2018/12/20

Website Information Security Management System


Website Information Security Management System Information Release Registration System . When connecting to the information source, implement security protection technical measures to ensure the operational and information security of this network; . Our company accesses the network via virtual hosting; therefore, the system must properly set user permissions and must not grant operation permissions for directories other than those explicitly designated for user access. . Register and archive departments and individuals entrusted with information release. . Review information provided by the information source departments, ensuring that no content violating the “Administrative Measures for the Security Protection of International Connection of Computer Information Networks” appears. . If any violation of the “Administrative Measures for the Security Protection of International Connection of Computer Information Networks” is discovered, retain relevant original records and report to the local public security authorities within twenty-four hours. Information Content Review System 1. Strictly implement information release review and management procedures to prevent any violations of the “Administrative Measures for the Security Protection of International Connection of Computer Information Networks.” 2. Thoroughly examine information provided by the information source departments publishing on this website, ensuring that no content endangering national security, leaking state secrets, infringing upon national, social, collective interests, or citizens’ legitimate rights and interests appears. 3. Establish a comprehensive review and inspection system for public comment sections such as news bulletin boards, conduct regular checks, and prevent the appearance of comments violating the “Administrative Measures for the Security Protection of International Connection of Computer Information Networks.” 4. Once users are found to have created, copied, viewed, or disseminated the following information on this website: . Inciting resistance against or sabotage of the implementation of the Constitution, laws, and administrative regulations . Inciting subversion of state power and overthrow of the socialist system . Inciting secession and undermining national unity . Inciting ethnic hatred, ethnic discrimination, and undermining ethnic solidarity . Fabricating or distorting facts, spreading rumors, and disrupting social order . Promoting feudal superstition, obscenity, pornography, gambling, violence, murder, terror, or inciting crime . Openly insulting others or fabricating facts to defame others . Damaging the reputation of state organs . Other violations of the Constitution, laws, and administrative regulations—according to national regulations, delete addresses or directories containing the above-mentioned content from this network, close the website, and retain original records, reporting to the local public security authorities within twenty-four hours. Information Monitoring, Preservation, Removal, and Backup System To promote the healthy, secure, efficient use and development of the company’s website, maintain national and social stability, and prevent all kinds of illegal and criminal activities, in accordance with the “Administrative Measures for the Security Protection of International Connection of Computer Information Networks,” this system is hereby established: 1. This system applies to information published on this website as well as to departmental personnel publishing information on the website. 2. Strictly enforce national and local information security regulations. 3. Information published by this website itself must be carefully examined to prevent the appearance of content involving the following behaviors: (1) Inciting resistance against or sabotage of the implementation of the Constitution, laws, and administrative regulations; (2) Inciting subversion of state power and overthrow of the socialist system; (3) Inciting secession and undermining national unity; (4) Inciting ethnic hatred, ethnic discrimination, and undermining ethnic solidarity; (5) Fabricating or distorting facts, spreading rumors, and disrupting social order; (6) Promoting feudal superstition, obscenity, pornography, gambling, violence, murder, terror, or inciting crime; (7) Openly insulting others or fabricating facts to defame others; (8) Damaging the reputation of state organs; (9) Other violations of the Constitution, laws, and administrative regulations. . Website personnel must cite sources when quoting information from others. . Website personnel must first undergo procedural verification before publishing information, checking, filtering, and restricting their published content. If harmful or malicious information is found on other websites, they should proactively report it. . Website personnel must conduct manual checks daily on published information. . The website information database must be backed up once every seven days, and data queries within a 30-day period must be guaranteed. Virus Detection and Network Security Vulnerability Detection System To ensure the normal operation of the company’s website, prevent various viruses and hacker software from posing threats to our company’s network infrastructure, and minimize such losses, this system is specially formulated: . Each computer in connected departments must install antivirus software, anti-hacker software, and spam removal software, and regularly update these programs. . It is strictly forbidden to install virus software or hacker software on computers in connected departments, to attack other networked hosts, or to spread hacker software and viruses. . The network management center must regularly publish virus information, detect viruses and security vulnerabilities within the website, and take necessary measures for prevention and control. . The main server in rented servers or storage space must be equipped with a firewall system to strengthen network security management. . The network management center must regularly inspect network security and virus detection, promptly addressing any issues discovered. Illegal Incident Reporting and Assistance in Investigation System 1. All users of connected terminals must consciously abide by network regulations and are strictly prohibited from using computers for illegal or criminal activities. 2. For any computer-related illegal or criminal activities occurring within the organization, the network security administrator or discoverer must promptly stop them and immediately report to the network management center, while also taking necessary measures to protect the system. 3. For attacks suffered, each connected terminal user must also report to the network management center and take necessary measures to protect the system. 4. Each connected terminal user is obligated to accept supervision and inspections by the company’s network management center and higher-level supervisory authorities, and must actively cooperate in investigating and handling illegal or criminal incidents. 5. The network management center must promptly grasp the status of illegal online activities among all connected terminal users within the company, regularly report to the network supervisor and higher-level authorities, and assist the authorities in investigation and handling. Website Account Registration and Operation Permission Management System 1. Any individual meeting the requirements must first submit an application to the company and complete the required documentation. Only after approval can they become a website user. 2. Users who have already established accounts may request suspension of their account usage in writing to the administrator if they wish to temporarily halt their service for any reason. The duration of the suspension will be determined by their respective departments according to relevant regulations and actual circumstances. 3. Every account user enjoys completely equal network access rights. These rights do not change based on the timing of account creation or the order of network connection. 4. No user may privately steal another person’s internet account. 5. Regular backups of server systems and various network devices must be performed to ensure timely recovery in case of system failure. Security Management Personnel Job Responsibilities 1. According to the information center’s regulations on computer and network operations, standardize the management of the company’s computer and network systems and promptly stop any violations. 2. Perform daily maintenance on computers and the company’s network systems, carry out routine inspections of network equipment, and implement security precautions to ensure uninterrupted network operation. 3. Diligently maintain data records, secure backups, and user management for computer and network systems, ensuring the accuracy and real-time nature of all operational data records. 4. Provide technical support for the company’s use of information networks, guaranteeing a safe operating environment for the company’s computers and network equipment. 5. Monitor the company’s intranet and Internet access conditions, promptly providing information to the relevant information center’s network management team. 6. According to the company’s management philosophy, plan, design, produce, and manage the company’s website, responsible for information publication and daily maintenance of the website. 7. Timely collect internal and external dynamic information, publicize the company’s achievements through the website, and expand the company’s influence. 8. Provide technical support for company employees to effectively utilize website resources. 9. Be responsible for the website’s security protection and operational monitoring, maintain records and secure backups of website operation data, and promptly provide information to the relevant information center. Emergency Response Mechanism and Procedures for Sudden Events . For the setup and modification of website systems and various network devices, keep detailed records and file them accordingly. . Follow the prescribed backup procedures and cooperate with various security inspections. In the event of encountering harmful information, delete addresses or directories containing the above-mentioned content from this network according to national regulations, retain original records, and report to the Municipal Public Security Bureau’s Cybercrime Investigation Division within twenty-four hours. Zhejiang Fengli Intelligent Technology Co., Ltd. April 20, 2018

< 123 > proceed page OK