2. The company will improve the existing technical confidentiality system. All personnel must sign confidentiality agreements when entering the company, formulate a series of systems for the use and management of computers, networks, e-mails, disks and other media, and take timely protection measures such as registration, declaration and appraisal for intellectual property rights such as copyrights, patents and non-patented technologies in accordance with the law to ensure that the company's technical and production secrets are not leaked;
The company implements an annual salary system for senior managers, and decides to promote or raise salary according to the assessment results every year. If the company goes public successfully, it will introduce the company's equity incentive system in a timely manner according to the relevant regulations of the securities regulatory authorities, and learn from the practices of other listed companies to further improve the incentive mechanism. According to the Articles of Association, the Labor Contract, the General Manager's Work Regulations and the arrangement of the internal control system, the company has correspondingly restricted the performance, authority and responsibility of senior management personnel to ensure the standardization and scientificity of the company's operation and management. There are other ways: 1, confidential computers are not connected to the internet. Nowadays, the hacker technology has achieved the purpose of exploring the information on the hard disk of networked computers through the network. Therefore, it will be very dangerous for classified computers to surf the Internet. Therefore, enterprises should store computers with core competitiveness and business secrets with important economic value separately, instead of connecting to the Internet. For general trade secrets, you should copy all trade secret files with U disk in advance, and delete all trade secret information from the computer before surfing the Internet. In this way, confidential information is not online, and online information is not confidential, preventing hackers from stealing business secrets through espionage. 2. Restrict online chatting and prohibit the installation of cameras. Many employees like QQ, MSN, etc. Chatting online during work hours. Because the above-mentioned online chat has the function of sending files instantly, it is easy to reveal business secrets through online chat. Therefore, in order to reduce the risk of revealing business secrets, enterprises should prohibit ordinary employees from chatting online. Of course, some enterprises need to contact business through MSN, and enterprises can allow specific employees to use MSN, which can effectively protect trade secrets and not affect the business development of enterprises. Enterprises should prohibit the installation of cameras, because cameras can not only expose all business activities within the enterprise to competitors, but also reveal secrets by directly aiming at documents containing trade secrets. 3. Without authorization, it is forbidden to download and install programs unrelated to work. Because some programs contain spyware, if you download programs that have nothing to do with work without authorization, you may be inadvertently installed with spyware. Therefore, in order to protect business secrets, employees are not allowed to download programs unrelated to work. 4. Take encryption measures. When employees use the network to transmit files involving trade secrets, they should use encrypted computer programs to obtain decryption keys. The recipient of the information has the key, decrypt it and get the information. This measure can effectively keep secrets for theft and eavesdropping on the way of transmitting documents and information, and for employees to press the wrong transmission button due to negligence. 5. Use the network management system. Through the network management system, we can not only formulate effective safe online strategies and actively defend against network threats, but also ban P2P and chat tools and control the browsing of web pages in detail according to the system classification. It can be said that this is a simple and comprehensive solution, so that trade secrets will always be protected by the golden bell. 1. Company employees have the obligation to keep company secrets, which involve confidential contents such as company sales, finance, product research and development, and new product agency. No one is allowed to disclose it to the outside world. 2. Without the approval of the general manager, no one may copy, duplicate floppy disks or take out all internal control documents of the company. 3. Confidential documents such as statistical reports, contracts, files and meeting minutes shall be kept by the Human Resources Department, and no one may copy, duplicate or lend them without the approval of the General Manager. Four, before the company's new product agency, shall not release the company's new product agency dynamics and other information to the outside world. Five, about the product price, technical consultation and other consultation calls should be answered by the competent department to avoid leakage. Six, the information to be published on the Internet should be audited by the Human Resources Department; Seven, the network administrator should monitor the daily network information, set up security measures for the company's network operation, to prevent hackers from invading. Eight, files, documents, etc. are kept by the competent department or designated person, and the custodian changes, resigns and dismisses. The internal control documents and confidential documents must be handed over clearly, signed and supervised before the next procedure can be handled. Nine, the company's department manager or above and product research and development personnel have not been employed by enterprises that have direct competition with the company within one year after leaving the company. X. Expired documents shall be inspected by the Human Resources Department and destroyed. Eleven, employees are not allowed to read, copy, copy documents that have nothing to do with their job responsibilities. 12. Employees whose work involves the above confidential contents must sign a confidentiality agreement with the company. Twelve, the company's employees must strictly abide by these regulations, and the company reserves the right to legal recourse and litigation compensation. Thirteen, the salary is confidential.