Provisions on the management and use of enterprise mailboxes

You can make your own changes according to the company's computer use, email address and network management.

I. Use and management of computers

1. The property right of the computer (and its subsidiary products) belongs to the company, and no one may move part or all of the computer or its accessories out of the office.

2. The computer administrator of the company office should register the computer model, related accessories, users, collection time and other related matters in detail and accurately. The users of the education resource network of the computing moon ship should cooperate with the management personnel and sign it for use.

3. The computer (and attached products) shall be kept by the user's special person, and the user shall be responsible for the damage or loss of the computer (and accessories), and the loss or damage must be compensated according to the price.

Computer users should cherish computers and use them correctly. All employees should cherish the company's machinery and equipment. Without the consent of the department head and the maintenance personnel of the company's computing moon ship education resource network system, it is not allowed to disassemble the aircraft without permission. If you encounter problems that you can't solve, the company's computer system maintenance staff will help you solve them.

5. Company employees can't set the power-on password when using computers. If there are special reasons, it must be approved by the head of the department. After setting the password, you should submit a written password description to the network administrator.

6. When computer users return computers (and accessories), they should go through the return procedures at the computer administrator in the company office. The administrator should register the returned computer model, relevant accessories and return time in detail and accurately.

7. Please turn off your mobile phone at noon and after work, and turn off the power. Ensure the security of the computer system.

Second, the network management

1, computer system security management

No one is allowed to enter an unauthorized computer system and change system information and user data;

No one may use computer technology to infringe on the legitimate interests of users, and may not make, copy and disseminate relevant information that harms the interests of the company;

All departments should back up data regularly in case of failure.