Notice on prohibiting non-office personnel from using company computers

I'll give you another one. You tidy up.

Company computer use regulations

In order to strengthen the use and management of the company's network, prevent illegal disclosure, and ensure the safety and smoothness of the office network, these provisions are formulated in accordance with national laws and regulations on network information services.

1. The password and account number of the computer system connected to the network must be kept and used by individuals, and shall not be disclosed to irrelevant personnel.

2. The purpose of using corporate email is to communicate with work, transmit work information and spread corporate culture. Employees are not allowed to use company email for private activities during working hours, such as chatting and sending emails unrelated to work.

3. It is forbidden to download all kinds of software unrelated to work during working hours, and it is forbidden to watch movies, play games and listen to music online.

4. Take good care of the company's computer equipment, keep all the company's commercial data confidential, and prohibit man-made disclosure of company information and data.

5. Computers are uniformly configured by the company. It is forbidden to use computers outside your post without permission, and it is forbidden to let outsiders use company computers.

6. We must abide by the relevant national laws and administrative regulations, and shall not make, copy, consult or disseminate reactionary or illegal websites to prevent viruses from invading the company's system.

7. It is forbidden to use hacking tools to attack and destroy the network and maliciously spread computer viruses to others.

8. It is forbidden to use third-party software tools to monitor the company's network use or misappropriation of network resources.

9. It is forbidden to use company computers and networks to handle personal affairs.

The fundamental purpose of making the above provisions is to standardize work behavior and improve normal work efficiency. Please understand and implement.

References:

2 E-mail management requirements

4.2. 1 When a new employee needs to open an e-mail, the employee should apply, submit it to the branch of the general manager's office for approval, and then submit it to the personnel clerk's office for opening.

4.2.2 When employees leave their jobs, they should delete their email addresses in time.

4.2.3 E-mail mass distribution regulations

4.2.3. 1 e-mail mass mailing means that the recipients are more than 5.

When the mail sender in 4.2.3.2 needs to send a mass email due to work needs, the designated department of the company will forward it uniformly. General manager office, a branch company within the scope of the whole branch company, uniformly forwards all bulk shipments.

In 4.2.3.3, mass mailing is not allowed in the following situations: (1) The contents of the email are company secrets; (2) Employee resignation information; (3) The content of the email is inappropriate or conflicts with the corporate culture; (4) E-mail whose other contents will cause adverse reactions or consequences.

When forwarding a large number of mails in general manager office, 4.2.3.4, it should be reviewed according to the situation in 4.2.3.3 before forwarding. If it is forwarded without strict examination, the forwarding department or forwarding personnel shall be responsible for the adverse consequences.

Monday, March 17, 2008 at 22:32.

Article 1 This system is formulated to strengthen the computer management of the company, ensure the safe and smooth network information, ensure the normal work of all departments, make rational use of computers and make full use of existing resources.

Article 2 The use and management of computers in all departments of the company are applicable to this system.

Article 3 The company's computer and computer network resources are the company's investment for working purposes, and it is strictly forbidden to use the company during working hours.

The computer watches online movies or plays games. Once people who play games and entertainment during working hours are found, the average employee 30 yuan/time, the employee above manager 50 yuan/time, the average employee 60 yuan/time, the employee above manager 100 yuan/time, and so on.

Article 4 The company's computer software shall be managed, installed or authorized by the office, and computer users shall not use it.

Change, delete or install software unrelated to work at will.

Article 5 It is strictly forbidden to change the IP address and gateway currently allocated by the management office without permission. In case of conflict or network problems.

Please feedback his problem to the management office in time so as to solve the problem in time.

Article 6 The responsibility of computer management lies with people: computer users assigned to individuals or departments must be aware of the safety of equipment.

And integrity. If there is any damage caused by loss, man-made damage or improper operation, the user should restore or compensate according to the price.

Article 7 Computers equipped by individuals shall keep the external equipment clean, and regularly carry out system maintenance such as disk defragmentation.

Work.

Article 8 As the planning, construction, management and maintenance department of the company's network, the office has the right to check the operation of the company's network.

Supervision and control, no department or individual may change the network structure without authorization.

Article 9 When employees use the network, they must use the network IP address designated by the administrative office, without obtaining the consent of the network administrator.

Don't change it without authorization, and don't connect the network cable outside your workplace, otherwise it will destroy the company's network environment.

Article 10 Purchase all computer systems and related auxiliary equipment (such as printers, scanners, network equipment, etc.). ) company.

Procurement, use and scrapping must be approved by the administrative office; If there is any use of computer equipment that has not been audited by the administrative office, there is no obligation to provide any form of service support for it. The administrative office is responsible for the procurement and storage of computers, the deployment and maintenance of computers and the replacement of spare parts. Without the authorization of the management office, no one may disassemble or replace any parts, accessories and peripheral equipment without permission.

Eleventh departments should do a good job of business confidentiality in the process of using computers, and do a good job of confidentiality of data text files in computers. Ensure that confidential company documents are not leaked.

Article 12 When an employee of the company is allowed to use the company computer, this system shall be deemed that the employee fully accepts all regulations. If you have any objection to this system, please stop using the computer immediately, and please make relevant explanations to the relevant departments and responsible persons to apply for giving up using the company computer.

Article 13 These Measures shall be supplemented, interpreted and supervised by the administrative office, and shall be strictly implemented as of the date of promulgation.

Articles of association of the company's computer use

This system is formulated to further strengthen computer management, improve its use efficiency and ensure the safe operation of the company's computers.

First, correct thinking and establish correct professional ethics; Take good care of the company's computer equipment and keep all business data confidential. It is strictly forbidden to disclose company information and data artificially, and put an end to all commercial crimes.

Two, familiar with the operation of commonly used computer software, abide by the operating specifications of all kinds of software; In order to comprehensively improve their own quality, working methods and work efficiency, office workers should enhance their awareness of modern science and technology and office automation, study computer knowledge hard and master the basic operating procedures of computers.

Three, except the manager and financial computer, other computers are forbidden to set passwords, and the administrator account of each computer system is only used by the company computer administrator. It is forbidden to change the system and administrator passwords at will. The BIOS password of the computer motherboard can only be set by the company computer administrator. Unless it is necessary to use administrator privileges, the computer will be changed to superuser. Password usage is managed vertically by general manager-administrator-department head-user.

4. Computers are uniformly configured and located by the company. It is forbidden to use computers outside your post without permission, and it is forbidden to let outsiders use company computers. Private computers are prohibited from entering the company for use. Any customer who needs to use a personal computer to use the company network must be approved by the general manager and appointed by the administrator.

Five, engaged in computer network information activities, can only go to work-related websites, and must abide by the relevant laws and administrative regulations of the state. It is forbidden to make, copy, consult and disseminate websites that propagate feudal superstition, obscenity, pornography, gambling, violence, murder, terror, abetting crimes and their reactionary and illegal activities, so as to prevent viruses from invading the company system.

6. Take good care of computer equipment to prevent foreign objects and their liquids on the table from damaging the computer. Prevent magnetic substances from getting close to the computer host, such as magnets, telephones, radios, etc. In particular, computer consumables should be used carefully and not excessively violently. Such as mouse, keyboard, etc. If the equipment is damaged due to violation of the prohibition, the party concerned shall be responsible for compensation and repair; if the party concerned cannot be found, the * * * department shall bear the responsibility.

Seven, computer equipment damage maintenance, you must write an application to the administrator, the administrator to check the maintenance situation, fill in the reasons, distinguish between abnormal damage and normal damage reasons, and then trace the relevant responsibilities, during the warranty period, the procurement contact supplier is responsible for the warranty. If you need to replace parts, you should apply to the department head and then submit it to the general manager for approval. If you need to use a new computer, write the job requirements first, and the administrator will specify the relevant configuration. After the approval of the superior, the buyer shall purchase according to the regulations.

Eight, computer operation must be carried out in accordance with the prescribed procedures.

A) The computer should be turned on and off according to normal procedures. If the computer cannot be used normally due to illegal operation, the user will be held accountable.

B) The installation and deletion of computer software shall be carried out with the permission of the company administrator. It is forbidden to install software and games unrelated to work, and strictly control copying files from the outside to the company computer. Common office software is installed by the administrator, and unusual office software is written and approved by the general manager, and then installed by the administrator. No department or individual may add or delete data programs in computer hard disk without authorization, and it is forbidden to change the parameters of computer system configuration without authorization.

C) It is forbidden to download all non-work related software or other network data during working hours. If you need to download the software needed for your work, you must apply to the administrator, and the administrator or supervisor will arrange the download after work.

D) It is forbidden to do things unrelated to work on the computer during working hours, such as playing games and listening to music.

E) Computer operators should upgrade antivirus software in time every day. It is not allowed to use foreign mobile storage devices such as floppy disks, USB flash drives, MP3 players and mobile hard disks at will. If you really need to use them, you should carry out virus monitoring first.

Nine, frequent power outages and power outages, should be closed in time. If there is a power failure, turn off the main power supply of the computer to prevent sudden calls from damaging the computer hardware facilities.

Ten, in case of computer operation technical problems or computer failure, should inform the company administrator as soon as possible to solve in time, are not allowed to open the computer main chassis operation without permission. Stop opening and removing chassis, adding and removing accessories without authorization.

Eleven, prohibit the use of hacking tools, prohibit the attack and destruction of the network, prohibit the malicious spread of computer viruses to others.

Twelve, computer operators in the correct shutdown and completely turn off the power supply, before leaving work. When the shift supervisor is away, the power supply of the computer host, monitor and peripheral equipment must be turned off before leaving the computer to prevent electrical fire.

Thirteen, the administrative department is responsible for the interpretation of these provisions.

According to the requirements of various departments, do a good job of sorting, classifying and backing up documents. Do not save the work document on the system disk. Form a good habit of backing up work documents every day and classifying them every month. At the end of the month, the confidential documents will be burned to the person in charge of the delivery department and submitted to the general manager for filing.

14. To sum up, those whose behaviors have little impact (those whose work is affected by negligence or operational mistakes in violation of the above provisions, but can be recovered through efforts) will be criticized and educated for the first time, given a warning for the second time, and issued a warning sheet. For the third time, deduct 100 yuan each time. If a person who has a serious impact on his behavior causes losses to his work or property, the party concerned shall be investigated for responsibility, given economic punishment, released from detention or dismissed, and punished according to the corresponding regulations. Those who violate the relevant laws of the state shall be handed over to the public security organs for handling.