1. System self-inspection report
According to the Inner Mongolia Electric Power Group, "forwarding the State Grid North China Power Control Sub-center on the conduct of a special inspection of the grid's secondary system notice", combined with the actual situation of the electrical secondary system of the plant, for the Fengzhen Power Plant #3-#6 units, 220KV system, 500KV system equipment operating conditions, especially for network-related equipment, the arrangement of the relevant relay protection personnel to carry out a comprehensive inspection, and for the relevant issues to develop a rectification plan, is now the self-inspection report is reported as follows:
A. Relay protection operation management
1. countermeasures management: I plant the state grid and the Inner Mongolia Power Grid issued by the countermeasures documents are complete, all relay protection devices and safety automatic devices to meet the state issued by the professional testing requirements.
2. Software version management: all the line protection and generator protection software versions of our plant have accounts, and all the protection and safety automatic devices have upgrade records
3. Overhaul management: the inspection records of on-site relay protection equipments, standardized operation instructions, and work records are complete and strictly implemented. On-site inspection protection work instructions are complete, but the site work records are incomplete and need to be rectified.
4. On-site operation and maintenance management: relay protection and safety automation device on-site operation and management procedures are complete, the protection of daily inspection records are complete, relay protection and safety automation device soft, hard casting and withdrawal of the pressure plate with the regulator, the fixed value of the single with the regulator.
II. Relay protection equipment management
1. Equipment ledger management: equipment ledger records are complete, protection action, record anomalies analysis is complete, to meet the requirements.
2. Countermeasures in place to implement the document, the document is complete, the protection of the annual report, monthly report is complete.
III. Safety automation device
1. Safety control device software version of the management: complete.
2. Safety control account management: our plant has a set of high weekly cutting machine, distribution stabilization device 1 set. Accounts are complete.
3. Security control system strategy bookkeeping and management; I plant distribution stabilization as the implementation of the sub-station, strategy bookkeeping according to the implementation of the implementation of the terminus, according to the implementation of the strategy of the Inner Mongolia network regulator, the high weekly cutter has a fixed-value single implementation record, the site print and fixed-value single consistent.
IV. Network source coordination management
1. Key units involved in the network control system parameters: I plant excitation system, speed control, PSS, primary frequency control, into the phase and other test reports are complete, the test project is complete.
2. Key units involved in network protection parameters: protection parameters, protection value and system consistency.
V. Plant and station automation equipment operation and management
1. Plant and station automation equipment power supply and operating environment: I plant automation equipment power supply to meet the requirements of the environment, fire safety facilities to meet the requirements.
2. Plant and station power secondary system security protection: to meet the requirements.
3. Grid-connected unit automation management: our plant unit AVC meets the requirements of regulations and procedures, and is put into actual operation according to the requirements of grid scheduling. Our plant unit AGC meets the requirements of regulations and procedures.
VI. Automation channel data network
1. Automation communication channel: I plant automation communication channel has 2 channels, dual-channel can be switched, and the data network adopts an independent power dedicated communication network.
2. Scheduling data network and power system secondary protection; scheduling data network and power secondary system retrofitted with secondary physical isolation, the security of each region.
VII. Problems identified and their solutions
1. The plant protection device has not yet realized the synchronization function, but the network control and each unit has been installed GPS device, the recent manufacturers to debugging, it will be able to complete the synchronization function.
2, I plant 550KV boosting station switch failure reclosing protection has test overdue and super service situation, but has applied for upgrading, the cost down can be replaced.
2. System Self-Inspection Report
In order to further standardize and strengthen the management of fixed assets of the Bureau, consolidate the financial management of the basic work, improve the management mechanism, to protect the integrity and safety of state-owned assets, thoroughly mapping out the bottom of the family, the extent of the effectiveness of the play of fixed assets, 20xxx to xxxx, according to the county Finance Bureau requirements, I carefully organized the Bureau of fixed assets self-examination work, now in the self-examination process of the problems and their causes are reported as follows.
First, the recognition of fixed assets
According to the Finance Bureau's current fixed assets and low-value consumables management system, the current Bureau of the value of 2,000 yuan and above, such as computer equipment, printers, cameras, machinery, machinery, tools, life office appliances and other items, as well as the superior issued, purchased by the various types of police equipment class of goods were defined and a clear delineation of the provisions.
Second, the main practice of self-inspection
(a) the leadership attaches great importance to the organization. Our leadership attaches great importance to this self-inspection work, the self-inspection work as the fourth quarter of 2013 as one of the key tasks. Police Security Office overall responsibility, the heads of departments with the fixed assets self-inspection team, is responsible for the implementation of the bureau's fixed assets self-inspection work organization, the relevant functional sections, rooms, institutes, teams carried out a clear division of labor.
(b) clear division of labor, clear responsibility. Self-inspection work *** divided into preparation, self-inspection, summarization and acceptance of the four stages. The main work of the preparatory stage is to set up a fixed asset self-inspection team to determine the scope of self-inspection and work responsibilities.
(C) step by step, reasonable arrangement. The focus of this self-inspection falls on the self-inspection stage and the summary stage. Self-inspection phase is the main work of the self-inspection team on the management of fixed assets and low-value consumables to carry out self-inspection, inventory, the implementation of asset storage locations, asset status, etc., and truthfully fill out the fixed asset self-inspection system. For the fixed assets found in the self-inspection that need to be scrapped, reported as loss or made other disposal, it is required to find out the reasons and put forward proposals for handling. At the summary stage, the dissenting items shall be counted and confirmed again, and the "Fixed Asset Inventory Report Form" shall be filled in in detail after confirmation, and the working groups of the respective inspections shall review and confirm the "Fixed Asset Inventory Report Form" with each other and submit the summary of self-inspection to the Leading Group of Self-Investigation Work for review. The leading group of the self-examination work.
Third, the main results of the self-inspection
The leadership of the Bureau and the departments attach great importance to the self-inspection work, the main leaders personally grasp the implementation of the work.
After this self-inspection, the main results achieved are as follows: First, the full implementation of the Bureau's physical management of fixed assets and low-value consumables and the superiors issued, purchased various types of police equipment class items of the various basic information, especially for some of the physical information does not match the transfer of information on the assets, the Bureau of the site physical inventory as the basis for the information to be supplemented, modified. Secondly, we have further improved the information registration of the financial fixed assets cards and the utilization accounts of the utilization departments, so as to make the accounts, cards and accounts consistent with each other. Thirdly, a number of fixed assets and various types of police equipment that have been scrapped have been self-examined. In this self-examination after the summary reported to the Finance Bureau to apply for scrapping.
Fourth, the next step in the work of asset management ideas
(a) improve the system. In the future, the Bureau will be based on the new requirements of fixed asset management, the development of fixed asset management methods suitable for the Bureau's actual, easy to operate.
(B) clear responsibilities. Further clarify the duties and responsibilities of the various functional departments of fixed asset management, the establishment of unified requirements, hierarchical management, each to the best of their ability, each responsible for the new mechanism.
(C) strengthen management. Fixed asset management as a financial management and fixed asset use, management of an important daily work of the department, always pay attention to unremittingly, standardize the procedures, good entry and exit pass, sound accounts, certificates, cards, and strengthen the accounting, to ensure that the funds account, the physical account is consistent.
(D) strict inspection. Each department of their respective management of fixed assets for an annual self-examination, for violation of the situation to be informed.
(V) good implementation. Focus on the day-to-day management and implementation of the system, fixed asset management department in the strengthening of day-to-day management at the same time, to grasp the implementation of the system of supervision and inspection, coordination, articulation, supervision of the implementation of various departments, and strive to improve the management of fixed assets management to a new level.
3. System self-inspection report
Qi Finance Bureau, State-owned Assets Management Unit: According to the flag of the 20xx year administrative institutions state-owned assets management special inspection program requirements, my unit carried out a self-inspection, and is now the results of the self-inspection to do the following report:
First, state-owned assets in the day-to-day management of the situation: it is in accordance with the "Tongliao City". Interim Measures for the Management of State-owned Assets in Administrative Institutions" requirements, the strict implementation of state-owned assets inventory, registration, reporting system, set up fixed asset cards, general ledger and ledger books, and regular inventory count, timely update of the state-owned asset management information system to achieve consistency with the account, the account is consistent, clear responsibility and fulfillment of duties.
Second, the establishment of the system: is the establishment of the establishment of asset management ` rules and regulations, there are purchasing, requisitioning, use, disposal of scrap and other internal control system.
Third, the disposal of assets: in accordance with the provisions of the implementation of the approval or record procedures, and timely accounting, disposal proceeds or residual value in accordance with the principle of "two lines of income and two lines of expenditure" management, into the financial budget or residual value management, there is no unauthorized disposal of state-owned assets phenomenon.
Fourth, the dynamic management of assets: timely registration of asset cards, and upload the relevant asset data to the financial management department to achieve dynamic management and timely reconciliation of books.
V. Asset leasing and lending: the unit has no leasing and lending of state-owned assets.
Six, asset property rights registration: there is no state-owned asset property rights registration certificate.
VII, confiscated assets management: no confiscated assets.
4. System Self-Inspection Report
I. Overall Information Security
I Office of the current network of systems operating well, not in the online storage, transmission of classified information, did not occur in the loss of confidentiality, leakage phenomenon.
(a) leadership emphasis on a perfect system
1, in order to further strengthen the leadership of the work of government information security in my office, set up a leading group of information security work, with the Secretary as the head of the group, the leaders in charge of the vice-chairman, the head of each section as a member of the office in the integrated section, set up a person responsible for in addition to the day-to-day work, and at the same time the establishment of a security responsibility system, emergency preparedness, on-duty system, Information release audit system, government information disclosure work system, confidentiality review system, accountability system. In recent years there have been no security incidents.
2, in order to ensure the effective and smooth development of my office network information security work, my office requires each department as a unit to seriously organize the study of relevant laws, regulations and network information security related knowledge, is that all personnel can correctly understand the importance of information security work, can grasp the provisions of the requirements of the safe use of computers, are able to correctly use the computer network and all types of information systems.
(B) strict requirements, measures in place
1, strengthen security measures. My office in strict accordance with the website program upgrades, server hosting, website maintenance and other aspects of the outstanding issues, to further strengthen the security precautions. First, the unit's information system accounts, passwords, software patches, such as a weekly cleanup and inspection, timely updates and upgrades, eliminating the weak passwords, weak passwords, eliminating security risks. Second, each computer has installed antivirus software, and regularly virus checking and killing of operating system vulnerabilities, anti-virus software configuration is not in place of the computer resolutely disconnected from the network connection, found that the problem, timely reporting, processing. Third, the unit has a computer user security training and each network computer users, ip address and physical MAC address was registered by the administrative office for management, in addition, the classified network, classified information systems, classified computers, the use of maintenance by a person, and is strictly prohibited from accessing the Internet, prohibited and non-classified mobile storage media cross-use, to ensure information security.
2, take special management measures. My office is to close or delete unnecessary applications, services, ports and links to limit the vulnerability to attack and prohibit the opening of unnecessary websites. The second is to strictly audit the release of information to ensure the accuracy and authenticity of the content of the information released. Third, strictly implement information security regulations. It is strictly prohibited to process, store and transmit classified information on non-classified computers. It is strictly prohibited to connect the office intranet to the Internet. It is strictly prohibited to use the e-mail system on the Internet to transmit classified information. It is strictly prohibited to publish and talk about classified information in various forums, chat rooms, blogs and so on. Strictly prohibit the use of qq and other chat tools to transmit classified information.
3, the implementation of security emergency plans and emergency drills, my office has done a good job of preparing for the possible occurrence of various types of information security events to do a good job, and further improve the information security emergency plan, a clear process of emergency response, the implementation of the emergency technical support team, to do the work in front of the work to do a deep and detailed. Actively organize and carry out emergency drills to test the operability of the emergency plan and improve emergency response capabilities.
Second, the main problems found in the information security inspection and rectification
(a) the main problems
1, information security awareness is not enough. Cadres and workers of information security education is not enough, the lack of initiative and conscientiousness to maintain information security.
2, equipment maintenance, update is not timely.
3, fewer professional and technical personnel, limited information systems security force, information systems security technology level has to be improved.
4, the information system security mechanism needs to be further improved.
(B) the next step of the rectification plan
According to the shortcomings found in the self-checking process, while combining the reality of my office, will focus on the following aspects of rectification.
1, to continue to strengthen the information security education of all cadres and workers to improve the initiative and conscientiousness to do a good job of security.
2, to effectively strengthen the implementation of the information security system, from time to time on the implementation of the security system to check for adverse consequences of the responsible person, we must seriously pursue the responsibility to improve the personnel security awareness.
3, to strengthen the training of professional information technology personnel, and further improve the technical level of information security work, so that we can further strengthen the computer information system security and confidentiality work.
4, to increase the line, system, network equipment maintenance and maintenance, at the same time, for the rapid development of information technology, to increase the system equipment update.
5, to innovate and improve the information security work mechanism, to further standardize the office order and improve the security of information work.
Third, the information security inspection of the work of the recommendations and suggestions
I hope that the city government can often organize training on information systems security, so as to further improve the professional level of information systems management staff, so as to further strengthen the information system security work.
5. System Self-Inspection Report
In May 20xx, I opened the xxx district medical insurance network website. Which opened the medical insurance dynamic, public affairs, policies and regulations, office guide and other columns, by a person responsible for updating and maintenance. Up to now, 302 pieces of information of various types have been updated. Since the opening of the website, I am responsible for the information network section, the masses concerned about the policy, system and commonly used forms are uploaded to the website, and actively carry out online office, online Q&A and other interactive exchanges for the designated medical institutions and insured persons in understanding the policy, for matters such as providing a fast and efficient way.
First, computer information management
This year, I have strengthened the organization and leadership, strengthened publicity and education, the implementation of the work of responsibility, to strengthen the daily supervision and inspection, the confidential computer management in hand. For the management of computer magnetic media (floppy disk, U disk, mobile hard disk, etc.), to take a person to keep, classified documents stored separately, is strictly prohibited to carry the existence of classified content of the magnetic media to the Internet computer processing, storage, transmission and processing of documents, the formation of a good security and confidentiality of the environment. Classified computers (including laptops) implemented with the Internet and other public **** information network physical isolation, and in accordance with the relevant provisions of the implementation of confidentiality measures, so far, there has not been a computer loss of confidentiality, leakage of accidents; other non-classified computers (including laptops) and the use of the network, but also in strict accordance with the Bureau's computer confidentiality information system management approach to the implementation of the relevant measures, to ensure that the organ Information security.
Second, computer information network security
1, is the network security. I was equipped with anti-virus software, network isolation card, the use of strong password password, database storage backup, mobile storage device management, data encryption and other security measures, a clear responsibility for network security, strengthened network security work.
2, is the implementation of information systems security leadership review and approval system. All uploaded information on the website, must be reviewed and signed by the office before uploading; second is to carry out regular security checks, mainly on SQL injection attacks, cross-site scripting attacks, weak passwords, operating system patch installation, application patch installation, anti-virus software installation and upgrading, Trojan horse virus detection, port openings, system management rights openings, openings of access privileges, web page tampering and so on. The system security diary is being carefully done.
3, is the daily management of the effective grasp of the extranet, website and application software "five-layer management", to ensure that "classified computers and business networks do not access the Internet, access to the computer is not classified", in strict accordance with the confidentiality requirements to deal with CD-ROM, hard disk, U disk, mobile hard disk management, maintenance, repair, and so on. The management, maintenance and destruction of CD-ROMs, hard disks, USB flash drives and removable hard disks are handled in strict accordance with confidentiality requirements. Focus on the "three major security" investigation: First, hardware security, including lightning, fire, theft and power connection; second, network security, including network structure, security log management, password management, IP management, Internet behavior management; third, application security, including websites, mail systems, resource library management, software management.
Third, the operation and maintenance of hardware equipment
I installed anti-virus software in each terminal, the application of system-related equipment has been taken to standardize the management of the use of hardware equipment in line with the relevant national product quality and safety regulations, the operating environment of the unit hardware in line with the requirements of the basic use of printer accessories, ribbon holders, etc., the original equipment products; since this year, the Bureau has actively implemented Network security special funds, equipped with network security hardware equipment, upgrade application servers, strengthen network security measures, at present, the website system is safe and effective, there is no security risks.
I Bureau of computer and its equipment to implement the "who uses, who manages, who is responsible for" management system. In terms of management, we adhere to the "system of control". The second is to strengthen the information security education and improve the computer skills of the staff. At the same time in the Bureau to carry out network security knowledge propaganda, so that all cadres and workers and end-users y understand the importance of information network security, to improve the conscientious maintenance of network security applications of self-consciousness and security awareness. In terms of equipment maintenance, I specifically set up a network equipment failure register, computer maintenance and repair table for equipment failure and maintenance of the situation is registered, and timely processing. Foreign maintenance personnel, required to be accompanied by relevant personnel, and its identity and processing of registration, standardize the maintenance and management of equipment.
Fourth, the development and implementation of security systems
I Bureau of website security requirements, one is the use of exclusive access to password lock login background; two is to upload files in advance for the detection of pathogens; three is the site sub-module sub-privilege maintenance, regular into the background to clean up the garbage files; four is the website update is responsible for special people. In order to ensure computer network security, the implementation of the network administrator system, computer security and confidentiality system, website security management system, network information security emergencies contingency plan in order to effectively improve the efficiency of the administrator's work. At the same time, I combined with their own situation to develop a computer system security self-check system, information systems, information systems, internal control system, information systems, such as emergency response plan and other management systems, to do four to ensure that: First, the system administrator on Fridays to regularly check the center's computer systems to ensure that there are no hidden problems; the second is to make a record of the work of the security check to ensure that the work is carried out; third is the implementation of the leadership of the system of regular inquiries by the system administrator report Computer use, to ensure that the situation at any time; Fourth, the regular organization of the whole bureau to learn about network knowledge, improve the level of computer use, to ensure that the prevention.
V. Self-examination of existing problems and corrective comments
We found some management weaknesses in the management process, the future we have to improve in the following areas.
(a) For the line is not neat, exposed, immediately rectify the line for a limited period of time, and do a good job of rodent-proof, fire safety.
(ii) Strengthen equipment maintenance, timely replacement and maintenance of faulty equipment.
(c) Self-inspection found that individual personnel computer security awareness is not strong. In the future, we will continue to strengthen the computer security awareness education and preventive skills training, so that employees fully realize the seriousness of computer cases. The combination of human defense and technical defense, really do a good job of the unit's network security.