Current location - Training Enrollment Network - Books and materials - Three letters of commitment to ensure the confidentiality of information
Three letters of commitment to ensure the confidentiality of information
Ensure that information is not leaked. This article is a commitment to ensure that information will not be leaked, for reference only.

Commitment to ensure that information will not be leaked:

According to the national health office planning letter [20 15] No.389, the notice of the general office of the national health and family planning commission on conducting a major investigation of information security risks in the field of health and family planning, and the notice of Henan health office [2015] No.25 on printing and distributing the implementation plan of Henan information security level protection, Yu Wei office letter [2015]. No.34 "Notice of Henan Provincial Health and Family Planning Commission on Arranging and Deploying the Network of Health and Family Planning System in Henan Province" and "Notice of Rectification of Statistical Information Center of Henan Provincial Health Department" and other documents, and signed a letter of commitment on information security, self-discipline and information confidentiality based on the principle of honesty and trustworthiness.

1. Professional content and personnel scope that must be self-disciplined and confidential.

1. 1 scope of work. Management and use of computers, printers, information systems, reporting systems at all levels, network engineering and security maintenance, website operation and other fields involving patient sensitive information.

1.2 personnel scope. Managers and staff who are exposed to personal information of AIDS and tuberculosis patients.

1.3 Any act of providing confidential contents directly, indirectly, orally or in writing is a leak.

2. Obligations and responsibilities for preventing and controlling occupational risks

2. 1 Statistics of patient sensitive information and data for commercial purposes are not allowed. Don't leak system data at will; Don't use the information and data you have for personal gain.

2.2 Don't open user permissions at will, and don't reveal your account and password.

2.3 Internet media such as websites, WeChat and instant messaging software shall not be used without the approval of the hospital.

Participate in and disseminate confidential and inappropriate information such as medical advertisements, illegal speeches, illegal pictures, audio and video.

2.4 consciously safeguard the interests of the hospital, strictly abide by the relevant rules and regulations.

2.5 Agree and promise to keep all confidential information strictly confidential and not to disclose any information to any unit or individual.

3. Explanation of handling violations

In case of leakage, the hospital will severely punish the responsible person according to relevant regulations, and those with serious circumstances will be handed over to judicial organs for criminal responsibility according to law.

4. The confidentiality obligation under this commitment does not apply to the following information:

Information disclosed due to applicable laws or requirements of courts or other state organs.

Signed by: Head of Department:

Date: Date:

Commitment to ensure that information will not be leaked II:

According to the relevant regulations of the state and the college, the system administrator signed the following confidentiality commitment letter on the information security of the college information system:

Article 1 Confidential Information Agreement

1. The confidential information involved in the college information system includes (but is not limited to) the following contents: user information, platform technical information, network topology information, communication protocol information, login user name and password, one-card login security certificate, etc.

2. The above confidential information can be embodied in tangible media, such as data, words, files, CDs, software, books, etc. It can also be spread by audio-visual means such as oral communication.

Article 2 The confidentiality responsibilities and obligations of system administrators

1. Ensure that confidential information is only used for college-related purposes. The confidential information of the college shall not be used for any purpose other than the college project. Confidential information shall not be copied or leaked to the outside world, except for the implementation of college projects. Confidential information shall not be used for new research or development without the consent of the college.

2. Ensure that the confidential information is properly kept, and assume the confidentiality responsibility for the non-technical reasons for the confidentiality of the confidential information in the process of work.

3. Without the authorization of the college, the safety information involved in this undertaking shall not be stored in the personal network storage space that does not belong to the college (such as the college's own equipment or external secure cloud storage network space).

4. When leaving the post of system administrator due to retirement, resignation, job transfer and other reasons. All originals and photocopies of media containing confidential information should be returned to the college in time, no later than 30 days from the date when the college sends out the return notice.

5. After leaving the company, you shall not disclose all kinds of safety information related to the college information system to the outside world, otherwise the college reserves the right to investigate the leakage loss.

Article 3 Others

This confidentiality undertaking shall come into effect after being signed by the system administrator, and shall be strictly observed and implemented, and shall be supervised and implemented by the Modern Education Technology Center.

System Administrator (Signature):

Commitment 3 to ensure that information will not be leaked:

Guangzhou Su Jie Network Technology Co., Ltd.:

This unit solemnly promises to abide by the relevant provisions of this letter of commitment. If there is any violation of the relevant provisions of this letter of commitment, this unit will bear all civil, administrative and criminal responsibilities arising therefrom.

1. This unit promises to abide by the Regulations on the Security Protection of Computer Information Systems in People's Republic of China (PRC), the Administrative Measures for the Security Protection of Computer Information Networks and other relevant laws, regulations and administrative rules of other countries.

2. This unit has been informed and promised to abide by the provisions of relevant documents of relevant state departments such as the Measures for the Administration of Telecommunication Business License, the Measures for the Administration of Internet IP Address Filing, and the Measures for the Administration of Non-operating Internet Information Service Filing.

3. This unit promises not to use the Internet to endanger national security, divulge state secrets, infringe upon the interests of the state, society and collective and the legitimate rights and interests of third parties, and not to engage in illegal and criminal activities.

4. This unit promises to do a good job in the information security management of its website in strict accordance with relevant national laws and regulations, and set up information security responsible persons and information security examiners according to the requirements of relevant government departments.

Five, this unit promises to improve the network security management system, the implementation of safety protection technical measures.

Six, this unit promises not to produce, copy, consult and disseminate the following information:

1, opposing the basic principles stipulated in the Constitution;

2. Endangering national security, revealing state secrets, subverting state power and undermining national unity;

3, damage the national honor and interests;

4. Inciting national hatred and discrimination and undermining national unity;

5. Destroying the state's religious policy and propagating cults and feudal superstitions;

6. Spreading rumors, disrupting social order and undermining social stability;

7. Spreading obscenity, pornography, gambling, violence, murder, terror or abetting crimes;

8. Insulting or slandering others and infringing upon their legitimate rights and interests;

9. Containing other contents prohibited by laws and administrative regulations.

Seven, this unit promises not to engage in the following activities that endanger the security of computer information networks:

1. Entering the computer information network or using the computer information network resources without permission;

2. Deleting, modifying or adding computer information network functions without permission;

3. Delete, modify or add data and applications stored or transmitted in the computer information network without permission;

4. Deliberately making and spreading destructive programs such as computer viruses;

5, other acts endangering the security of computer information network.

Eight, this unit promises to take emergency measures immediately when a major safety accident occurs in the computer information system, keep the original records, and report to the government supervision department within 24 hours and notify your unit in writing.

9. All the filing information promised by our company is true and effective. When the filing information changes, the updated information will be submitted as soon as possible. If the filing information is inaccurate due to failure to update in time, your company has the right to close the access website according to law. "

Ten, such as violation of this letter of commitment and the relevant provisions of the relevant laws and regulations of the state, the unit directly bear the corresponding legal responsibility, resulting in property losses, direct compensation by the unit. Your company has the right to stop the service.

XI。 This letter of commitment shall come into effect as of the date of signing.

Single stamp:

Date: