Current location - Education and Training Encyclopedia - Educational institution - Provisions of Shanxi Province on Computer Security Management
Provisions of Shanxi Province on Computer Security Management
Article 1 In order to strengthen computer security management, promote the application and development of computers, and ensure the smooth progress of socialist modernization, these Provisions are formulated in accordance with the Regulations of People's Republic of China (PRC) on the Security Protection of Computer Information Systems and the actual situation of this province. Article 2 These Provisions shall apply to units or individuals engaged in computer and computer system engineering research, teaching, operation and use within the administrative region of this province. Article 3 The term "computer virus" as mentioned in these Provisions refers to a set of computer instructions or program codes that compile or insert computer programs, destroy computer functions or data, affect the use of computers, and can replicate themselves. Fourth Provincial Public Security Department is in charge of computer security management within the administrative area of this province. The local, city and county public security organs shall be responsible for the computer security management within their respective administrative areas. Computer security supervision institutions of public security organs at all levels are responsible for the specific implementation of these provisions. Its main responsibilities are:

(a) to supervise, inspect and guide the computer security work:

(two) notification of computer virus epidemic, and provide technical services;

(3) Handling the examination, registration and filing of computer security management;

(four) responsible for the safety management of computer information networks in this province and international networking computer networks;

(five) to investigate and deal with cases of illegal and criminal activities using computers. Article 5 A unit that operates or uses computers shall set up a computer security management team or a computer security administrator according to specific conditions to be responsible for the computer security management of the unit. Their main duties are:

(a) to formulate specific safety management plans and rules and regulations;

(two) responsible for handling the relevant filing procedures with the public security organs;

(three) to assist the public security organs in computer security management and accident investigation. Article 6 No unit or individual may engage in the following activities:

(1) Stealing, selling, disclosing or modifying important computer information without permission;

(2) Destroying or interfering with the normal work of the computer system;

(3) compiling, collecting and disseminating computer viruses;

(4) Making, selling and disseminating obscene and reactionary computer software;

(five) using computer information networks (including international networking) to endanger national security, disclose state secrets, or consult, copy or make information that hinders social security and other harmful information;

(six) using computer technology to carry out other illegal and criminal activities. Article 7 The development and operation of software, hardware and other special computer security products for computer virus prevention, detection and removal shall be subject to the examination and approval of the Provincial Public Security Department. Article 8 Units that manufacture, sell, maintain and lease computer software and hardware must ensure that the software and hardware products manufactured, sold, maintained and leased are free from computer viruses and harmful data. Article 9 Computer users shall obtain the consent of the planning, science and technology management departments and solicit the opinions of the public security organs when importing or purchasing large-scale computer information systems.

Newly purchased computers and software, data and carriers used for the first time shall be tested by the computer security administrator of the unit to confirm that there is no virus or harmful data before they can be put into use. Tenth without the approval of the public security organs, no unit or individual may engage in the following activities:

(1) Mechanism and procedures for spreading computer viruses;

(2) publishing, selling or renting books, materials and media containing computer virus mechanisms and virus source programs. Eleventh computer production, scientific research departments and users should establish and improve the management system of computer virus prevention, discovery, reporting and removal. The running computer information system should carry out virus detection regularly. Article 12 When a public security organ discovers hidden dangers that affect computer security, it shall issue a notice of hidden dangers of computer security, promptly notify users and take security protection measures. Article 13 When computer users find that their computers are infected with viruses, they should immediately take isolation measures and eliminate them in time. Fourteenth computer information system cases, new viruses and major computer safety accidents must be reported to the local public security organs at or above the county level within 24 hours. Article 15 Anyone who commits any of the following acts shall be given a warning by the public security organ or fined below 500 yuan for the individual and below 1000 yuan for the unit: (1) deliberately concealing and not reporting cases, new viruses or major computer safety accidents that have occurred in the computer information system;

(two) international networking units and individuals, overdue to the public security organs for the record. Sixteenth one of the following acts, the public security organs shall impose a fine of more than 200 yuan and less than 500 yuan on individuals, and a fine of more than 500 yuan 1000 yuan on units.

(1) Newly purchased computers and software, data and carriers used for the first time are put into use without virus detection, thus causing harm to the country or others;

(two) found that the computer infected with viruses, did not take security measures, causing harm to others;

(three) after receiving the notice of computer security risks, it is overdue;

(four) without approval, teaching computer virus mechanism and virus source program;

(five) to modify important computer information without authorization, interfere with the normal work of computer systems, or compile, collect and spread computer viruses.