02 Awareness of Information Security For New Employee)
02 Awareness of Information Security For New Employee)
02 Awareness of Information Security For New Employee)
Employee A in SSA Contract & Negotiation Dept, was found to collect nume
rous company confidential documents and send to personal mailbox. His co
nduct severely violated the Employee Business Conduct Guidelines (BCG)
and constituted level 1 violation of Company’s Information Security Regulati
ons.
The following decisions are made based upon the fact and in accordan
ce with the Regulations:
Employee A is to be dismissed from employment and will not be hired
by the Company again. The proven violation will be recorded in his personal
integrity file and his credit scores will be cleared. The Company reserves th
e right to take legal actions against him.
Case 2-Employee who lend his personal W3 account and password to
other person to download Huawei product information was dismissed
Employee B in SSA Wireless Network Dept, was found to lend his personal W3 ac
count and password to other person to download Huawei product information, he i
ntentionally concealed and denied the fact in the process of investigation. His con
duct severely violated the Employee Business Conduct Guidelines (BCG) and con
stituted level 1 violation of Company’s Information Security Regulations.
The following decisions are made based upon the fact and in accordance wit
h the Regulations:
Employee B is to be dismissed from employment and will not be hired by the
Company again. The proven violation will be recorded in his personal integrity file
and his credit scores will be cleared. The Company reserves the right to take legal
actions against him.
Case 3-Employee who steal company confidential information
by taking photos was dismissed
violation(Rescinding thethe
If you need to reinstall/recover labor contract)
operating system for work purpose,you ca
n use Huawei BDD reinstall system.
If you need to install a non-standard operating system and multiple operating
systems and a virtual operating system for work purpose,you may submit followi
ng application e-flow to your supervisor and director for approval.
http://w3.huawei.com/spa
Pay attention :
Without the approval,never use non-standard software(such as :
If you have installed MSN 、 Skype 、 Gtalk 、 iTunes 、 Dropbox 、 ICQ 、 Yahoo!Messenger 、 GoToMyP
C skype,Ipsmg
、 TrademManager ,FeiQ, Fetion,etc)
、 QQ 、 Ipsmg 、 FeiQ 、transfer corporate
Mikgo 、 Fetion document.
、 NETEASE POPO 、 Netmeeting etc non-st
andard software without approval, Please uninstall them immediately. Such behaviors have seriously violated
(according to the document classification level you transferred, and
'Security Management Regulations on Office Computers, Networks, Applications, Storage Media, and Perip
herals'. If employee who were found install Non-standard software without approval that will be punished according t
shall be punished level 1 violation maximum or level 3 violation
o ‘Regulations on Information Security Awards and Punishments’.
minimum.)
Note:If you need to install non-standard software for work purpose,you may submit following application e-fl
ow to your supervisor and director for approval.
http://w3.huawei.com/spa/softwareApply.do?method=createApply
ÀýÍâÊÂÏî˵Ã÷±í
Some work documents backup for work purpose, please use formal way
http://onebox.huawei.com
Note:
Without approval, it is prohibited use external network disk storage to
1.It's forbidden to upload non-working related documents to the backup s
save
pace, company
such documents,
as movies, such as:Dropbox,
photographs etc. Baidu cloud network
disk,Dbank,SkyDrive,Thunder
2.Top networktodisk,124
secret documents are not allowed save innetwork diskspace.
the backup
etc,according to the document classification level you copied, and
Attention:
1 、shall
Staffbeare
punished level 1to
only allowed violation
backup maximum(Rescinding the labor
their working documents on company
net contract
space if)orneeded.
level 3 violation minimum(Reducing the grade of
2 、performance appraisal).
Staff who backup their work documents to private storage or network
space shall seriously violate the information security regulations.
party
Email use security requirements: -------Level-1 violations
1. IfThe
employee
Email must who
includesend CONFIDENTIAL
a confidentiality statement. information to personal mailbox or any third
Please refer---
party. to The Email Automatic Installation Tool :
Signatureviolations
Level-2
http://w3.huawei.com/info/cn/doc/viewDoc.do?did=1387801&cata=250651
If employee who send INTERNAL information(such as: Training material,study
2. When sending top secret information or secret information to external parties for work purpose, it is necessary to get
material etc) to personal mailbox or any third party. --- Level-3 violations
the director's approval in advance and copy to director.
3. When sending confidential information to an external party for work purpose, copy to the director.
4. When sending internal public information to external parties for work purpose, the department can decide whether
it is necessary to copy it to director.
5. If receive chain mail or junk mail, please report to the IT hotline(Tel:0086-755-28560160) and refrain from forwardin
g.
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential 15
Information Security for printers, copiers, scanners and
fax machines etc office peripherals
Printers, copiers, scanners and fax machines etc office peripherals are only
used for Huawei work purpose, employees may not use them for any purpose unrelated
to Huawei business without permission.
Principles of printers, copiers, scanners and fax machines etc office peripherals
If employee who printed company’s secret or top documents without
use:
approval, or fail to take away them in time, he/she may be punished at
Employees may not print, copy, scan or fax secret or top secret documents without approval.
Paper documents containing secret or top secret information must be destroyed by shredders after using. It
least a Level- 3 Information Security Violation. (According to the printed
may not be reused for printing or copy other documents.
Taking away the papers immediately after printing.
documents confidential level and impacts ,it may be Level -1 or 2
The following rules must be adhered to when using the fax machine:
Information
When sending Security
a fax, theViolation.)
sender must first notify the receiver about the sending time. If
the information to be faxed is secret or top secret, the sender must request the receiver to
wait nearby the machine before sending.
When receiving a fax, the fax must be taken away immediately. If the information to be fa
xed is secret or top secret, wait it in advance.
Information extremely important to corporate operation management or containing sensitive materials, for example, roadmaps
of key products, marketing strategies, operations analysis reports, sale project list, commercial authorization and price
SECRET information. Such information will cause great losses to the benefits of Huawei and create wide impact if made publicly
available. Therefore, it can only be accessed by few people or designated positions.
Important or sensitive information about Huawei. Such information will cause certain level of losses to the benefits of Huawei
CONFIDENTIAL and create limited impact if made publicly available. Therefore, it can be shared within a staff team, department, or a specific
organization.
INTERNAL Information to be shared across Huawei but not to be made publicly available.
Individuals who stop the violations of others or A reward of CNY600 or 800 for individuals
report information leak/theft or other major (depending on particularities of the cases) and
security risks; teams that set an example or make Level 2 CNY2,000 for teams; public praise (the case shall
outstanding contribution to information security. be properly processed to protect the personnel
information of the informants)
Individuals who make contributions to information
security management, report security risks or
excessive defense behaviors which are verified,
propose reasonable suggestions on information A reward of CNY200 or 400 for individuals
security and have the suggestions adopted; teams Level 3 (depending on particularities of the cases) and
that make contributions to information security. CNY1,000 for teams; public praise
Level-1 violations
1. Selling the company's confidential information to any third party.
2. Using the company's confidential information for consulting and teaching purposes
outside the company without obtaining prior approval.
3. Unapproved transfer of the company's information with a security level of TOP SECRET
or key information assets to personal emails or copying of such information or assets
to personal storage devices.
4. Unapproved disclosure of the company's information with a security level of SECRET to
any third party.
5. Unapproved image, audio, or video capture of the company's large amounts of
information with a security level of CONFIDENTIAL.
6. Developing or deliberately running hacking and virus programs to attack the
company's networks or information systems.
Level-3 violations :
1. Unapproved transfer of information with a security level of CONFIDENTIAL to
employees' personal emails or copying of such information to personal storage
devices.
2. Unapproved uploading of the company's internal process documents to public
information systems or disclosure of such documents to any third party.
3. Unapproved acquisition of the company's information with a security level of
INTERNAL during the resignation process by sending the information to personal
emails or copying or printing such information.
4. Unapproved starting of computers storing the company's information with a security
level of INTERNAL using a personal USB flash drive or CD.
5. Unapproved transfer of information with a security level of TOP SECRET or key
information assets to unauthorized personnel within the company.
6. Unauthorized installing of two or more operating systems on a machine, with at least
one operating system uninstalled with security control systems as required by the
company.
7. Unapproved taking of faulty hard disks out of the company for repair.
8. Unapproved removal of computer seals or security chassis.
Level-4 violations:
1. Unauthorized copying of the company's information with a security level of INTERNAL, such as
process documents and internal training materials, to personal storage devices or information
systems.
2. Unapproved transfer of information with a security level of SECRET to unauthorized personnel
within the company.
3. Unapproved lending of personal information system accounts to people outside the company.
4. Unapproved possession of removed faulty hard disks without performing low-level formatting or
physically destroying them in accordance with corporate processes.
5. Failure to provide information as the information holder without justified reasons within five
working days after the information acquisition process has been approved.
6. Failure to take any rectification action within three working days after being notified by the IT
department in the case when the relevant computer (or system) is infected with viruses and
attacks other computers.
Data storage instruments, including floppy disk, CD, DVD, hard disk, flash
Storage media memory, U disk, CF card, SD card, MMC card, SM card, Memory Stick and
xD cards.
The third party in this document refers to any individual or organization other
3rd party than Huawei, information security violators and competitors.