Current location - Education and Training Encyclopedia - Education and training - Regulations of Liaoning Province on Security Management of Computer Information System (revised in 2004)
Regulations of Liaoning Province on Security Management of Computer Information System (revised in 2004)
Chapter I General Provisions Article 1 In order to strengthen the security management of computer information systems and promote the application and development of computers, these Regulations are formulated in accordance with relevant laws and regulations and in combination with the actual situation of our province. Article 2 The term "computer information system" as mentioned in these Regulations refers to a man-machine system which is composed of computers and their related and supporting equipment and facilities (including networks) and collects, processes, stores, transmits and retrieves information according to certain application objectives and rules. Article 3 These Regulations shall apply to the safety management of computer information systems within the administrative area of our province. The security management of military computer information system shall be implemented in accordance with the relevant provisions of the state. Article 4 Public security organs shall be responsible for the security management of computer information systems. State security organs, security departments and other relevant government departments are responsible for the security management of computer information systems within their respective functions and duties. Fifth computer information system security management focuses on maintaining the security of computer information systems of state organs, economic construction, science and technology and other important departments and units. Article 6 Citizens have the right to stop acts endangering the security of computer information systems and report them to public security organs. Seventh units and individuals that have made outstanding contributions to the security management of computer information systems shall be commended and rewarded by the public security organs or their units. Chapter II Safety Management System Article 8 Computer rooms shall conform to national standards and relevant state regulations. The design scheme of the newly-built computer room shall be reported to the public security organ for the record. The public security organ shall regularly check the safety of the computer room. Article 9 Users of computer information systems shall establish the following security systems:

(a) Access management system of the Computing Centre;

(2) Technical document management system;

(3) system use and maintenance system;

(4) Data recording medium management system;

(five) the prevention and control system of computer crime, computer virus and harmful data;

(6) Other safety supervision systems. Article 10 Management, maintenance and full-time operators of computer information systems shall receive safety training organized by public security organs. Article 11 The construction and application of computer information systems shall comply with national laws, regulations and other relevant provisions. The newly-built computer information system shall be reported to the public security organ for the record. Public security organs regularly check the safety of computer information systems. The computer information system that has been connected to the international network shall be reported to the provincial public security organ for the record by the access unit. Twelfth it is strictly forbidden for any unit or individual to manufacture and disseminate computer viruses and other harmful data. Thirteenth sales of computer information system security products, should be obtained in accordance with the relevant provisions of the state sales license. Chapter III Responsibilities of Security Management Article 14 Public security organs shall perform the following duties in the security management of computer information systems:

(a) to carry out publicity and education on the security protection of computer information systems;

(two) to supervise and inspect the implementation of laws and regulations on the security management of computer information systems;

(3) Handling the filing procedures of relevant computer information systems;

(four) to supervise and manage the prevention and research of computer viruses and other harmful data;

(five) to investigate and deal with illegal and criminal cases that endanger the security of computer information systems. Fifteenth units using computer information systems shall perform the following duties:

(a) to carry out safety education for computer information system staff;

(two) regularly analyze the risks of computer information systems and take corresponding measures;

(three) report to the public security organs and the higher authorities on the safety of the computer information system of the unit;

(four) equipped with computer information system security management personnel, and reported to the local public security organs for the record. Sixteenth computer information system security management personnel are responsible for:

(a) responsible for the internal supervision and security measures of information processing activities;

(two) found in the computer information system, computer viruses and other harmful data, timely report to the public security organs, and report the degree of harm;

(four) to assist the public security organs in tracing the sources of computer viruses and other harmful data;

(five) to assist the public security organs to investigate and deal with illegal and criminal cases related to computer information systems. Seventeenth public security organs found hidden dangers affecting the security of computer information systems, should be within 48 hours to the user issued a "computer information system hidden dangers rectification notice", ordered to eliminate hidden dangers within a time limit. Chapter IV Legal Liability Article 18 Anyone who violates the provisions of these Regulations and commits any of the following acts shall be given a warning by the public security organ and ordered to make corrections within a time limit; Overdue correction, shall be ordered to suspend production for rectification:

(a) the computer information system security management system has not been established or the security management system is not perfect, which endangers the security of the computer information system;

(two) the international network access unit fails to file with the public security organ in accordance with the provisions of the state;

(3) Failing to report the computer information system case to the public security organ within 24 hours;

(four) received the "notice of rectification of computer information system security risks" issued by the public security organ, and refused to eliminate the hidden dangers within the time limit;

(five) after inspection by the public security organs, it does not meet the safety standards of the computer room, but it still continues to be used.

Ordering to suspend business for rectification must be reported to the provincial public security organ for approval.