欢迎来到淘文阁 - 分享文档赚钱的网站! | 帮助中心 好文档才是您的得力助手!
淘文阁 - 分享文档赚钱的网站
全部分类
  • 研究报告>
  • 管理文献>
  • 标准材料>
  • 技术资料>
  • 教育专区>
  • 应用文书>
  • 生活休闲>
  • 考试试题>
  • pptx模板>
  • 工商注册>
  • 期刊短文>
  • 图片设计>
  • ImageVerifierCode 换一换

    单位计算机保密管理制度.pdf

    • 资源ID:56618990       资源大小:60.52KB        全文页数:7页
    • 资源格式: PDF        下载积分:4.3金币
    快捷下载 游客一键下载
    会员登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录   QQ登录  
    二维码
    微信扫一扫登录
    下载资源需要4.3金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    单位计算机保密管理制度.pdf

    单位计算机保密管理制度为进一步加强我所涉密计算机信息保密管理工作,杜绝泄密隐患,确保国家秘密的安全,根据中华人民共和国保守国家秘密法,结合我所实际,制定本制度。一、涉及国家秘密的计算机(简称涉密计算机),是指用于存储、处理、传输国家秘密信息的计算机。我所涉及动物疫情秘密以上的计算机都属于涉密计算机,必须具有能接受市保密工作部门统一监管,粘贴由保密工作部门统一制发的密级标识,并做好登记备案。二、涉密计算机原则上专机专用,特殊情况需多人使用的,由科、站、所、中心指定专人管理。三、涉密计算机使用及保管场所的安全防护措施应符合保密管理规定的要求,确保防护设施的安全可靠。四、涉密计算机的传递按照国家秘密载体保密管理的规定的要求管理。五、涉密计算机不得直接或间接连入国际互联网等非涉密网,必须与国际互联网实行物理隔离。未安装物理隔离卡的涉密计算机严禁连接国际互联网。六、涉密计算机日常使用管理人员是涉密计算机安全保密的责任人,其日常保密管理职责如下:1、应设置 8 位数以上的开机密码,以防止他人盗用和破译,开机密码应定期更改。2、应在涉密计算机的显著位置进行标识,不得让其他无关人员使用涉密计算机。七、涉密计算机必须配备安全保密、查杀病毒、木马等的国产杀毒软件。八、涉密计算机使用的打印机、传真机等设备按涉密计算机的同等级别进行管理,不得与其他非涉密计算机网络及通讯网络连接;严禁在涉密计算机上使用无线功能的信息设备。九、涉密计算机的维修,要严格程序,原则上由综合科负责。需外送维修的,维修前,应进行登记,将涉密信息备份后,彻底清除涉密信息或拆除所有涉密存储介质,到保密工作部门指定的维修点进行,并有保密人员在场。维修完毕后,进行核对、技术测试和审查,符合有关标准后才能投入使用。十、涉密计算机因使用人员岗位变动、使用期满等原因交回时,对涉密计算机进行检查、确认,并做好登记备案、妥善保管;需归档的,应按相关规定归档。十一、不再使用的涉密计算机应由使用者提出报告,由单位领导批准后,交保密工作领导小组统一处理,确保有关内容和数据不可恢复。禁止将未经技术处理的涉密计算机转为非涉密计算机或进行公益捐赠。十二、责任人每半年对涉密计算机进行一次清查、核对,做出文字或电子记录,发现丢失应及时向保密工作部门报告。单位计算机保密管理制度 篇 2 文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1一、按照“谁主管谁负责、谁运行谁负责”的原则,各科室在其职责范围内,负责本科室计算机信息系统的安全和保密工作。二、明确一名分管领导负责本单位计算信息系统安全和保密工作,制定一个工作机构具体负责本单位计算机信息系统安全和保密综合管理。三、计算机信息系统应当按照国-家-信-息安全等级保护的要求实行分类分级管理。四、计算机的使用保密管理应遵循以下要求:1、对所有计算机进行登记备案,定期核查;2、设置开机口令并定期更换,防止口令被盗;3、安装防病毒等安全防护软件,并及时进行升级;及时更新操作系统补丁程序;4、不得安装、运行、使用与工作无关的软件;5、严禁同一台计算机既上互联网又处理涉密信息。五、涉密计算机的使用保密管理应遵循以下要求:1.严禁与国际互联网和非密设备连接,实行物理隔离,禁止一机两用;2.禁止使用具有无线联网功能的硬件模块、外围设备、网络交换等设备;3.不得擅自进行数据信息交换,确有需要的,须经分管领导批准,履行登记手续,并通过光盘刻录的方式进行;4.初始配置涉密计算机时,应对硬盘进行格式化,操作系统初始文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1化处理,落实安全保密防护措施,备案登记,并在显著位置张贴相应的密级标识;5.不得擅自修改、删除涉密计算机系统的保密防护措施和系统设定,严禁降低计算机密级或更改工作用途;6、涉密计算机应在指定办公场所使用,未经批准,不得变更办公场所,甚至带出办公场所;7.涉密计算机必须设置bios 密码、开机密码和屏幕保护密码,且长度不得少于 8 个字符,并定期更换;8涉密计算机及相关设备的维修要由专业人员来本单位维修,并指定专人现场监督,严禁修理人员复制或读取涉密信息,确需送外维修的应拆除涉密信息存储部件;9涉密计算机及相关设备不再使用或处理涉密信息时应及时将涉密信息存储部件拆除并销毁,严禁将涉密计算机出售、遗弃或赠送其他单位或个人。单位计算机保密管理制度 篇 3 计算机及其网络安全管理规定一、加强计算机及其网络的保密管理,确保计算机及其网络处理信息的安全,根据 中华人民共和国保守国家秘密法和国家保密局的有关文件精神,制定本规定。二、计算机及其网络的保密的管理实行领导责任制。单位应明确一位分管领导负责本单位计算机及其网络的保密管理工作,并确定各处(室)处长(主任)为本处(室)计算机爱理的第一责任人;保密文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1工作机构负责对计算机网络安全管-理-员、系统管-理-员负责计算机及其网络安全保密技术措施的落实和日常管理工作。三、建立涉密计算机登记备案制度。各单位保密委员会应根据实际用途和所处进理信息的密级,将计算机分为涉密计算机和非涉密计算机,实行统一编号管理,明确专人负责,做到专机专用,并在计算机显示器的左上方贴相应的密级标识。四、建设处理涉密信息的计算机网络,应选择经国家保密局批准并取得涉及国家秘密的计算机信息系统集成资质证书的集成单位(公司)承建。五、处理涉密信息的计算机网络建成后,应根据国家有关规定,报保密工作部门进行保密审批。未经保密审批的网络,不得处理国家秘密信息。六、计算机保密管理必须做到“上网不涉密,涉密不上网”。涉密计算机可处理国家秘密信息和内部工作信息,但不得与国际互联网或其他非涉密网络相连,必须实行于非涉密信息的搜索、查阅,但不得处理,传递、储存国家秘密信息。七、建立健全上网信息的保密审查批制度。各单位应根据国家保密法规,按照一定的工作程序,建立健全上网信息保密审查批制度,并落实上网信息保密审批领导责任制。凡向国际互联网站点提供或发布的信息,必须经过保密审查批准。八、涉密计算机要设置开机密码和屏幕保护密码。处理秘密级信息的计算机及其网络,设置的开机密码或系统口令长度不少于八个字文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1符,更换周期不长于一个月;处理机密级信息的计算机及其网络,设置的开机密码或系统口令长度不少于十个字符,更换周期不长一周;处理绝密级信息的计算机及其网络,应当采用一次性口令或生理特征等强认证措施。设置屏幕保护的等待时间应根据工作需要,一般不长于 2 分钟。九、涉密计算机内所存诸的涉密信息,应根据国家保密局有关定密工作的规定,由本单位有关部门确定并标明密级。密级标识应位于正文首页左上角,且不能与正文分离。存诸多种密级信息时应信息的最高密级进行防护。十、加强对便携计算机的保密管理规定。各单位应专门建立便携计算机的保密管理规定,明确保密管理责任人,建立使用登记制度,严格履行外出使用的保密审批手续。涉密便携式计算机处理的这家秘密信息必须存放在软盘、U盘、光盘、移动硬盘等移动存诸介质中,并与便携计算机分离保管,涉密便携计算机几不得诸存国家秘密信息。十一、加强计算机涉密磁介质的保密管理。凡储存了国家秘密信息的软盘、U盘、光盘、可移动硬盘等,应按所存诸信息的最高级标明密级,实行统一编号,明确专人负责,由各处(室)集中保存于铁质文件柜中,并建立涉密磁介质的使用登记制度。十二、涉密计算机各类涉密信息设备、销毁时,须经单位主管领导审核批准、指定专人负责,并进行清点,登记,建立维修、销毁过各程中的安全。文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1十三、加强对计算机及其网络工作人员岗前、在岗和离岗的保密培训,采取多种方式开展保密知识的教育,逐步提高保密意识,定期组织考核,并保持人员的相对稳定。十四、各级保密委员会应建立计算机及其风络的保密管理台账,依据国家有关保密法规、保密技术标准,不定期地开展计算机及其网络的保密技术检查,及时发现泄密隐患,堵塞泄密漏洞。十五、对违反保密管理规定,发生计算机及其网络泄密事件的,要要据中华人民共和国保守国家秘密法和国家保密局的有关规定。追究有关领导、人员的责任。二 00 六年十一月六日文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10P6E2 HH5P3C6V1H1 ZV1G9A4C9T1文档编码:CD9W10P10

    注意事项

    本文(单位计算机保密管理制度.pdf)为本站会员(Q****o)主动上传,淘文阁 - 分享文档赚钱的网站仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知淘文阁 - 分享文档赚钱的网站(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于淘文阁 - 版权申诉 - 用户使用规则 - 积分规则 - 联系我们

    本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

    工信部备案号:黑ICP备15003705号 © 2020-2023 www.taowenge.com 淘文阁 

    收起
    展开