Current location - Training Enrollment Network - Books and materials - Measures of Hangzhou Municipality on the Administration of Computer Information System Security Protection
Measures of Hangzhou Municipality on the Administration of Computer Information System Security Protection
Chapter I General Provisions Article 1 In order to strengthen the security protection of computer information systems, maintain public order and social stability, and promote the healthy development of informatization, these Measures are formulated in accordance with the Regulations on the Security Protection of Computer Information Systems in People's Republic of China (PRC) and the Interim Provisions on the Administration of International Networking of Computer Information Networks in People's Republic of China (PRC). , combined with the actual situation of this city. Article 2 The term "computer information system" as mentioned in these Measures refers to a man-machine system consisting of computers and their related and supporting equipment and facilities (including wired and wireless networks, the same below), which collects, processes, stores, transmits and retrieves information according to certain application objectives and rules, including the Internet, local area networks and mobile networks. Article 3 These Measures shall apply to the security protection and management of computer information systems within the administrative area of Hangzhou. Fourth Hangzhou Municipal Public Security Bureau is in charge of the security protection and management of the city's computer information system.

Hangzhou Public Security Bureau Public Information Network Safety Supervision Branch is specifically responsible for the security protection and management of computer information systems in urban areas (except Xiaoshan District and Yuhang District).

County (city) Public Security Bureau and Xiaoshan District and Yuhang District Public Security Bureau are responsible for the security protection and management of computer information systems within their respective administrative areas.

State security organs, secrecy organs, information administrative departments and other relevant government functional departments are responsible for the work related to the security protection and management of computer information systems within their respective functions and duties. Article 5 Public security organs, state security organs, secrecy organs, information administrative departments and other relevant government functional departments shall establish a coordination and cooperation management mechanism to do a good job in the security protection and management of computer information systems. Article 6 Public security organs, state security organs, security organs, information administrative departments and other relevant functional departments of the government shall protect the legitimate rights and interests of units and individuals using computer information systems and keep their secrets in the process of performing their management duties.

Units and individuals using computer information systems shall assist the public security organs and other relevant functional departments in the security protection and management of computer information systems. When public security organs and other relevant functional departments perform their management duties according to law, users and individuals shall truthfully provide technical data of their own computer information systems. Article 7 The focus of computer information system security protection is to maintain the security of computer information systems in the following important fields and units (hereinafter referred to as key security protection units) involving state affairs, public interests, economic construction, cutting-edge science and technology:

(1) State organs at all levels;

(two) public utilities such as finance, securities, insurance, futures, energy, transportation, social security, post and telecommunications;

(3) Key scientific research and education units;

(4) Enterprises related to the national economy and people's livelihood;

(five) interconnected units, access units and key governments, enterprises and news websites engaged in international networking;

(6) Units that provide Internet services to the public;

(seven) the development, operation and maintenance units of interactive columns such as Internet games, SMS forwarding and various chat rooms;

(eight) other users of computer information systems that have a significant impact on the public interest. Chapter II Safety Management of Computer Information System Users Article 8 Computer information system users shall establish systems such as personnel management, computer room management, equipment and facilities management, data management, magnetic media management, input and output control management and safety supervision, so as to improve the safety guarantee system of computer information systems and ensure the safety of their own computer information systems. Article 9 Users of computer information systems shall determine the person in charge of security management of computer information systems in their own units. The person in charge of safety management shall perform the following duties:

(a) to organize the publicity of laws, regulations, rules and related policies on the security protection and management of computer information systems;

(two) to organize the implementation of computer information system security management system and security protection technical measures;

(three) to organize the safety education and training of computer practitioners in this unit;

(four) regularly organize the inspection of the safe operation of computer information systems, and eliminate potential safety hazards in time. Tenth computer information system users should be equipped with their own computer information system security technicians. Safety technical personnel shall perform the following duties:

(a) strictly implement the technical measures of computer information system security protection in this unit;

(two) to check and test the safe operation of computer information systems and eliminate hidden dangers in time;

(3) When a security accident or criminal case occurs in the computer information system, it shall immediately report to the unit, and take appropriate measures to protect the site to avoid the harm from expanding;

(four) responsible for collecting the network topology diagram of the unit and other relevant technical data of the information system. Eleventh key units of safety protection shall establish and implement the following safety protection management systems:

(a) the computer room safety management system;

(two) the safety responsibility system of the person in charge of safety management and safety technicians;

(3) Network security vulnerability detection and system upgrade management system;

(4) Operating authority management system;

(5) User registration system;

(six) information release review, registration, preservation, deletion and backup system;

(7) Information confidentiality system;

(eight) information system security emergency disposal system;

(9) Other relevant safety protection management systems.