Legal analysis: 1, engaged in computer network information activities, must comply with the provisions of the "Computer Information Network International Networking Security Protection Management Measures", should comply with national laws and regulations, and strengthen information security education.
2, computers and other hardware equipment by the company unified configuration and positioning, any department or individual shall not be allowed to privately misappropriated swap, loan and move the computer.
3, computer hardware and its accessories should be listed in the Audit Department, after obtaining the consent of the company's leadership, the Ministry of Information is responsible for the acquisition.
4, computer operations should be carried out in accordance with the prescribed procedures.
(1) computer on and off should be operated in accordance with the normal procedures, due to illegal operation of the computer can not be used normally, the repair costs are the responsibility of the department;
(2) computer software installation and deletion should be carried out under the permission of the person in charge of the business sector, no department or individual is not permitted to unauthorized addition or deletion of the computer hard disk data program;
(3) Computer operators should be timely weekly antivirus software upgrades, monthly system patches;
(4) do not allow the use of foreign USB flash drives, do need to use, should be the first virus monitoring;
(5) prohibit working hours on the computer to do things unrelated to work, such as playing games, listening to music, etc..
Legal basis: "the Chinese people's *** and the State Regulations on the Security Protection of Computer Information Systems"
Article 1 In order to strengthen the security protection of the international networking of computer information networks, and to maintain the order of the public *** and social stability, in accordance with the "Regulations on the Security Protection of the Chinese People's *** and the State Regulations on the Security Protection of Computer Information Systems," the "Interim Provisions for the Administration of the International Networking of Computer Information Networks of the People's Republic of China," and other laws and regulations, and to ensure the safety of computer systems. Interim Provisions on the Management of Computer Information Networks" and other laws and administrative regulations, the formulation of these measures.
Second, the People's Republic of China *** and the international networking of computer information networks within the territory of the security protection management, the application of these measures.
Article III of the Ministry of Public Security computer management supervisory body responsible for the international networking of computer information network security protection management.
The public security organs of the computer management monitoring agency shall protect the international networking of computer information networks, public **** security, safeguard the legitimate rights and interests of units and individuals engaged in the international networking business and the public interest.
Article 4 Any unit or individual shall not use the international networking to jeopardize national security, leak state secrets, shall not infringe on national, social and collective interests and the legitimate rights and interests of citizens, and shall not engage in illegal and criminal activities.
Article 5 Any unit or individual shall not use the Internet to produce, copy, access and disseminate the following information:
(1) incitement to resist or undermine the implementation of the Constitution and laws and administrative regulations;
(2) incitement to subvert the state power and overthrow the socialist system;
(3) incitement to secession of the country and undermining of the unity of the country;
(4) inciting ethnic hatred, ethnic discrimination and undermining national unity;
(5) fabricating or distorting facts, spreading rumors, and disrupting the social order;
(6) promoting feudal superstition, obscenity, pornography, gambling, violence, murder and terrorism, and abetting crimes;
(7) blatant insults to other people or fabrication of facts to defame others;
(viii) damaging the credibility of state organs;
(ix) other violations of the Constitution and laws and administrative regulations.
Article 6 No unit or individual shall engage in the following activities that jeopardize the security of computer information networks:
(1) Entering a computer information network or using the resources of a computer information network without permission; [3]
(2) Deleting, modifying, or adding to the functions of a computer information network without permission;
(3) Making changes to the functions of a computer information network without permission; and Permission to delete, modify or add to the data and applications stored, processed or transmitted in the computer information network;
(d) intentionally create or disseminate computer viruses and other destructive programs;
(e) other endangerment of the security of the computer information network.
Article VII Users' freedom and privacy of communication are protected by law. Any unit or individual shall not violate the provisions of the law, the use of international networking to infringe on the user's freedom and privacy of communication.