Comprehensive management measures of computer application
Comprehensive management measures of computer application
purpose
Speed up the process of the company's network informatization construction to ensure the smooth implementation of the projects under construction; Manage the purchase, distribution and use of computer hardware and software safely and effectively, as well as the confidentiality, anti-virus and backup of software and data files, to ensure the normal design, production and management.
application area
It is suitable for the overall management of computer application projects, engineering, hardware, software and data resources of the company.
accountability
The network management room is responsible for the normal operation and security maintenance of system software and hardware resources, solving technical problems in system implementation and operation, and maintaining the integrity of the system in implementation; Organize relevant departments to collect, sort out and back up data; Track and understand the market situation and technical trends, provide necessary decision-making support materials for company leaders, and formulate corresponding configuration standards for different levels of work needs; Cooperate with various departments and cooperative units to carry out network informatization construction, and organize the formulation of the processing flow of the company's computer information system; Under the leadership of the company's competent leader, be responsible for the overall management of the operation and promote the implementation of the management department.
The information management personnel of each department should assist the popularization and application of network informatization in this department, be responsible for the correct use and storage of hardware and software in this department, do a good job in confidentiality, anti-virus and data backup, establish a strict and scientific computer application management system in this department, and supervise the implementation according to the system.
Computer application leading group, composed of the company's competent leaders and general managers, is responsible for putting forward the company's IT development strategy, development goals, strategies and requirements, and approving project investment; Mobilize and organize relevant management departments to gradually implement the company's network information management system as planned, and approve the switch between the old and new systems; Unreasonable organizational adjustment of management institutions, systems and systems that do not adapt to the new system; In the main stage of system implementation, organize scheme approval and technical appraisal of results.
The Human Resources Department is responsible for organizing the education and training of managers and operators in computer application system, job evaluation and necessary human resource allocation.
working procedure
Application, establishment, examination and approval, implementation and acceptance of computer application projects
.. the leading group of computer application of the company formulates the company's network information according to the overall requirements of the company's development.
The development strategy of construction, put forward the development plan and specific requirements of computer application, and by the network management office in conjunction with relevant departments, according to
It is required to submit a written application to the Equipment Department in combination with the actual situation of the company and the development of computer software and hardware technology.
Organize multi-party demonstration group discussion, form a project report, and submit it to the company's computer application leading group for approval.
.. For officially approved computer application projects, the company's computer application leading group shall designate the project leader to organize feasibility study and analysis, design scheme selection and construction scheme formulation according to the requirements of the project approval report.
.. After the scheme is determined, the project leader will organize the selection and inspection of the cooperative units, with specific requirements as follows:
A) Investigation on the basic situation of the partner: including the company name, nature, business license, registered capital, main products or business scope, etc.
B) Technical capability inspection includes:
) develop strength and professional team;
) professional qualification certification;
) project management and quality assurance system;
) technical service and follow-up technical support capabilities;
) Successful experience in project implementation, etc.
C) Investigate the successful users of partners in this industry.
D) Comprehensive evaluation of the scheme provided by the partner:
) Evaluation of the feasibility (advancement, applicability and economic rationality) of the provided scheme;
) implementation capacity assessment;
) areas that need to be improved and improved.
.. The person in charge of the project will report the comprehensive investigation to the Equipment Department for evaluation in the form of Comprehensive Investigation Report on Computer Application Projects, including bidding or negotiation, business contract and technical agreement signing, etc. , and then according to the technical transformation procedures to declare funds and organize their implementation.
.. In the process of project implementation, NMO is responsible for the supervision and management of the implementation process, and reports the work progress and problems to be solved to the company's computer application leading group at any time; After the project implementation is completed, the project leader shall submit the project acceptance report and submit it to the Equipment Department for acceptance. After acceptance, all acceptance data shall be filed in the network management room, and the original acceptance records shall be kept in the Equipment Department.
Buy computer hardware and software
.. each department shall, according to the actual work needs, apply for software and hardware requirements, fill in the computer software and hardware requirements declaration form and explain the relevant requirements. After the equipment department is audited by the network management office according to the configuration standard, it shall be submitted to the equipment department for approval according to the technical transformation procedure; Daily office expenses shall be reported to the general manager's office for approval according to relevant procedures. Finally, the actual work is carried out by the network management office.
If the required equipment is not handled according to the prescribed procedures, its expenses will not be reimbursed.
.. hardware and software purchased must be accepted by the network management office before reimbursement.
Storage, distribution and use of hardware and software
.. qualified software is registered in the software control list by the network management office, indicating the name, serial number, version, login date, main functions, use status (Y means in use, N means invalid) and use department.
.. the original software is kept in a dust-free, dry place without chemical or gas pollution by the network management room, and the floppy disk is kept in a drying box. After the original software disk is kept for two days, a new original software disk should be copied or made. After comparison and verification, it shall be stamped with the "valid" seal and signed by the verifier, and the old original disk shall be evacuated from the storage place.
.. the network management office shall make corresponding copies according to the needs of the user department, and the copies shall be made on the special computer of the network management office. After the copied floppy disk is verified and disinfected, the software label is affixed to the surface of the software storage medium, signed by the verifier and stamped with the "valid" seal, and then distributed to the relevant user departments, and the software application personnel record the receipt on the software distribution registration form. The software that cannot be copied can be distributed in the original version, and it shall be indicated in the remarks column of the Control List or the Distribution Record Form.
.. The installation disks and corresponding data of all kinds of software are stored in the network management room, and the warehousing registration form is filled in. The materials are allowed to be borrowed or copied by the user department, but the relevant procedures must be handled.
.. in the process of software installation and use, the network management room is responsible for providing the environment for software operation and related technical support.
.. all computer software and hardware of each department shall be collected or borrowed from the network management office by the department information administrator or the person in charge of operation, and handed over to the network management office when their posts change, otherwise, the human resources department refuses to handle relevant procedures for them, and will be liable for compensation if there is any property loss.
.. the department information administrator and the person in charge of operation must ensure that the hardware and software used are intact, and do a good job of cleaning and maintenance regularly. If the software and hardware are lost or damaged due to illegal operation, it shall be liable for compensation.
The scrapping, transfer and disposal of computer software and hardware must be decided by the network management office, the general manager's office and the equipment department, and reported to the competent leader for approval, with corresponding records.
Hardware and software testing, maintenance and upgrade.
.. foreign software or downloaded software must be strictly tested (recorded) by the network management office, and can be installed or used only after passing the test.
.. The maintenance of computer software and hardware registered by the network management office according to normal procedures shall be completed by the network management office, and corresponding maintenance records shall be made.
.. organized by the network management office to update the old software of the original user department one by one, and the software application personnel of the user department are in the "soft"
Make a new receipt record on the distribution record form. The storage medium of the original software is stamped with the word "Make" in red by the network management room.
Waste "seal, to be preserved.
.. When upgrading the existing hardware and software, the application department needs to fill in the Application Form for Computer Hardware and Software Requirements and examine and approve it according to the hardware and software procurement procedures.
.. hardware and software upgrades are carried out by the network management office. After the software upgrade is confirmed, the update shall be recorded in the software control list.
Confidentiality requirements for software and data
.. The password of the internally developed application software shall be held by the software developer and the software application personnel, and shall not be disclosed to others. Password upgrade should be carried out by the original developer, and the password upgrade should be recorded.
.. the company LAN is authorized by the company computer leading group, which divides the company's virtual network, sets the access rights of working groups and users, and manages the operation passwords in a unified way. No one is allowed to tell others the password at will to prevent unauthorized use of software resources.
.. personnel who are not in the network management room of the company's central computer room are not allowed to enter at will, and the servers and network equipment in the network are only allowed to be operated and used by network administrators; The server system software and database should be encrypted for many times and can only be used with the authorization of the system administrator; All workstations in the network must be authorized by the department head to operate on the computer with their own user passwords.
Receiving and sending .. E-mails need to be strictly checked to prevent confidential information from leaking out through this channel, and sending and receiving e-mails need to be approved and registered.
.. The drawings generated by plotter need to be registered and managed. When printing drawings, the printing applicant needs to fill in the registration form of CAD drawings, and the printing operation can only be carried out after the approval of the department head.
.. the network management office shall designate a special person to keep the storage media such as disks, CDs and tapes of backup data. The data administrator must ensure the safety and reliability of the data, and shall not use or lend it at will without the approval of the competent leader.
.. Anyone who maliciously changes, illegally copies or divulges important company data will be severely punished; Therefore, those who cause heavy losses should also be investigated for criminal responsibility.
Anti-virus requirements for software use
.. within the company's local area network, the departments designated by the network management office to use CDs and floppy disks should strictly control the use of CDs and floppy disks and assume corresponding responsibilities and obligations. Computers, CD-ROM drives and floppy drives connected to the Internet by other departments should be dismantled or disabled, otherwise Internet access is not allowed.
.. departments that use the Internet; One or more computers must be specified, and these computers must not be connected to the company's local area network. Disks that read data on the Internet shall not be used in the company's intranet without inspection.
.. the network management office is responsible for checking the computers in the network for viruses, and all departments find that their computers are infected with viruses.
To immediately antivirus or report to the network management room for processing.
Company LAN computers need to use floppy disks and CDs from other units. Before use, the network management room should check the virus and confirm that there is no virus before use.
. data backup
.. where the incoming product information is submitted to the reference room of the technical center, the data must be backed up in the database server, and then the data administrator of the network management room will regularly carve the data into CDs for permanent storage.
.. the data of each department is backed up once a week by the department information administrator. For users who don't have a dedicated database server, the backup method is to specify a computer, then create a backup folder for each user under the root directory of the computer (disk C or disk D), and backup the data that each user needs to back up to the specified directory of the specified computer every week.
.. important data must be applied for backup in the network management room, encrypted or packaged and marked for long-term storage as required, and the backup data must be approved by the competent leader, and the use record should be kept.
.. the network management office shall back up the data of all departments at least once every six months, and carve them into CDs for long-term preservation.
When the update of software system affects the existing operation of the company, the computer application leading group shall ensure the establishment or revision of corresponding program documents and work instructions.
Relevant documents and quality records
Comprehensive investigation report on computer application projects
Computer application project proposal
Computer application project acceptance report
. Zj/-js Computer Software and Hardware Requirements Declaration Form
. Zj/-js computer software and data file control list.
. ZJ/-JS Computer Hardware, Software and Data File Storage Registration Form
. ZJ/-JS Computer Software and Hardware and Data File Distribution Registration Form
. ZJ/-JS External Email Sending Registration
. Zj/-js receives foreign mail registration.
. ZJ/-JS Technology Center CAD File Plotting Registration Form
. Zj/-JS Computer Software and Hardware Testing, Maintenance and Upgrade Record Sheet
Comprehensive management measures of computer application
It is required to submit a written application to the Equipment Department in combination with the actual situation of the company and the development of computer software and hardware technology.
Organize multi-party demonstration group discussion, form a project report, and submit it to the company's computer application leading group for approval.
.. For officially approved computer application projects, the company's computer application leading group shall designate the project leader to organize feasibility study and analysis, design scheme selection and construction scheme formulation according to the requirements of the project approval report.
.. After the scheme is determined, the project leader will organize the selection and inspection of the cooperative units, with specific requirements as follows:
A) Investigation on the basic situation of the partner: including the company name, nature, business license, registered capital, main products or business scope, etc.
B) Technical capability inspection includes:
) develop strength and professional team;
) professional qualification certification;
) project management and quality assurance system;
) technical service and follow-up technical support capabilities;
) Successful experience in project implementation, etc.
C) Investigate the successful users of partners in this industry.
D) Comprehensive evaluation of the scheme provided by the partner:
) Evaluation of the feasibility (advancement, applicability and economic rationality) of the provided scheme;
) implementation capacity assessment;
) areas that need to be improved and improved.
.. The person in charge of the project will report the comprehensive investigation to the Equipment Department for evaluation in the form of Comprehensive Investigation Report on Computer Application Projects, including bidding or negotiation, business contract and technical agreement signing, etc. , and then according to the technical transformation procedures to declare funds and organize their implementation.
.. In the process of project implementation, NMO is responsible for the supervision and management of the implementation process, and reports the work progress and problems to be solved to the company's computer application leading group at any time; After the project implementation is completed, the project leader shall submit the project acceptance report and submit it to the Equipment Department for acceptance. After acceptance, all acceptance data shall be filed in the network management room, and the original acceptance records shall be kept in the Equipment Department.
Buy computer hardware and software
.. each department shall, according to the actual work needs, apply for software and hardware requirements, fill in the computer software and hardware requirements declaration form and explain the relevant requirements. After the equipment department is audited by the network management office according to the configuration standard, it shall be submitted to the equipment department for approval according to the technical transformation procedure; Daily office expenses shall be reported to the general manager's office for approval according to relevant procedures. Finally, the network management office will do the actual work &; n
bsp
,
Comprehensive management measures of computer application
If the required equipment is not handled according to the prescribed procedures, its expenses will not be reimbursed.
.. hardware and software purchased must be accepted by the network management office before reimbursement.
Storage, distribution and use of hardware and software
.. qualified software is registered in the software control list by the network management office, indicating the name, serial number, version, login date, main functions, use status (Y means in use, N means invalid) and use department.
.. the original software is kept in a dust-free, dry place without chemical or gas pollution by the network management room, and the floppy disk is kept in a drying box. After the original software disk is kept for two days, a new original software disk should be copied or made. After comparison and verification, it shall be stamped with the "valid" seal and signed by the verifier, and the old original disk shall be evacuated from the storage place.
.. the network management office shall make corresponding copies according to the needs of the user department, and the copies shall be made on the special computer of the network management office. After the copied floppy disk is verified and disinfected, the software label is affixed to the surface of the software storage medium, signed by the verifier and stamped with the "valid" seal, and then distributed to the relevant user departments, and the software application personnel record the receipt on the software distribution registration form. The software that cannot be copied can be distributed in the original version, and it shall be indicated in the remarks column of the Control List or the Distribution Record Form.
.. The installation disks and corresponding data of all kinds of software are stored in the network management room, and the warehousing registration form is filled in. The materials are allowed to be borrowed or copied by the user department, but the relevant procedures must be handled.
.. in the process of software installation and use, the network management room is responsible for providing the environment for software operation and related technical support.
.. all computer software and hardware of each department shall be collected or borrowed from the network management office by the department information administrator or the person in charge of operation, and handed over to the network management office when their posts change, otherwise, the human resources department refuses to handle relevant procedures for them, and will be liable for compensation if there is any property loss.
.. the department information administrator and the person in charge of operation must ensure that the hardware and software used are intact, and do a good job of cleaning and maintenance regularly. If the software and hardware are lost or damaged due to illegal operation, it shall be liable for compensation.
The scrapping, transfer and disposal of computer software and hardware must be decided by the network management office, the general manager's office and the equipment department, and reported to the competent leader for approval, with corresponding records. ,
Comprehensive management measures of computer application
Hardware and software testing, maintenance and upgrade.
.. foreign software or downloaded software must be strictly tested (recorded) by the network management office, and can be installed or used only after passing the test.
.. The maintenance of computer software and hardware registered by the network management office according to normal procedures shall be completed by the network management office, and corresponding maintenance records shall be made.
.. organized by the network management office to update the old software of the original user department one by one, and the software application personnel of the user department are in the "soft"
Make a new receipt record on the distribution record form. The storage medium of the original software is stamped with the word "Make" in red by the network management room.
Waste "seal, to be preserved.
.. When upgrading the existing hardware and software, the application department needs to fill in the Application Form for Computer Hardware and Software Requirements and examine and approve it according to the hardware and software procurement procedures.
.. hardware and software upgrades are carried out by the network management office. After the software upgrade is confirmed, the update shall be recorded in the software control list. & Uninterrupted spaces
;
Security requirements for software and data,
Comprehensive management measures of computer application
.. The password of the internally developed application software shall be held by the software developer and the software application personnel, and shall not be disclosed to others. Password upgrade should be carried out by the original developer, and the password upgrade should be recorded.
.. the company LAN is authorized by the company computer leading group, which divides the company's virtual network, sets the access rights of working groups and users, and manages the operation passwords in a unified way. No one is allowed to tell others the password at will to prevent unauthorized use of software resources.
.. personnel who are not in the network management room of the company's central computer room are not allowed to enter at will, and the servers and network equipment in the network are only allowed to be operated and used by network administrators; The server system software and database should be encrypted for many times and can only be used with the authorization of the system administrator; All workstations in the network must be authorized by the department head to operate on the computer with their own user passwords.
Receiving and sending .. E-mails need to be strictly checked to prevent confidential information from leaking out through this channel, and sending and receiving e-mails need to be approved and registered.
.. The drawings generated by plotter need to be registered and managed. When printing drawings, the printing applicant needs to fill in the registration form of cad drawings, and the printing operation can only be carried out after the approval of the department head.
then
,