Safety management personnel of equivalent insurance evaluation

Security manager

Personnel recruitment

a) Special departments or personnel should be designated or authorized to be responsible for personnel recruitment;

b) The identity, security background, professional qualifications or qualifications of the hired personnel should be reviewed, and their technical skills should be assessed;

c) A confidentiality agreement should be signed with the hired personnel, and a post responsibility agreement should be signed with the key personnel.

Staff leave

a) All access rights of the personnel who leave the post shall be terminated in time, and various identification documents, keys, badges, etc., as well as the software and hardware equipment provided by the organization shall be retrieved;

b) Must go through strict transfer procedures and promise to keep confidential after transfer before leaving.

Safety awareness education and training

a) All types of personnel should be given safety awareness education and job skills training, and related safety responsibilities and disciplinary measures should be notified;

b) Different training plans should be developed for different positions, and training on basic safety knowledge and job operating procedures should be carried out;

c) Skills assessment should be conducted on personnel in different positions on a regular basis.

External personnel access management

a) A written application should be made before external personnel physically visit the controlled area, and after approval, a special person should accompany it throughout the process and register it for the record;

b) A written application should be made before external personnel access the controlled network access system. After approval, a designated person will open an account, assign permissions, and register for the record;

c) All access rights of external personnel should be cleared in time after leaving the site;

d) External personnel who are authorized to access the system should sign a confidentiality agreement, and must not perform unauthorized operations, and must not copy or disclose any sensitive information.

Guess you like

Origin blog.csdn.net/weixin_45380284/article/details/113918358