It’s a pity that Baidu can’t upload files like this. It would be great if it could be done
I’ll paste the content for you and you can just copy it yourself
Divided into four sections
Routine Maintenance and Management Procedures for Computer Software and Hardware
Routine Maintenance and Management Procedures for Computer Software and Hardware
Chapter 1 General Principles
p>Article 1: These regulations are formulated to ensure the use, management, information security, and full enjoyment of resources of the company's computer network system, standardize the company's Internet operation procedures, improve network system security, and improve office efficiency.
Second related definition:
Peripheral or external equipment: generally refers to ancillary equipment other than the basic configuration of the computer and its network, such as optical drives, floppy drives, printers, and barcode printing
Machine, scanner, scanner, ZIP machine, MODEM, UPS power supply, etc.;
Data sent externally: including externally burned discs, electronic files sent externally due to work needs and
Data transferred through other channels;
Valid data: refers to various documents required for work, excluding music, movies, life pictures or other files unrelated to work.
Chapter 2 Daily Management
Article 3 Computer equipment startup sequence: first turn on the UPS power supply, printers, scanners, monitors and other peripherals, then turn on the host; the shutdown sequence is reversed , do not force it on/off.
Article 4 When the computer is connected to external devices such as printers, recorders, scanners, optical drives, etc., the computer and peripherals should first be connected in the shutdown state (turn off the power of all devices), and no power is allowed. Connect or remove computer external devices.
Article 5 When computer external devices are not in use, the power to the external devices should be turned off. It is forbidden to turn on the power of external devices that are not in use for a long time. The monitor should be set to an energy-saving mode, and it is required to shut down when people leave the office and get off work.
Article 6 The power supply of the computer system should be separated from high-power electrical equipment (elevators, air conditioners, etc.).
Article 7 Company office personnel are strictly prohibited from using transmission media such as disks, optical disks, and removable disks. (Except those who apply for use)
Article 8 Clean and maintain the dirt on the equipment in a timely and correct manner to ensure the normal use of the equipment.
Article 9 During thunder and lightning, the computer system and peripheral equipment should be temporarily shut down to prevent lightning strikes.
Article 10 It is not allowed to dismantle machinery, add, reduce or try out new accessories without permission.
Article 11 When a computer fails, please fill out the <
Chapter 3 Software Management
Article 12 Computer software, various device drivers, and configuration software must be labeled uniformly. And it is required to be stored in a safe place that is anti-magnetic and moisture-proof.
Article 13 The company’s ERP system, financial purchase, sales and inventory and other genuine software will not be loaned out.
Article 14 When each unit needs to use or install new software, please fill out the <
Article 15: All types of game software are not allowed to be installed on computers.
Article 16 Drivers for major computer equipment must not be added or deleted at will.
Article 17 The company's genuine software (such as Golden Disk K3) must be properly stored. If it is damaged or lost, the responsible person must compensate according to the price.
Article 18 Important public programs (application software) are not allowed to be copied at will to prevent copyright issues.
Chapter 4 Network Management
Article 19 Strictly control the temperature in the computer room, do a good job in fire protection, and overall layout requirements: wiring specifications, hardware facilities placed neatly, and lines prevented Poor contact such as cross short circuit occurs.
Article 20 Without permission, no one is allowed to move, shut down, restart or perform other operations on servers, UPS, gateway servers, switches, bridges and other equipment.
Article 21 Employees within the company are strictly prohibited from attacking database servers and other servers, or using hacker software to attack other computers. Once discovered, they will be reported to the general manager's office for processing, and they reserve the right to send it to the public security agency. .
Article 22 The company is divided into networked workstations and non-networked workstation PCs. Machines with networked workstations cannot be equipped with floppy drives or CD-ROM drives. The use of removable disks and removable hard drives without permission is strictly prohibited.
Article 23 It is strictly prohibited to disseminate non-work content on the Internet (such as disseminating and disseminating rumors on the Internet and any news that is not beneficial to the company, etc.).
Article 24 Company computers are connected to the broadband network (Internet) through a dedicated server (gateway). Company employees are not allowed to use telephone dialing or other methods to access the Internet.
Article 25 When computer operators use application systems (such as Golden Disk K3) and want to leave for something, they must first exit the application software or lock the desktop.
Article 26 All sites on the network must be kept clean and orderly. Each port of the switch must be labeled to indicate its destination. When not in use, the power of these devices must be turned off.
Article 27 When a computer malfunctions, the computer power should be turned off immediately and reported to the IT department in a timely manner. It is prohibited to unplug and insert IT components while the power is on and to install and uninstall equipment by oneself. Damaged equipment will be compensated according to the price.
Article 28: Passwords are not allowed for all printers in the company, and other colleagues should be able to print directly.
Article 29 It is forbidden to play games or do things unrelated to work on the Internet.
Chapter 5 Internet Application and Use
Article 30 Employees who apply for direct Internet access must fill in an Internet access application form, which shall be approved by the department manager and reviewed by the business unit director (vice president in charge) , and then the IT department opens the corresponding permissions.
Article 31 Employees who need to use external mailboxes in the company must fill out the <
Article 32 All computers must turn on virus firewalls when in use. Once the alarm is reported, relevant files should be saved immediately and contact the IT department.
Article 33 When using email, please do not open unknown attachments. For unfamiliar emails, please delete them directly;
Article 34 For security and special reasons, the IT department has the right to shut down the Internet at any time. Or simply turn off someone's access to the Internet.
Article 35 The IP addresses of company computers are planned by the IT department. Employees are not allowed to change their IP addresses without authorization, nor are they allowed to maliciously occupy other people's addresses.
Article 36: In order to save network bandwidth and prevent computer viruses, employees are not allowed to download software, music, movies or movie clips from the Internet. Violators will be fined 30 yuan, and serious cases will be fined 50-100 yuan.
Article 37: You are not allowed to browse non-work-related websites during work hours.
Article 38 When employees are surfing the Internet, unless required for work, they are not allowed to use software such as QQ to chat online.
Article 39 Employees are not allowed to use company computers to fill in or publish any application information online.
Article 40 Employees are not allowed to use other people’s computers to access the Internet.
Article 41: Hacking software shall not be used to attack other computers or servers of the company in any form. Violators will be fined 100-300 yuan, and in serious cases 500-1,000 yuan, and will be sent to the police. authority to handle.
Chapter 6 Data Security Management
Article 42 After the enterprise anti-virus server is upgraded, all computers should be automatically upgraded. It is necessary to monitor the upgrade status of enterprise anti-virus software, network system traffic and virus status at any time.
Article 43 Before a major virus outbreak, the IT department should send out virus warning information in advance through email or OA system.
Article 44 It is necessary to do a good job in server security prevention work, conduct a complete anti-virus once a week, and perform data backup according to the requirements of the application system to prevent data loss.
Article 45: Ordinary office computers must undergo a complete virus check at least once a week.
Article 46: Company data shall not be maliciously modified. Important data such as electronic documents shall not be stored on the startup disk (usually the C drive).
Article 47: The company's database system, personnel files, drawings, statistical data, marketing plans, financial statements and other important information must be backed up regularly; the planning department and development department must not only back up hard drives, but also regularly Burn the image data into a CD and save it permanently.
Article 48 When discarding materials (cards, manuscript paper, etc.) containing important information, they should be destroyed to avoid misuse.
Article 49: A dedicated person should be assigned to correct and implement erroneous data; statistical analysis should be conducted on the causes of erroneous data; the reasons for frequent erroneous data should be tracked and assessed with a view to improvement. Reduce errors.
Article 50 If there is no need to preserve the output data after use, it should be properly destroyed; if the output data is stored on magnetic media, it should be checked regularly to ensure that it can be used when necessary.
Article 51 It is not allowed to enable the wireless network card that comes with laptops within the company. To avoid electromagnetic interference to the network system.
Article 52: Only the system administrator has the right to change the application system; database maintenance personnel are not allowed to change the data without the consent of the using department.
Article 53: Instructions entering the application system database can be identified from which computer, when and who input them; changes to the application system database are strictly restricted for different users; reorganization of the database is strictly restricted Or the power to compress database size.
Article 54 During database management, check the application system database log files at least once a week to detect abnormalities as early as possible and ensure the security of database access.
Article 55 All colleagues who apply to use computers for office work must undergo relevant training from the IT department, and the training dates shall be implemented according to the annual training plan. After passing the assessment, the IT department will assign corresponding computer usage rights and allow students to use computers for office work.
Article 56 The IT Department will organize temporary special training from time to time based on the use of office systems.
Article 57 The IT department is responsible for the company’s external electronic document output. Including burning discs, sending large files (more than 10M), etc. If the business department has the above needs, please fill out the unified <
Article 58 The operator is responsible for the use of email. The IT department, with the consent of the general manager, has the right to monitor the email system when no announcement is made.
Article 59: Except for computers approved by the general manager or for special purposes, lock the USB interfaces of all computers, remove or disable floppy drives and optical drives.
Article 60 Except for positions designated by the IT department, it is prohibited to install recorders or related equipment on all computers.
Article 61 Except for colleagues who have signed the <> (see relevant documents of the Human Resources Department), U disks, mobile hard disks and other equipment are not allowed to be used without the consent of the general manager of the business unit. , once discovered, it will be confiscated immediately. If the circumstances are serious, a fine of 50-100 yuan will be imposed.
Article 62 Without permission, employees should not bring complete computers or accessories that do not belong to the company into the company for use, nor are they allowed to access the company's network system. Violators will receive a major demerit. The equipment will be inspected and returned to the party after confirmation. In serious cases, relevant equipment will be confiscated.
Article 63: Personally owned laptops or storage devices must be inspected by the IT department when the responsible person leaves the company, and company data must be backed up or deleted.
Article 64 All computer operators shall back up valid data to the server at most once every 6 days. Positions designated by the IT department must back up all data to CD-ROM before the 3rd of every month. The specific backup method will be subject to notification.
Chapter 7 Relevant Rewards and Punishment Regulations
Article 65 Those who transfer computers without going through the handover procedures, or install or disassemble parts by themselves are fined 50 yuan per time, and those who lose or damage them will be fined 50 yuan per time. Parts will be compensated based on price.
Article 66: Anyone who damages microcomputer components for human reasons, violates regulations, and removes or inserts microcomputer components while the power is on is fined 20 yuan per time and compensated for the losses caused.
Article 67: Anyone who deletes files on the machine and causes the loss of other people’s data, or who modifies or leaks company data, will be fined 20 to 200 yuan per time depending on the seriousness of the case.
Article 68 Anyone who lends or transfers his username or password to others will be fined 20-100 yuan and will be responsible for any losses caused!
Article 69 Anyone who plays games during working hours or does anything unrelated to work will be given a warning or a fine of 20 yuan per time.
Article 70: Anyone who uses floppy disks, removable disks, removable hard disks, or laptops in a local area network without permission will be fined 30 yuan per time; those who cause the network to be infected with viruses or cause network paralysis due to this reason will be fined 30 yuan per time. If the circumstances are serious, a fine of 100 to 1,000 yuan per person may be imposed.
Article 71 Anyone who intentionally creates and spreads computer viruses and other destructive programs that endangers the security of the company's computer information network shall be sent to the public security organs for handling in accordance with the law.
Chapter 8 Supplementary Provisions
Article 72 The IT Department is responsible for the formulation, modification and interpretation of these regulations.
Article 73 These Measures shall come into effect from the date of promulgation.
Attachment 1 <
IT Department
June 24, 2005
Data Security Management Regulations
Data Security Management Regulations
1. Purpose
1.1 In order to improve the security of the company's network system and prevent data loss to the greatest extent. These regulations are specially formulated
2. Scope
2.1 Follow this regulation when sending electronic documents to others.
3. Definition
3.1 Data sent externally: including burning external optical discs, electronic files sent externally due to work needs, and information transmitted through other means.
3.2 Valid data: refers to the various documents required for work, excluding music, movies, life pictures or other files unrelated to work.
Four. Rights and Responsibilities
4.1 Computer use: Personnel designated by the manager (deputy) manager of each department;
4.3 Data security supervision: Personnel designated by the Human Resources Department;
5 . Assignment content
5.1 All colleagues who apply to use computers for office work must undergo relevant training at the Network Center of the Human Resources Department. The training date shall be implemented according to the annual training plan. After passing the assessment, the network center will assign corresponding computer usage rights and allow students to use computers for office work.
5.2 The Human Resources Department will organize temporary special training from time to time based on the usage of the office system.
5.3 The Human Resources Department is responsible for the company’s external electronic document output. Including burning discs, sending files externally, etc. If all departments have the above needs, please fill out the unified <
5.4 The use of email is the responsibility of the operator. The Network Center, with the consent of the General Manager, has the right to monitor the email system when no announcement is made.
5.5 Except for computers approved by the general manager or for special purposes, lock the USB interfaces of all computers, remove or disable floppy drives and optical drives.
5.6 Except for positions designated by the Human Resources Department, all computers are prohibited from installing recorders or related equipment.
5.7 Except for colleagues who have signed the <>, devices such as USB flash drives and mobile hard disks are not allowed to be used without the consent of the general manager of the business unit. Once discovered, they will be confiscated immediately. And record a minor offense.
5.8 Without permission, employees should not bring complete computers or accessories that do not belong to the company into the company for use, nor are they allowed to access the company's network system. Violators will receive a major demerit. The equipment will be inspected and returned to the party after confirmation.
5.9 All computer operators will back up valid data to the server at most once every 6 days. Positions designated by the Human Resources Department must back up all data to a CD before the 3rd of each month. The specific backup method will be notified separately.
5.10 Colleagues who need to access the Internet in the company's office should apply according to the normal procedures and activate the corresponding Internet access permissions after studying the company's <
5.11 It is not allowed to enable the wireless network card that comes with laptops within the company. To avoid electromagnetic interference to the network system.
5.12 Employees should have a strong sense of confidentiality and are not allowed to publish company information on the Internet in any form. Once discovered, report to the general manager's office for processing. And the company reserves the right to submit it to the public security organs.
Central Computer Room Management Measures
The network servers, firewalls, switches and other equipment in the company's computer room are configured for work needs. In order to make it play a due role in promoting the company's various tasks and obtain daily system maintenance, the following management methods are hereby formulated:
1. Managers use the equipment in the computer room according to operating procedures, and Responsible for daily maintenance and computer room sanitation, doing a small sweep a day and a big sweep a week;
2. If any machine failure is found, report it to the supervisor and superiors in a timely manner, and be responsible for the daily maintenance of computers and peripherals Maintenance and troubleshooting. When encountering a fault within the scope of the computer company's three guarantees, you should promptly urge the company to come to your door or send the machine to the company for repair;
3. Make suggestions for the purchase, installation and use of relevant application software Opinions and suggestions;
4. Equipment is generally not allowed to be used for private purposes. Personnel from outside units are prohibited from entering the computer room, and foreign computer floppy disks are prohibited from entering the computer room;
5. If other personnel need to use the computer room Equipment must obtain the permission of the management personnel and obtain the consent of the supervisor before entering the computer room;
6. Do a good job in fire prevention, rain prevention, moisture prevention, and anti-theft work, and pay attention to the safety of electricity;
7. It is necessary to establish files and keep system logs on the operation, application and maintenance of the network and equipment in the computer room. It is necessary to make detailed records of faults (hidden dangers) and troubleshooting;
8. It is necessary to uniformly manage the equipment in the computer room, the drivers of computers and related equipment, warranty cards and other random documents and information To be kept intact. It is necessary to make it clear that a designated person is responsible for the safekeeping of computer documents, informatization and other data, and that the data must be complete and stored safely;
9. The switches and servers in the computer room are key equipment for the company's office automation, and no one is allowed to do so on their own Configure or change system parameters;
10. The environment in the computer room must be managed and maintained by a dedicated person (including temperature, humidity, power system, network equipment, etc.) and must meet the relevant standard requirements of the computer room;
p>11. Each client should save its own data in a timely manner and should not change system and network settings without authorization. If there is indeed a need for work, it should be reported to the office, which will assign a dedicated person to carry out the work and record it.
12. It is strictly prohibited to bring flammable, explosive, strong magnetic items and other items that are not related to the work of the computer room into the computer room;
13. The safety work of the computer room must be done well, and the server All accounts and passwords are kept strictly confidential. Monitor and record network operations;
14. Patch corrections and upgrades of each server system must be carried out in a timely manner;
15. Managers must have strong skills Awareness of virus prevention, virus databases should be tested regularly, and virus database systems should be regularly upgraded. Viruses found should be dealt with promptly and recorded;
16. New software shall not be installed on each server without permission. If installation is indeed required for work, it must be approved by the relevant leadership;
17. Data backup should be done in a timely manner to ensure that the data can be quickly and safely restored in the event of a system failure. All backup data must not be changed, and dual backups are required to be saved locally and offsite;
18. All equipment in the computer room should be properly kept, and no one is allowed to switch, move or use any equipment in the computer room without authorization, such as If necessary, approval from the supervisor is required.
Regulations on the daily work management of the central computer room
In order to better serve the company's business and ensure the normal operation of our company's network, the daily routine work content mainly consists of two parts, morning and evening. Conduct an inspection of the computer room for the first time and conduct a general inspection of the equipment in the computer room, mainly focusing on whether the server and network equipment are operating normally.
1. Start inspecting the computer room at 8:00 every morning
★Adjust the temperature in the computer room. If the indoor temperature is too high, open the doors and windows to effectively control the computer room. Ventilation;
★Check whether there are the latest system patches that need to be installed in each server. System patches are mainly developed for the latest system vulnerabilities. They should be downloaded and installed in a timely manner. If the system patch is installed If it needs to be restarted to take effect, do it outside of work hours;
★Check whether the virus database of the anti-virus software in each server has been updated to the latest version.
★ Check the working status of each switch, firewall and access equipment, and perform timely and effective maintenance if an abnormality occurs;
★Monitor the operating status of the network and keep work records and system logs;
2. Conduct simple cleaning and inspection of the computer room at 5:00 pm every day
★If there is a system patch installed that day, restart the system outside working hours to make the patch effective and prevent the system from Damage caused by system vulnerabilities;
★Check the Rising log of the day and virus warnings in the near future, and make anti-virus preparations;
★Clean the computer room and do Make sure the computer room is dust-proof;
★Close the doors and windows after get off work, and check whether the doors in sensitive places such as computer rooms and cabinets are locked to prevent theft.
Regarding the handling of special situations:
1. Network operation failures must be handled promptly and reported to relevant leaders, and records of the time of failure, handling methods and causes of the failure must be made;
2 . When encountering a power outage, turn off the server and power supply in time to prevent equipment from being damaged;
3. Back up important data regularly, and the backup data storage location should be fire-proof, moisture-proof, dust-proof, anti-magnetic, anti-theft and other safe facility.
10.1 "Computer Receiving Card"
10.2 "Computer Receiving Application Form"
10.3 "Computer Borrowing Application Form"
10.4 "Computer Configuration Application Form"
10.5 "Software Installation Application Form"
10.6 "Network Temporary Activation Application Registration Form"
10.7 "Optical Disc Burning Registration Form" 》
10.8 "USB Activation Application Form"
Computer Card
No.:
Computer No.
Computer brand
Receipt time
Signature
Return time
Signature
Configuration name
Specifications and models
Quantity
Motherboard
CPU
Memory
Hard disk
Monitor
Video card
Network card
Floppy drive
Optical drive
Keyboard
< p>MouseOthers
Change status
Change date
Signature
Remarks
< p>Note: The applicant must be responsible for the above configuration and shall not be lost or damaged without reasonThe person in charge: Network administrator:
Computer application form
No.:
Department
Applicant
Application date
Reason for application
□New Employee joining the company□Position change□Job change
Configuration instructions
CPU
Memory
Hard disk
Monitor
Display card
Other configuration requirements:
Approver
Approval date
Network management processing plan and results
Network administrator signature:
Computer loan application form
No.:
Department
Applicant
Borrowing date
Estimated borrowing time
Reason for application
□Business trip, destination: □Private borrowing□Other purposes:
< p>Computer category□ Desktop computer (if reassembly is required, the following configuration must be filled in) □ Laptop workstation
Configuration instructions
CPU
< p>MemoryHard disk
Monitor
Video card
Other configuration requirements:
Approver
p>Approval Date
Network Management Solution and Results
Network Management Signature:
Computer Configuration Application Form
Number: < /p>
Department
Applicant
Application date
Estimated arrival time
Application category
□Upgrade□Replacement parts□Other categories:
Configuration application instructions
CPU
Memory
Hard disk
Monitor
Graphic card
Other configuration requirements:
Approver
Approval date
Network management solution and results
Network management signature:
Software installation application form
No.:
Department
Applicant< /p>
Application date
Application to install software
Name
Reason for application
Approver
Approval date
Network management solution and results
Network management signature:
USB activation application form
> Date:
Name department
Computer model:
Reason for activation:
Time of activation _____month_____day_ ____ hour ______ minute to _____ month _____ day _____ hour _____ minute
Responsible person (manager): Network administrator:
Disc burning registration form
Date department user number of recording disks recording reason other
Network temporary activation application registration form
Applicant’s reason for activation time supervisor’s signature and remarks
It’s so hard, you have to give me extra points