Current location - Loan Platform Complete Network - Local tax - 5 systematic self-inspection reports
5 systematic self-inspection reports
1. System self-inspection report

According to the Notice of Inner Mongolia Electric Power Group on Forwarding the Special Inspection of the Secondary System of the State Grid North China Electric Power Control Sub-center, combined with the actual situation of the electrical secondary system in our factory, in view of the operating conditions of the # 3-# 6 units, 220KV system and 500KV system equipment in Fengzhen Power Plant, especially the network-related equipment, the relevant relay protection personnel were arranged to conduct a comprehensive inspection, and the rectification plan was made for related problems. The self-inspection report is now reported as follows: 1.

1. Countermeasures management: All countermeasures documents issued by the State Grid and Inner Mongolia Power Grid of our factory are complete, and all relay protection devices and safety automatic devices meet the professional testing requirements issued by the State Administration.

2. Software version management: All software versions of line protection and generator-transformer group protection in our factory have ledgers, and all protection and safety automatic devices have upgrade records.

3. Maintenance management: the inspection records, standardized work instructions and work records of on-site relay protection equipment are complete and strictly implemented. The on-site inspection and protection work instructions are complete, but the on-site work records are incomplete and need to be rectified.

4. On-site operation and maintenance management: The on-site operation management procedures of the relay protection and safety automatic device are complete, and the daily inspection records of the protection are complete. The soft and hard input and output pressure plates of the relay protection and safety automatic device are consistent with the control mechanism, and the setting list is consistent with the control mechanism.

II. Management of relay protection equipment

1. Equipment account management: the equipment account records are complete, and the protection actions and abnormal analysis of records are complete, which meets the requirements.

2. Counter-measures documents are put in place, and the documents are complete, and the annual report and monthly report of protection are complete.

III. Safety automatic device

1. Safety control device software management: complete.

2. Safety control ledger management: Our factory has high-cycle cutting machine 1 set and distributed stabilizing device 1 set. The ledger is complete.

3. Inventory and management of security control system strategy; Our factory is distributed stably as the execution substation, and the strategy book is executed according to the execution station and the strategy of Inner Mongolia network dispatching. The high-cycle cutting machine has the execution record of the fixed value sheet, and the on-site printing is consistent with the fixed value sheet.

IV. Coordinated management of network sources

1. Parameters of network-related control system of key units: the test reports of excitation system, speed regulation, PSS, primary frequency modulation and phasing in our factory are complete, and the test items are complete.

2. Network-related protection parameters of key units: protection parameters and protection setting values are consistent with the system.

5. Operation and management of automation equipment in plants and stations

1.Power supply and operation environment of automation equipment in plant and station: the power supply of automation equipment in our plant meets the requirements, and the environment and fire-fighting facilities meet the requirements.

2. Safety protection of power secondary system in power plant and station: meet the requirements.

3. Automatic management of grid-connected units: AVC of units in our factory meets the requirements of regulations and procedures, and is put into actual operation according to the requirements of power grid dispatching. The AGC of units in our factory meets the requirements of regulations and codes.

VI. Automated Channel Data Network

1. Automatic communication channel: There are two automatic communication channels in our factory, and the two channels can be switched. The data network adopts an independent power dedicated communication network.

2. Secondary protection of dispatching data network and power system; The dispatching data network and the power secondary system are equipped with secondary physical isolation, which makes all areas safe.

VII. Problems found and their solutions

1, the in-plant protection device has not yet achieved the synchronization function, but the network control and each unit have installed the GPS device, and the synchronization function can be completed after the factory debugging recently.

2. The reclosing protection of the 550KV booster station in our factory has been inspected for overdue and out-of-service, but it has been applied for upgrading, and it can be replaced when the cost comes down.

2. System self-inspection report

In order to further standardize and strengthen the management of fixed assets in our bureau, consolidate the basic work of financial management, improve the management mechanism, ensure the integrity and safety of state-owned assets, thoroughly find out the financial situation, and give full play to the benefits of fixed assets, according to the requirements of the county finance bureau, our bureau has carefully organized the self-inspection of global fixed assets, and now makes the following report on the problems and their causes in the self-inspection process. I. Confirmation of Fixed Assets

According to the current fixed assets and low-value consumables management system of the Finance Bureau, at present, our bureau has defined and clearly defined the items with a value of 2,000 yuan or more, such as computer equipment, printers, cameras, machines, machinery, tools, office appliances and other items, as well as various police equipment items distributed by superiors and purchased by themselves.

Second, the main practice of self-examination

(a) the leadership attaches great importance to the organization. The leaders of our bureau attach great importance to this self-inspection work and regard it as one of the key tasks in the fourth quarter of 20 13. The police security office is generally responsible, and the heads of all departments cooperate with the fixed assets self-inspection team to organize and implement the self-inspection of the overall fixed assets, and the relevant functional departments, offices, institutes and teams have a clear division of labor.

(two) a clear division of labor, clear responsibilities. The self-inspection work is divided into four stages: preparation, self-inspection, summary and acceptance. The main work in the preparation stage is to set up a fixed assets self-inspection team and determine the scope and responsibilities of self-inspection.

(3) Step by step and reasonable arrangements. The key work of this self-examination falls on the self-examination stage and the summary stage. The main work in the self-inspection stage is that the self-inspection team conducts self-inspection and inventory of fixed assets and low-value consumables in the whole management office, determines the location and condition of assets, and truthfully fills in the fixed assets self-inspection system. For the fixed assets found in the self-inspection that need to be scrapped, reported for loss or taken for other disposal, it is required to find out the reasons and put forward suggestions for treatment. In the summary stage, the items with objections shall be counted and confirmed again. After confirmation, the "Fixed Assets Inventory Report Form" shall be filled in in detail, and the "Fixed Assets Inventory Report Form" shall be checked and confirmed by the respective inspection teams, and submitted to the self-inspection work leading group for review together with the self-inspection work summary.

Three, the main results of self-examination.

The leaders and departments of our bureau can attach great importance to the self-inspection work, and the main leaders personally grasp the implementation of this work.

After this self-examination, the main achievements are as follows: First, the basic information of our bureau's fixed assets physical management, low-value consumables and all kinds of police equipment items distributed by superiors and purchased by ourselves has been fully implemented, especially in view of the fact that some physical information is inconsistent with the information transferred from assets, our bureau has supplemented and revised the relevant information based on the on-site physical inventory. The second is to further improve the information registration of the financial fixed assets card and the use account of the user department, so that the account is consistent with the account card and the account. The third is to self-examine a number of scrapped fixed assets and various police equipment items. After this self-inspection, it is summarized and reported to the Finance Bureau for scrapping.

Fourth, the next step of asset management work ideas

(1) Improve the system. In the future, according to the new requirements of fixed assets management, our bureau will formulate practical and easy-to-operate fixed assets management measures.

(2) Clear responsibilities. Further clarify the responsibilities and authorities of various functional departments of fixed assets management, and establish a new mechanism with unified requirements, hierarchical management, each according to his ability and his own responsibilities.

(3) Strengthen management. Take the management of fixed assets as an important daily work of financial management, the use of fixed assets and management departments, constantly make unremitting efforts, standardize procedures, improve the entry and exit, improve accounts, certificates and cards, strengthen accounting, and ensure the consistency of fund accounts and physical accounts.

(4) Strict inspection. Each department shall conduct self-inspection on the fixed assets under its management once a year, and report the violations.

(5) Do a good job in implementation. Focus on daily management and system implementation. While strengthening daily management, the fixed assets management department should do a good job in supervision and inspection of the implementation of various systems, do a good job in coordination and convergence, supervise all departments to do a good job in implementation, and strive to raise the fixed assets management of the management office to a new level.

3. System self-inspection report

State-owned Assets Management Unit of Banner Finance Bureau: According to the requirements of the special inspection plan for state-owned assets management of administrative institutions in Banner 20xx, our unit conducted a self-inspection, and now the results of the self-inspection are reported as follows: 1. Daily management of state-owned assets: In accordance with the requirements of the Interim Measures for State-owned Assets Management of Administrative Institutions in Tongliao City, the system of checking, registering and reporting of state-owned assets was strictly implemented, fixed assets cards, general ledger and subsidiary account books were set up, and regular checks were made to update the management information of state-owned assets in time.

Ii. System establishment: It is to establish various rules and regulations for asset management, with internal control systems such as purchase, application, use and scrapping disposal.

III. Disposal of assets: go through the formalities of examination and approval or filing in accordance with regulations, and handle the accounts in a timely manner. The disposal income or residual value is included in the financial budget or residual value management according to the management principle of "two lines of revenue and expenditure", and there is no unauthorized disposal of state-owned assets.

Iv. dynamic management of assets: register asset cards in time and upload relevant asset data to the financial management department, realizing dynamic management and checking account books in time.

V. Lease and lending of assets: The unit has no lease and lending of state-owned assets.

Vi. registration of property rights of assets: there is no property rights registration certificate of state-owned assets.

VII. Management of confiscated assets: No confiscated assets.

4. System self-inspection report

I. General situation of information security At present, the network systems of our office are operating well, and classified information has not been stored or transmitted online, and there has been no negligence or leakage.

(A) leaders attach importance to the improvement of the system

1, in order to further strengthen the leadership of the government information security work in our office, an information security work leading group was established, with the director as the leader, the deputy leader in charge of the leadership and the heads of various departments as members. The office is in the General Department, and designated persons are responsible for the daily work. At the same time, the safety responsibility system, emergency plan, duty system, information release review system, government information disclosure system, confidentiality review system and accountability system have been established. There have been no safety accidents in recent years.

2. In order to ensure the effective and smooth development of our network information security work, our office requires all departments to seriously organize and study relevant laws, regulations and relevant knowledge of network information security, so that all staff can correctly understand the importance of information security work, master the requirements for the safe use of computers and correctly use computer networks and various information systems.

(B) strict requirements, measures in place

1, strengthen safety precautions. Our office has further strengthened security measures in strict accordance with the outstanding problems in website program upgrade, server hosting and website maintenance. First, the accounts, passwords and software patches of the information system of this unit were cleaned and checked once a week, updated and upgraded in time, and weak password and weak passwords were eliminated, and potential safety hazards were eliminated. Second, anti-virus software is installed on every computer, and virus killing is carried out regularly. Computers with loopholes in the operating system and inadequate anti-virus software configuration are resolutely disconnected from the network. When problems are found, they are reported and handled in time. Third, safety training has been given to users with computers in the unit, and the users, ip addresses and physical MAC addresses of each computer accessing the network have been registered and catalogued, which will be managed by the administrative office. In addition, confidential networks, confidential information systems and confidential computers are maintained and used by special personnel, and access to the Internet and cross-use with non-confidential mobile storage media are strictly prohibited to ensure information security.

2. Take special management measures. The first thing I do is to close or delete unnecessary applications, services, ports and links, limit vulnerability to attacks, and prohibit opening unnecessary websites. The second is to strictly review the information release to ensure the accuracy and authenticity of the published information. Strict implementation of information security regulations. It is strictly forbidden to process, store and transmit classified information on non-classified computers. It is forbidden to connect the office intranet with the Internet. It is strictly forbidden to use e-mail system to transmit confidential information on the Internet. It is strictly forbidden to publish or talk about confidential information in various forums, chat rooms, blogs, etc. It is strictly forbidden to use qq and other chat tools to transmit confidential information.

3. Implement the safety emergency plan and emergency drill. Our office has made all the preparations, and has a good idea of all kinds of possible information security incidents, further improved the information security emergency plan, defined the emergency handling process, and implemented the emergency technical support team, making the work deep and detailed. Actively organized emergency drills, tested the operability of emergency plans, and improved emergency response capabilities.

Second, the main problems found in the information security inspection and the rectification situation

(A) the main problems

1, insufficient awareness of information security. The information security education of cadres and workers is not enough, and they lack the initiative and consciousness to maintain information security.

2. Equipment maintenance and update are not timely enough.

3. There are few professional and technical personnel, the information system security force is limited, and the technical level of information system security needs to be improved.

4. The working mechanism of information system security needs to be further improved.

(2) The next rectification plan

According to the shortcomings found in the self-examination process and the actual situation of our office, we will focus on several aspects for rectification.

1, we should continue to strengthen the information security education for all cadres and workers, and improve the initiative and consciousness of doing a good job in security.

2. Strengthen the implementation of the information security system, check the implementation of the security system from time to time, and seriously pursue the responsibility for those responsible for adverse consequences, so as to improve the safety awareness of personnel.

3, to strengthen the training of professional information technology personnel, to further improve the technical level of information security, so that we can further strengthen the security and confidentiality of computer information systems.

4, to increase the maintenance of lines, systems, network equipment, at the same time, in view of the rapid development of information technology, to increase the intensity of system equipment update.

5. We should innovate and improve the working mechanism of information security, further standardize the office order and improve the security of information work.

Three, suggestions and opinions on information security inspection work

It is hoped that the municipal government can regularly organize training on information system security, so as to further improve the professional level of information system management staff and further strengthen the security prevention of information systems.

5. System self-inspection report

Our bureau opened the website of xxx medical insurance network in May, 20xx. Among them, medical insurance trends, open government affairs, policies and regulations, work guides and other columns are set up, and the special person is responsible for updating and maintaining them. Up to now, 302 pieces of various information have been updated. Since the opening of the website, the Information Network Section has been responsible for uploading and publishing all the policies, systems and commonly used forms that people care about to the website, and actively carrying out interactive exchanges such as online office and online Q&A, which provides a fast and efficient way for designated medical institutions and insured personnel to understand policies and handle matters. I. Computer information management

Since the beginning of this year, our bureau has strengthened organization and leadership, strengthened publicity and education, implemented work responsibilities, strengthened daily supervision and inspection, and grasped the management of classified computers. For the management of computer magnetic media (floppy disk, USB flash drive, mobile hard disk, etc.), special personnel are adopted to keep confidential files separately, and it is strictly forbidden to bring magnetic media with confidential contents to the computer on the Internet to process, store and transfer files, thus forming a good security and confidentiality environment. Classified computers (including notebook computers) have been physically isolated from the Internet and other public information networks, and security measures have been implemented in accordance with relevant regulations. So far, there has not been an accident of computer compromise or leakage; Other non-confidential computers (including notebook computers) and network use have also implemented relevant measures in strict accordance with the management measures of the bureau's computer security information system, ensuring the information security of the organs.

Second, the computer information network security situation

1 refers to network security. Our bureau is equipped with anti-virus software, network isolation card, and adopts security protection measures such as strong password, database storage and backup, mobile storage device management, data encryption, etc., which clarifies the network security responsibility and strengthens the network security work.

2, is the information system security implementation of leadership review sign batch system. Any information uploaded to the website must be reviewed and signed by the office before uploading; The second is to carry out regular security checks, mainly to supervise SQL injection attacks, cross-site scripting attacks, weak password, operating system patch installation, application patch installation, anti-virus software installation and upgrade, Trojan virus detection, port opening, system management authority opening, access authority opening, webpage tampering, etc., and earnestly keep a system security diary.

3. In terms of daily management, we should earnestly do a good job in the "five-layer management" of external networks, websites and application software, ensure that "confidential computers and business private networks are not connected to the Internet, and computers connected to the Internet are not classified", and handle the management, maintenance and destruction of optical disks, hard disks, USB flash drives and mobile hard disks in strict accordance with confidentiality requirements. Focus on the "three major security" investigations: First, hardware security, including lightning protection, fire prevention, theft prevention and power connection; The second is network security, including network structure, security log management, password management, IP management, Internet behavior management, etc. Third, application security, including website, mail system, resource management, software management, etc.

III. Operation and Maintenance of Hardware Equipment

Anti-virus software has been installed in every terminal of our bureau, and the application of system-related equipment has been standardized. The use of hardware equipment conforms to the relevant national product quality and safety regulations, the operating environment of unit hardware meets the requirements, and the basic equipment such as printer accessories and ribbon racks are original products; Since the beginning of this year, our bureau has actively implemented special funds for network security, equipped with network security hardware equipment, upgraded application servers, and strengthened network security measures. At present, the website system is safe and effective, and there have been no security risks.

Our bureau implements the management system of "who uses, who manages and who is responsible" for computers and their equipment. In terms of management, first, we insist on "managing people by system". The second is to strengthen information security education and improve the computer skills of cadres and workers. At the same time, the publicity of network security knowledge is carried out in the bureau, so that all cadres, workers and end users can deeply understand the importance of information network security and improve their consciousness of consciously maintaining network security applications and security awareness. In terms of equipment maintenance, our bureau has specially set up a network equipment fault register and a computer maintenance and repair table to register the equipment faults and maintenance and deal with them in time. For foreign maintenance personnel, it is required to be accompanied by relevant personnel, and their identity and handling situation should be registered to standardize the maintenance and management of equipment.

Iv. formulation and implementation of safety system

Our bureau has relevant requirements for website security. First, use the exclusive permission password lock to log in to the background; Second, upload files to detect pathogens in advance; Third, the website is maintained by modules and permissions, and regularly goes into the background to clean up junk files; Fourth, the website is updated by a special person. In order to ensure the safety of computer network, the system of network administrator, computer security system, website security management system and emergency plan for network information security emergencies have been implemented to effectively improve the work efficiency of administrators. At the same time, according to our own situation, our bureau has formulated management systems such as computer system safety self-inspection system, information system internal control system and information system emergency plan, so as to achieve four guarantees: first, system administrators regularly check the central computer system every Friday to ensure that there are no hidden dangers; The second is to make safety inspection records to ensure the implementation of the work; Third, the system of regular inquiry by leaders is implemented, and the system administrator reports the use of computers to ensure that the situation is always grasped; Fourth, regularly organize global personnel to learn about network knowledge, improve the level of computer use, and ensure prevention.

V. Problems existing in self-examination and rectification opinions

We found some weak links in the management process, and we will make improvements in the following aspects in the future.

(a) for the line is not neat, exposed, immediately rectification of the line within a time limit, and do a good job of rat prevention and fire safety.

(two) to strengthen equipment maintenance, timely replacement and maintenance of faulty equipment.

(3) During the self-examination, it was found that individual personnel were not aware of computer security. In the future work, we will continue to strengthen computer security awareness education and prevention skills training, so that employees can fully realize the seriousness of computer cases. The combination of civil air defense and technical defense does a good job in the network security of the unit.