员工就业规则EmployeeManualMV8 联系客服

发布时间 : 星期日 文章员工就业规则EmployeeManualMV8更新完毕开始阅读d109f9b7f02d2af90242a8956bec0975f565a4e0

第五章 Chapter five

信息安全

Information security

第十五条 信息安全管理

1. 应自觉接受信息安全相关教育,并遵守信息安全相关管理规定;2. 未经公司综合管理部书面允许许可不得进入未经授权的区域;

3. 未经公司综合管理部书面许可不得在公司内拍照、摄像或录音;

4. 未经综合管理部书面准许,会客登记不得擅自将访客或供应商带入公司,对访客或供应商需进行

全程陪同并在指定区域接待;陪同人员应阻止访客或供应商未经公司许可在公司内拍照、摄像或录音。

Article fifteen Information security management

1. Consciously accept relevant education about information security and abide by relevant

management regulations about information security;

2. It is not allowed to enter into unauthorized areas without written permission of the comprehensive

management Dept;

Page 16 of 72

3. It is not allowed to take photos and/or a video or audio recording without written permission of

the CMD.

4. It is not allowed to bring the visitors or suppliers into the company without written permission

from the CMD; shall accompany the visitors or suppliers all the way and host them in designated area; The escort should inform the visitors or suppliers that they are not allowed to take photos and/or a video or audio recording without the written permission of the CMD.

第十六条

计算机管理

1. 公司计算机只能用于公司工作需要,不能用作其它用途;

2. 不能把公司机密信息存放在本地计算机上,公司信息应统一存放到服务器的指定文件夹里;

3. 计算机应设开机密码,开机密码由用户本人设定并保管,绝不准把密码透露给他人使用;

4. 只有IT部门的人可以安装计算机,计算机部件,计算机外围设备和软件等,不允许用户私自操

作以上事项;

5. 笔记本电脑应在公司内上锁保管;如需把电脑(包括笔记本)带出公司,需先经所属领导同意;

用户需要保管好电脑,如果公司电脑要在外面留宿,应该把电脑放在安全的地方;回公司后,在IT部门检查并确认电脑安全后,才能把电脑连入公司网络;

6. 除非有总经办的允许,否则不准将个人的计算机、存储载体(U盘、SD卡、记忆棒等)带入公司。

Article sixteen

Computer management

1. The company computers can only be used for working; it is not allowed to be used for other purposes;

Page 17 of 72

2. It is not allowed to store company (confidential) information on the local computer. Company

information can only be stored in the designated folders on the server;

3. All computers are password protected. The user decides on the password himself. Only the user of the

account can hold the password information, no one else. The user is responsible for not making his password know to others;do so;

4. Only the IT department can install computers, parts, peripherals and software. Users are not allowed to

5. Laptop in the office should be secured with a lock; computers including laptops can only be brought out

of the company with the written permission of the subordinate leader; the user will safeguard the computer when it is not in the office; if the computer is out of the office overnight, the computer should be stored in a safe; when the computer is returned to the office, the IT department will check the condition of the computer and only when IT department confirms the safety, the computer can be plugged into the computer network;

6. Personal computer, storage carrier (USB flash disk, SD card, memory stick, etc) is not allowed to be

brought into the company, unless with written permission form GMO.

第十七条

电话、传真、打印、复印管理

1. 机密信息不得作为双面纸使用、不得通过电话、传真传达;

2. 电话号码簿需妥善保存,不可随意放置,必要时应随时进行废弃;

3. 发送传真时,需反复确认传真号码后再发送;发送完成后须及时向对方确认;

4. 传真、打印、复印后的资料不可留置在传真、打印、复印机上。

Article seventeen

Management of telephone, fax, printer and copy machine

1. Confidential information can’t be used as double-side paper and it is not allowed to convey through

telephone and fax;

2. Telephone book needs to be kept carefully; it can’t be placed freely; throw it away if necessary;

3. Reconfirm the fax number when sending fax, and call the receiving end whether they have get the fax

after sending out. The materials after being faxed, printed and copied can’t be left on the fax machine,

Page 18 of 72

printer and copying machine.machine.

4. The materials after being faxed, printed and copied can’t be left on the fax machine, printer and copying

第十八条

信息事故发生的对应

1. 当含有公司信息的计算机、存储载体发生遗失、被盗等事故时,当事人应在第一时间向所属领导

报告,并如实填写《信息事故报告书》;

2. 信息管理员在接到信息事故报告后,必须协同相关部门调查事实和发生原因、确认损失程度,并

采取积极有效的措施,避免类似事故的再次发生;

3. 重大信息事故发生,除上述程序外,还应立即上报公安部门处理。

Article eighteen

Responses to the occurrence of an information accident

1. When the computers and、or storage carrier which contain company information are lost or stolen, the

responsible user shall report to the subordinated leader immediately and truthfully fill out the Information Accident Report;

2. Upon receipt of the information Accident report ,the IT department will cooperate with the relevant

departments to investigate the incident, the reason why it happened and confirm the extend of the loss as well as adopt pro-active and effective measures to prevent a similar accident to happen in the future;

3. The occurrence of major information accidents shall also be reported to the police immediately except

for the above procedures.

第六章 Chapter six

工作时间与休息休假

Working hour, rest and vacation

第一节 工作时间

Section one working hour

第十九条

出勤时间

公司经劳动行政部门许可后实行综合计算工时工作制、不定时工作制和标准工时工作制并存的工作制度,工作时间为正常班;

Page 19 of 72