Secretarial knowledge > Rules and regulations

Management method for the use of corporate laptops


In order to ensure the effective management and normal use of laptops, and to avoid the leakage of important files and company's trade secrets, this system has been specially formulated.
1. All computer of the company refers to all computers, including laptops and desktop computers, which are configured by the company's funds and used by the staff of various departments to complete their work tasks. Their use and management must be carried out according to the company's requirements.
2. The company arranges one desktop computer for each staff member who needs to use the computer as required. In addition to special needs such as business trips, the notebook computer is not used in other cases.
3. No one should bring the laptop out of the company for any reason when the desktop is not in place.
4. After the desktop computer is in place, the staff who originally configured the laptop must return the laptop to the company in time, check the required information, and back up and archive it in the file management department.
5. Those who need to use a laptop computer should apply for it one working day in advance, first approved by the department head, and then reported to the factory for approval, then apply for the borrowing procedure and execute the following methods:
Laptops are valuable and vulnerable items. During the use of the notebooks, be sure to take care to avoid squeezing and bumping, and keep away from water and fire and various chemicals. At the same time, be careful to keep it safe and beware of loss and theft. If the user fails to fulfill its due custody obligations and causes damage and other serious consequences, the responsible person shall bear the compensation expenses.
In the course of use, if there is a problem with the computer system, you should immediately contact the General Department to report the fault condition of the computer; without approval, you must not disassemble the computer hardware, add or subtract, modify the system program, etc. Violators, if found, will be dealt with in serious violations of the discipline, and therefore the system performance or hardware damage, should also bear the corresponding liability.
After the relevant licensee has finished using it, he should go to the General Department for the return procedure in time; if it is necessary to extend the use time due to work needs, he must first contact the General Department and obtain approval before extending the use. Otherwise, it must be returned within the specified time. If it is forcibly retained without approval, it is considered a serious violation of discipline.
After the user has finished using the computer, the relevant archives and information should be backed up, transferred and deleted in time. If the file is lost, damaged or leaked due to personal reasons, the responsible person shall bear the corresponding responsibility.
After the use of the recipients, they should be returned to the General Department in good condition and in the original quantity. If there is any abnormality, they should be explained in time. After the record is completed, the network management or related technical personnel will conduct the performance test and pass the test. After the transfer and return procedures are completed; if it is not explained to the administrative personnel department in advance or reported in time, the unqualified inspection shall be borne by the user unless the user can provide a reasonable and factual basis. Prove that you have no faults.
This system will be implemented as of the date of promulgation.

recommended article

popular articles