Information security management system content
1. The files are stored in classified sub-directories and stored in designated locations.
2. Do not open or try to open other people’s files without the permission of the leader and others to avoid leakage of confidentiality or damage to the files.
3. Do not check or try to open emails or files from unknown sources to avoid viruses in your computer, and ask computer room personnel to check them as soon as possible.
4. If there are suspicious attachments in the email attachments, please use anti-virus software to check them in detail before using them, or ask OA center personnel to handle them.
5. Do not attempt unknown or unfamiliar computer operation procedures.
6. Do not delete files or programs on your computer or modify computer parameters.
7. After receiving meaningless emails, you should clear them promptly and do not reply to these emails deliberately or maliciously.
Commonly used shortcut keys for editing information security management systems
Alt+Shift+Up Arrow: Move the selected paragraph up
Alt+Shift+Down Arrow: Move the selected paragraph down
Alt+Shift+plus sign: Expand the text under the title
Alt+Shift+minus sign: Collapse the text under the title
Alt+Shift+A: Expand or collapse all text or titles
Slash (/) on numeric keypad: Hide or show character formatting
Alt+Shift+L: Display the first line of text or all text
Ctrl+Tab: Insert tab character
Ctrl+P: Print document
The editor recommends:
The information security management system is a free template. You can download the source file for you to edit, modify and replace. Huajun Software Park also providessales management system,Environmental management systemdownload.
it works
it works
it works