Current location - Training Enrollment Network - Education and training - What are the basic conditions for companies to use common passwords?
What are the basic conditions for companies to use common passwords?
Security management of computer information system should be done well. Network equipment, computers and notebook computers must be equipped with anti-virus tools and regularly tested and disinfected to ensure the safe and normal operation of computers. Confidential computer information systems shall not be directly or indirectly connected with the Internet or other public information networks, and must be physically isolated. Confidential information and data must be collected, stored, processed, transmitted, used and destroyed in accordance with confidentiality provisions. Check the computer system regularly to prevent files from being lost or leaking, and to prevent confidential files and other contents that need to be protected from entering the network. For the important data to be backed up, the backup medium can be CD, hard disk, U disk, etc. Strengthen network management, and report abnormal phenomena to the leaders in charge and the confidential leading group of the Municipal Commission for Discipline Inspection and Supervision in a timely manner. Conduct pre-job safety training for computer information system staff, consciously implement relevant regulations, and conduct regular safety education and inspection. It is strictly forbidden to modify the computer software and hardware configuration without permission, and not to download unchecked software from the Internet at will. When maintaining the system, data protection measures should be taken and the connection with the Internet should be disconnected.

Article 48 of the Law of People's Republic of China (PRC) on Guarding State Secrets violates the provisions of this law and commits any of the following acts, and shall be punished according to law; If the case constitutes a crime, criminal responsibility shall be investigated according to law: (1) illegally obtaining or holding the carrier of state secrets; (2) buying, selling, transferring or destroying state secret carriers without permission; (3) transmitting the carrier of state secrets through ordinary postal service, express delivery and other channels without taking security measures; (4) mailing or consigning a state secret carrier out of the country, or carrying or transmitting a state secret carrier out of the country without the approval of the relevant competent department; (5) illegally copying, recording or storing state secrets; (six) involving state secrets in private exchanges and correspondence; (seven) transmitting state secrets on public information networks such as the Internet or wired or wireless communication without taking security measures; (8) Connecting classified computers and classified storage devices to public information networks such as the Internet; (9) Information exchange between classified information systems and public information networks such as the Internet without protective measures; (10) Using non-confidential computers or non-confidential storage devices to store and process state secret information; (eleven) to uninstall or modify the safety technical regulations and management regulations of the classified information system without authorization; (12) Giving away, selling, discarding or using classified computers and classified storage devices that have not been processed by security technology for other purposes.