1 |
For those who handle confidential information and those who are required to be given system management authority due to work needs, properly divide labor, decentralize responsibilities, establish an evaluation and assessment system, and establish a mutual support system for personnel as necessary. |
2 |
Employees who leave the company should immediately notify the computer center and cancel all permissions to use various system resources. |
3 |
Based on roles and functions, we conduct information security education, training and publicity for employees at different levels according to actual needs to help employees understand the importance of information security and various possible security risks, improve employees' information security awareness, and encourage them to comply with information security Safety regulations. |