与安检有关的一切业务热线呼叫中心用户报修、咨询、解答用户疑惑、与公司内部沟通等业务3.2.2、软件权限的增加:由各部门根据工作需要,提出书面需求申请(附
25、文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2
26、H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3
27、文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2
28、H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3
29、文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2
30、H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3
31、文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3精品办公文档件二),经主管副总批准后,才可增加相应权限。3.2.3、软件数据的修改:各部门在使用过程中需修改数据时,需向技术设备部提出书面申请(附件三),经主管副总批准后,才可进行修改。注:如工商业用户调整用户金额时,需总经理批准才可进行修改。民用户的用户性质及用户数量较多,每月有300 气量无需提交数据修改单,即可即可进行修改。3.2.4、软件故障:各部门
32、使用人员发现软件故障时,应及时向部说明情况,由技术设备部进行确定并及时处理。3.2.5、员工不得私自在工作机上安装与工作无关的程序,mp3、影音文件播放程序、聊天工具、游戏等。3.2.6、工作时间(包括加班时间)公司员工不得使用工作用机玩游戏,听音乐观看电影。3.2.7、软件安装和使用过程中病毒的预防:员工不得在工作机上安装来历不明的软件;安装软件前,应对该安装盘进行杀毒。安装软件时应打开防火墙,防止病毒入侵。3.2.8、技术设备部负责对公司所有电脑软件使用情况的督查和监控。3.2.9、为防止电脑突然死机无法启动情况的发生,建议公司员工在使用电脑的过程中,尽量避免把与工作相关文件放到C 盘及桌
33、面目录下。3.3、Internet(互联网)使用管理:3.3.1、工作时间(包括加班时间)公司员工不得浏览与工作无关的网站,不得下载与工作无关的文件,包括mp3、Flash、影音文件、游戏等。3.3.2、工作时间(包括加班时间)公司员工不得通过网络玩在线游戏,听音乐观看电影。3.2.3、公司员工上网时必须激活病毒防火墙,不得随意下载文件、信件,文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV
34、2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A
35、8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV
36、2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A
37、8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV
38、2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A
39、8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3精品办公文档防
40、止病毒侵入公司内部网络,如违反该规定,一切后果由本人承担。3.2.4、各部门上报的因工作需要的上网名单,经公司领导批准后,由 IT 部统一调配公司员工上网权限。对于私自盗用他人上网权限的用户,按有关规定处理。3.2.5、公司员工不得私自更改本机IP、DNS、网关地址。对于因私自更改造成的一切后果由本人承担。3.2.6、公司员工不得使用他人电脑上网,不得将外人带入公司使用公司电脑和通过公司内网上网。3.3、信息安全管理3.3.1、数据安全A、防止未经授权修改数据;B、防止未经授权泄露数据;3.3.2、系统安全A、防止未经授权、越权、偷用他人权限使用系统;B、控制网络流量,防止过量的访问使系统资源
41、过载导致的系统崩溃。内部网络流量超负荷,保障外网服务(Internet)、内网邮件服务(Notes)的安全。3.3.2、信息安全A、任何与公司机房网络设备相连的IP 网络,都需经主管副总同意,不得私自向其他公司或人员开放;B、任何与公司相关数据传输只允许在公司内进行,不得在其它网络上传输数据;C、对数据进行管理的机房工作人员,每日必须进行备份,机房人员为此事件负责人;文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W
42、7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G
43、1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W
44、7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G
45、1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W
46、7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G
47、1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W
48、7H5F3精品办公文档3.3.3、密码安全和管理方案A、培养良好的安全操作习惯,在指定的计算机或终端上操作,不要把密码写在记事本或电脑上,有事离开计算机时应将其锁定;B、做到帐号专管专用,定期更改并在失密后立即报告;C、人员调离时,应采取相应的安全管理措施。例如:人员调离的同时马上移交工作、向技术设备部提交书面申请关闭或着注销帐号(附件二)。3.3.4、机房管理:A、要有安全防范意识。早进入、晚离开时要检查设备情况;离开时察看灯、门、窗、锁是否关闭好。B、路由器、交换机和服务器以及通信设备是网络的关键设备,不得自行配置或更换,更不能挪作它用。C、非工作人员进入机房,要事先征得同意;未经许可一律
49、不准触碰开关和设备。D、计算机房要保持清洁、卫生,并由专人负责管理和维护(包括温度、湿度、电力系统、网络设备等),无关人员未经管理人员批准严禁进入机房。E、严禁易燃易爆和强磁物品及其它与机房工作无关的物品进入机房。不能明火作业。机房一律禁止吸烟,凡不听劝告者,一律逐出机房。F、建立机房登记制度,对本地局域网络、广域网的运行,建立档案。未发生故障或故障隐患时当班人员不可对中继、网线及各种设备进行任何调试,对所发生的故障、处理过程和结果等做好详细登记。G、机房工作人员应做好网络安全工作,服务器的各种帐号严格保密。监控网络上的数据流,从中检测出攻击的行为并给予响应和处理。3.3.5、数据保密及数据备
50、份制度A、禁止泄露、外借和转移专业数据信息。文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5F3文档编码:CV2K6F8Y4G1 HH2H2I2G8A8 ZJ7W5W7H5