您的位置: 首页 » 法律资料网 » 法律法规 »

Guidelines on the Risk Management of Commercial Banks’ Information Technology

作者:法律资料网 时间:2024-07-04 13:00:14  浏览:9043   来源:法律资料网
下载地址: 点击此处下载

Guidelines on the Risk Management of Commercial Banks’ Information Technology ——附加英文版

China Banking Regulatory Commission


Guidelines on the Risk Management of Commercial Banks’ Information Technology





Chapter I General Provisions

Article 1. Pursuant to the Law of the People’s Republic of China on Banking Regulation and Supervision, the Law of the People's Republic of China on Commercial Banks, the Regulations of the People’s Republic of China on Administration of Foreign-funded Banks, and other applicable laws and regulations, the Guidelines on the Risk Management of Commercial Banks’ Information Technology (hereinafter referred to as the Guidelines) is formulated.

Article 2. The Guidelines apply to all the commercial banks legally incorporated within the territory of the People’s Republic of China.

The Guidelines may apply to other banking institutions including policy banks, rural cooperative banks, urban credit cooperatives, rural credit cooperatives, village banks, loan companies, financial asset management companies, trust and investment companies, finance firms, financial leasing companies, automobile financial companies and money brokers.


Article 3. The term “information technology” stated in the Guidelines shall refer to the system built with computer, communication and software technologies, and employed by commercial banks to handle business transactions, operation management, and internal communication, collaborative work and controls. The term also include IT governance, IT organization structure and IT policies and procedures.

Article 4. The risk of information technology refers to the operational risk, legal risk and reputation risk that are caused by natural factor, human factor, technological loopholes or management deficiencies when using information technology.

Article 5. The objective of information system risk management is to establish an effective mechanism that can identify, measure, monitor, and control the risks of commercial banks’ information system, ensure data integrity, availability, confidentiality and consistency, provide the relevant early warning, and thereby enable commercial banks’ business innovations, uplift their capability in utilizing information technology, improve their core competitiveness and capacity for sustainable development.



Chapter II IT governance

Article 6. The legal representative of commercial bank should be responsible to ensure compliance of this guideline.

Article 7. The board of directors of commercial banks should have the following responsibilities with respect to the management of information systems:
(1) Implementing and complying with the national laws, regulations and technical standards pertaining to the management of information systems, as well as the regulatory requirements set by the China Banking Regulatory Commission (hereinafter referred to as the “CBRC”);
(2) Periodically reviewing the alignment of IT strategy with the overall business strategies and significant policies of the bank, assessing the overall effectiveness and efficiency of the IT organization.
(3) Approving IT risk management strategies and policies, understanding the major IT risks involved, setting acceptable levels for these risks, and ensuring the implementation of the measures necessary to identify, measure, monitor and control these risks.
(4) Setting high ethical and integrity standards, and establishing a culture within the bank that emphasizes and demonstrates to all levels of personnel the importance of IT risk management.
(5) Establishing an IT steering committee which consists of representatives from senior management, the IT organization, and major business units, to oversee these responsibilities and report the effectiveness of strategic IT planning, the IT budget and actual expenditure, and the overall IT performance to the board of directors and senior management periodically.
(6) Establishing IT governance structure, proper segregation of duty, clear role and responsibility, maintaining check and balances and clear reporting relationship. Strengthening IT professional staff by developing incentive program.
(7) Ensuring that there is an effective internal audit of the IT risk management carried out by operationally independent, well-trained and qualified staff. The internal audit report should be submitted directly to the IT audit committee;
(8) Submitting an annual report to the CBRC and its local offices on information system risk management that has been reviewed and approved by the board of directors ;
(9) Ensuring the appropriating funding necessary for IT risk management works;
(10) Ensuring that all employees of the bank fully understand and adhere to the IT risk management policies and procedures approved by the board of directors and the senior management, and are provided with pertinent training.
(11) Ensuring customer information, financial information, product information and core banking system of the legal entity are held independently within the territory, and complying with the regulatory on-site examination requirements of CBRC and guarding against cross-border risk.
(12) Reporting in a timely manner to the CBRC and its local offices any serious incident of information systems or unexpected event, and quickly respond to it in accordance with the contingency plan;
(13) Cooperating with the CBRC and its local offices in the supervisory inspection of the risk management of information systems, and ensure that supervisory opinions are followed up; and
(14) Performing other related IT risk management tasks.

Article 8. The head of the IT organization, commonly known as the Chief Information Officer (CIO) should report directly to the president. Roles and responsibilities of the CIO should include the following:
(1) Playing a direct role in key decisions for the business development involving the use of IT in the bank;
(2) The CIO should ensure that information systems meet the needs of the bank, and IT strategies, in particular information system development strategies, comply with the overall business strategies and IT risk management policies of the bank;
(3) The CIO should also be responsible for the establishment of an effective and efficient IT organization to carry out the IT functions of the bank. These include the IT budget and expenditure, IT risk management, IT policies, standards and procedures, IT internal controls, professional development, IT project initiatives, IT project management, information system maintenance and upgrade, IT operations, IT infrastructure, Information security, disaster recovery plan (DRP), IT outsourcing, and information system retirement;
(4) Ensuring the effectiveness of IT risk management throughout the organization including all branches.
(5) Organizing professional trainings to improve technical proficiency of staff.
(6) Performing other related IT risk management tasks.

Article 9. Commercial banks should ensure that a clear definition of the IT organization structure and documentation of all job descriptions of important positions are always in place and updated in a timely manner. Staff in each position should meet relevant requirements on professional skills and knowledge. The following risk mitigation measures should be incorporated in the management program of related staff:
(1) Verification of personal information including confirmation of personal identification issued by government, academic credentials, prior work experience, professional qualifications;
(2) Ensuring that IT staff can meet the required professional ethics by checking character reference;
(3) Signing of agreements with employees about understanding of IT policies and guidelines, non-disclosure of confidential information, authorized use of information systems, and adherence to IT policies and procedures; and
(4) Evaluation of the risk of losing key IT personnel, especially during major IT development stage or in a period of unstable IT operations, and the relevant risk mitigation measures such as staff backup arrangement and staff succession plan.

Article 10. Commercial banks should establish or designate a particular department for IT risk management. It should report directly to the CIO and the Chief Risk Officer (or risk management committee), serve as a member of the IT incident response team, and be responsible for coordinating the establishment of policies regarding IT risk management, especially the areas of information security, BCP, and compliance with the CBRC regulations, advising the business departments and IT department in implementing these policies, providing relevant compliance information, conducting on-going assessment of IT risks, and ensuring the follow-up of remediation advice, monitoring and escalating management of IT threats and non-compliance events.

Article 11. Commercial banks should establish a special IT audit role and responsibility within internal audit function, which should put in place IT audit policies and procedures, develop and execute IT audit plan.

Article 12. Commercial banks should put in place policies and procedures to protect intellectual property rights according to laws regarding intellectual properties, ensure purchase of legitimate software and hardware, prevention of the use of pirated software, and the protection of the proprietary rights of IT products developed by the bank, and ensure that these are fully understood and complied by all employees.

Article 13. Commercial banks should, in accordance with relevant laws and regulations, disclose the risk profile of their IT normatively and timely.


Chapter III IT Risk Management

Article 14. Commercial banks should formulate an IT strategy that aligns with the overall business plan of the bank, IT risk assessment plan and an IT operational plan that can ensure adequate financial resources and human resources to maintain a stable and secure IT environment.

Article 15. Commercial banks should put in place a comprehensive set of IT risk management policies that include the following areas:
(1) Information security classification policy
(2) System development, testing and maintenance policy
(3) IT operation and maintenance policy
(4) Access control policy
(5) Physical security policy
(6) Personnel security policy
(7) Business Continuity Planning and Crisis and Emergency Management procedure

Article 16. Commercial banks should maintain an ongoing risk identification and assessment process that allows the bank to pinpoint the areas of concern in its information systems, assess the potential impact of the risks on its business, rank the risks, and prioritize mitigation actions and the necessary resources (including outsourcing vendors, product vendors and service vendors).

Article 17. Commercial banks should implement a comprehensive set of risk mitigation measures complying with the IT risk management policies and commensurate with the risk assessment of the bank. These mitigation measures should include:
(1) A set of clearly documented IT risk policies, technical standards, and operational procedures, which should be communicated to the staff frequently and kept up to date in a timely manner;
(2) Areas of potential conflicts of interest should be identified, minimized, and subject to careful, independent monitoring. Also it requires that an appropriate control structure is set up to facilitate checks and balances, with control activities defined at every business level, which should include:
- Top level reviews;
- Controls over physical and logical access to data and system;
- Access granted on “need to know” and “minimum authorization” basis;
- A system of approvals and authorizations; and
- A system of verification and reconciliation.

Article 18. Commercial banks should put in place a set of ongoing risk measurement and monitoring mechanisms, which should include
(1) Pre and post-implementation review of IT projects;
(2) Benchmarks for periodic review of system performance;
(3) Reports of incidents and complaints about IT services;
(4) Reports of internal audit, external audit, and issues identified by CBRC; and
(5) Arrangement with vendors and business units for periodic review of service level agreements (SLAs).
(6) The possible impact of new development of technology and new threats to software deployed.
(7) Timely review of operational risk and management controls in operation area.
(8) Assess the risk profile on IT outsourcing projects periodically.

Article 19. Chinese commercial banks operating offshore and the foreign commercial banks in China should comply with the relevant regulatory requirements on information systems in and outside the People’s Republic of China.


Chapter IV Information Security

Article 20. Information technology department of commercial banks should oversee the establishment of an information classification and protection scheme. All employees of the bank should be made aware of the importance of ensuring information confidentiality and provided with the necessary training to fully understand the information protection procedures within their responsibilities.

Article 21. Commercial banks should put in place an information security management function to develop and maintain an ongoing information security management program, promote information security awareness, advise other IT functions on security issues, serve as the leader of IT incident response team, and report the evaluation of the information security of the bank to the IT steering committee periodically. The Information security management program should include Information security standards, strategy, an implementation plan, and an ongoing maintenance plan.
Information security policy should include the following areas:
(1) IT security policy management
(2) Organization information security
(3) Asset management
(4) Personnel security
(5) Physical and environment security
(6) Communication and operation security
(7) Access control and authentication
(8) Acquirement, development and maintenance of information system
(9) Information security event management
(10) Business continuity management
(11) Compliance

Article 22. Commercial banks should have an effective process to manage user authentication and access control. Access to data and system should be strictly limited to authorized individuals whose identity is clearly established, and their activities in the information systems should be limited to the minimum required for their legitimate business use. Appropriate user authentication mechanism commensurate with the classification of information to be accessed should be selected. Timely review and removal of user identity from the system should be implemented when user transfers to a new job or leave the commercial bank.

Article 23. Commercial banks should ensure all physical security zones, such as computer centers or data centers, network closets, areas containing confidential information or critical IT equipment, and respective accountabilities are clearly defined, and appropriate preventive, detective, and recuperative controls are put in place.

Article 24. Commercial banks should divide their networks into logical security domains (hereinafter referred to as the “domain”) with different levels of security. The following security factors have to be assessed in order to define and implement effective security controls, such as physical or logical segregation of network, network filtering, logical access control, traffic encryption, network monitoring, activity log, etc., for each domain and the whole network.
(1) criticality of the applications and user groups within the domain;
(2) Access points to the domain through various communication channels;
(3) Network protocols and ports used by the applications and network equipment deployed within the domain;
(4) Performance requirement or benchmark;
(5) Nature of the domain, i.e. production or testing, internal or external;
(6) Connectivity between various domains; and
(7) Trustworthiness of the domain.

Article 25. Commercial banks should secure the operating system and system software of all computer systems by
(1) Developing baseline security requirement for each operating system and ensuring all systems meet the baseline security requirement;
(2) Clearly defining a set of access privileges for different groups of users, namely, end-users, system development staff, computer operators, and system administrators and user administrators;
(3) Setting up a system of approval, verification, and monitoring procedures for using the highest privileged system accounts;
(4) Requiring technical staff to review available security patches, and report the patch status periodically; and
(5) Requiring technical staff to include important items such as unsuccessful logins, access to critical system files, changes made to user accounts, etc. in system logs, monitors the systems for any abnormal event manually or automatically, and report the monitoring periodically.

Article 26. Commercial banks should ensure the security of all the application systems by
(1) Clearly defining the roles and responsibilities of end-users and IT staff regarding the application security;
(2) Implementing a robust authentication method commensurate with the criticality and sensibility of the application system;
(3) Enforcing segregation of duties and dual control over critical or sensitive functions;
(4) Requiring verification of input or reconciliation of output at critical junctures;
(5) Requiring the input and output of confidential information are handled in a secure manner to prevent theft, tampering, intentional leakage, or inadvertent leakage;
(6) Ensuring system can handle exceptions in a predefined way and provide meaningful message to users when the system is forced to terminate; and
(7) Maintaining audit trail in either paper or electronic format.
(8) Requiring user administrator to monitor and review unsuccessful logins and changes to users accounts.

Article 27. Commercial banks should have a set of policies and procedures controlling the logging of activities in all production systems to support effective auditing, security forensic analysis, and fraud prevention. Logging can be implemented in different layers of software and on different computer and networking equipment, which falls into two broad categories:
(1) Transaction journals. They are generated by application software and database management system, and contain authentication attempts, modification to data, error messages, etc. Transaction journals should be kept according to the national accounting policy.
(2) System logs. They are generated by operating systems, database management system, firewalls, intrusion detection systems, and routers, etc., and contain authentication attempts, system events, network events, error messages, etc. System logs should be kept for a period scaled to the risk classification, but no less than one year.
Banks should ensure that sufficient items be included in the logs to facilitate effective internal controls, system troubleshooting, and auditing while taking appropriate measures to ensure time synchronization on all logs. Sufficient disk space should be allocated to prevent logs from being overwritten. System logs should be reviewed for any exception. The review frequency and retention period for transaction logs or database logs should be determined jointly by IT organization and pertinent business lines, and approved by the IT steering committee.

Article 28. Commercial banks should have the capacity to employ encryption technologies to mitigate the risk of losing confidential information in the information systems or during its transmission. Appropriate management processes of the encryption facilities should be put in place to ensure that
(1) Encryption facilities in use should meet national security standards or requirements;
(2) Staff in charge of encryption facilities are well trained and screened;
(3) Encryption strength is adequate to protect the confidentiality of the information; and
(4) Effective and efficient key management procedures, especially key lifecycle management and certificate lifecycle management, are in place.

Article 29. Commercial banks should put in place an effective and efficient system of securing all end-user computing equipment which include desktop personal computers (PCs), portable PCs, teller terminals, automatic teller machines (ATMs), passbook printers, debit or credit card readers, point of sale (POS) terminals, personal digital assistant (PDAs), etc and conduct periodic security checks on all equipments.

Article 30. Commercial banks should put in place a set of policies and procedures to govern the collection, processing, storage, transmission, dissemination, and disposal of customer information.

Article 31. All employees, including contract staff, should be provided with the necessary trainings to fully understand these policies procedures and the consequences of their violation. Commercial banks should adopt a zero tolerance policy against security violation.


Chapter V Application System Development, Testing and Maintenance

Article 32. Commercial banks should have the capability to identify, plan, acquire, develop, test, deploy, maintain, upgrade, and retire information systems. Policies and procedures should be in place to govern the initiation, prioritization, approval, and control of IT projects. Progress reports of major IT projects should be submitted to and reviewed by the IT steering committee periodically. Decisions involving significant change of schedule, change of key personnel, change of vendors, and major expenditures should be included in the progress report.

Article 33. Commercial banks should recognize the risks associated with IT projects, which include the possibilities of incurring various kinds of operational risk, financial losses, and opportunity costs stemming from ineffective project planning or inadequate project management controls of the bank. Therefore, appropriate project management methodologies should be adopted and implemented to control the risks associated with IT projects.

Article 34. Commercial banks should adopt and implement a system development methodology to control the life cycle of Information systems. The typical phases of system life cycle include system analysis, design, development or acquisition, testing, trial run, deployment, maintenance, and retirement. The system development methodology to be used should be commensurate with the size, nature, and complexity of the IT project, and, generally speaking, should facilitate the management of the following risks.

Article 35. Commercial banks should ensure system reliability, integrity, and maintainability by controlling system changes with a set of policies and procedures, which should include the following elements.
(1) Ensure that production systems are separated from development or testing systems;
(2) Separating the duties of managing production systems and managing development or testing systems;
(3) Prohibiting application development and maintenance staff from accessing production system under normal circumstances unless management approval is granted to perform emergency repair, and all emergency repair activities should be recorded and reviewed promptly;
(4) Promoting changes of program or system configuration from development and testing systems to production systems should be jointly approved by IT organization and business departments, properly documented, and reviewed periodically.

Article 36. Commercial banks should have in place a set of policies, standards, and procedures to ensure data integrity, confidentiality, and availability. These policies should be in accordance with data integrity amid IT development procedure.

Article 37. Commercial banks should ensure that Information system problems could be tracked, analyzed, and resolved systematically through an effective problem management process. Problems should be documented, categorized, and indexed. Support services or technical assistance from vendors, if necessary, should also be documented. Contacts and relevant contract information should be made readily available to the employees concerned. Accountability and line of command should be delineated clearly and communicated to all employees concerned, which is of utmost importance to performing emergency repair.

Article 38. Commercial banks should have a set of policies and procedures controlling the process of system upgrade. System upgrade is needed when the hardware reaches its lifespan or runs out of capacity, the underpinning software, namely, operating system, database management system, middleware, has to be upgraded, or the application software has to be upgraded. The system upgrade should be treated as a project and managed by all pertinent project management controls including user acceptance testing.


Chapter VI IT Operations

Article 39. Commercial banks should consider fully the environmental threats (e.g. proximity to natural disaster zones, dangerous or hazardous facilities or busy/major roads) when selecting the locations of their data centers. Physical and environmental controls should be implemented to monitor environmental conditions could affect adversely the operation of information processing facilities. Equipment facilities should be protected from power failures and electrical supply interference.

Article 40. In controlling access by third-party personnel (e.g. service providers) to secured areas, proper approval of access should be enforced and their activities should be closely monitored. It is important that proper screening procedures including verification and background checks, especially for sensitive technology-related jobs, are developed for permanent and temporary technical staff and contractors.

Article 41. Commercial banks should separate IT operations or computer center operations from system development and maintenance to ensure segregation of duties within the IT organization. The commercial banks should document the roles and responsibilities of data center functions.

Article 42. Commercial banks are required to retain transactional records in compliance with the national accounting policy. Procedures and technology are needed to be put in place to ensure the integrity, safekeeping and retrieval requirements of the archived data.



Article 43. Commercial banks should detail operational instructions such as computer operator tasks, job scheduling and execution in the IT operations manual. The IT operations manual should also cover the procedures and requirements for on-site and off-site backup of data and software in both the production and development environments (i.e. frequency, scope and retention periods of back-up).

Article 44. Commercial banks should have in place a problem management and processing system to respond promptly to IT operations incidents, to escalate reported incidents to relevant IT management staff and to record, analyze and keep tracks of all these incidents until rectification of the incidents with root cause analysis completed. A helpdesk function should be set up to provide front-line support to users on all technology-related problems and to direct the problems to relevant IT functions for investigation and resolution.

Article 45. Commercial banks should establish service level agreement and assess the IT service level standard attained.

Article 46. Commercial banks should implement a process to ensure that the performance of application systems is continuously monitored and exceptions are reported in a timely and comprehensive manner. The performance monitoring process should include forecasting capability to enable exceptions to be identified and corrected before they affect system performance.

Article 47. Commercial banks should carry out capacity plan to cater for business growth and transaction increases due to changes of economic conditions. Capacity plan should be extended to cover back-up systems and related facilities in addition to the production environment.

Article 48. Commercial banks should ensure the continued availability of technology related services with timely maintenance and appropriate system upgrades. Proper record keeping (including suspected and actual faults and preventive and corrective maintenance records) is necessary for effective facility and equipment maintenance.

Article 49. Commercial banks should have an effective change management process in place to ensure integrity and reliability of the production environment. Commercial banks should develop a formal change management process.


Chapter VII Business Continuity Management

Article 50. Commercial banks should have in place appropriate arrangements, having regard to the nature, scale and complexity of its business, to ensure that it can continue to function and meet its regulatory obligations in the event of an unforeseen interruption. These arrangements should be regularly updated and tested to ensure their effectiveness.

Article 51. Commercial banks should consider the likelihood and impact of a disruption to the continuity of its operation from unexpected events. This should include assessing the disruptions to which it is particularly susceptible including but not limited to:
(1) Loss of failure of internal and external resources (such as people, systems and other assets);
(2) The loss or corruption of its information; and
(3) External events (such as war, earthquake, typhoon, etc).

Article 52. Commercial bank should act to reduce both the likelihood of disruptions (including system resilience and dual processing); and the impact of disruptions (including by contingency arrangements and insurance).

Article 53. Commercial bank should document its strategy for maintaining continuity of its operations, and its plans for communicating and regularly testing the adequacy and effectiveness of this strategy. Commercial bank should establish:
(1) Formal business continuity plans that outline arrangements to reduce the impact of a short, medium and long-term disruption, including:
a) Resource requirements such as people, systems and other assets, and arrangements for obtaining these resources;
b) The recovery priorities for the commercial bank’s operations; and
c) Communication arrangements for internal and external concerned parties (including CBRC, clients and the press);
(2) Escalation and invocation plans that outline the processes for implementing the business continuity plans, together with relevant contact information;
(3) Processes to validate the integrity of information affected by the disruption;
(4) Processes to review and update (1) to (3) following changes to the commercial bank’s operations or risk profile.

Article 54. A final BCP plan and an annual drill result must be signed off by the IT Risk management, or internal auditor and IT Steering Committee.


Chapter VIII Outsourcing

Article 55. Commercial banks cannot contract out its regulatory obligations and should take reasonable care to supervise the discharge of outsourcing functions.

Article 56. Commercial banks should take particular care to manage material outsourcing arrangement (such as outsourcing of data center, IT infrastructure, etc.), and should notify CBRC when it intends to enter into material outsourcing arrangement.

Article 57. Before entering into, or significantly changing, an outsourcing arrangement, the commercial bank should:
(1) Analyze how the arrangement will fit with its organization and reporting structure; business strategy; overall risk profile; and ability to meet its regulatory obligations;
(2) Consider whether the arrangements will allow it to monitor and control its operational risk exposure relating to the outsourcing;
(3) Conduct appropriate due diligence of the service provider’s financial stability, expertise and risk assessment of the service provider, facilities and ability to cover the potential liabilities;
(4) Consider how it will ensure a smooth transition of its operations from its current arrangements to a new or changed outsourcing arrangement (including what will happen on the termination of the contract); and
(5) Consider any concentration risk implications such as the business continuity implications that may arise if a single service provider is used by several firms.

Article 58. In negotiating its contract with a service provider, the commercial bank should have regard to ( but not limited to ):
(1) Reporting and negotiation requirements it may wish to impose on the service provider;
(2) Whether sufficient access will be available to its internal auditors, external auditors and banking regulators;
(3) Information ownership rights, confidentiality agreements and Firewalls to protect client and other information (including arrangements at the termination of contract);
(4) The adequacy of any guarantees and indemnities;
(5) The extent to which the service provider must comply with the commercial bank’s polices and procedures covering IT Risk;
(6) The extent to which the service provider will provide business continuity for outsourced operations, and whether exclusive access to its resources is agreed;
(7) The need for continued availability of software following difficulty at a third party supplier;
(8) The processes for making changes to the outsourcing arrangement and the conditions under which the commercial bank or service provider can choose to change or terminate the outsourcing arrangement, such as where there is:
a) A change of ownership or control of the service provider or commercial bank; or
b) Significant change in the business operations of the service provider or commercial bank; or
c) Inadequate provision of services that may lead to the commercial bank being unable to meet its regulatory obligations.

Article 59. In implementing a relationship management framework, and drafting the service level agreement with the service provider, the commercial bank should have regarded to (but not limited to):
(1) The identification of qualitative and quantitative performance targets to assess the adequacy of service provision, to both the commercial bank and its clients, where appropriate;
(2) The evaluation of performance through service delivery reports and periodic self assessment and independent review by internal or external auditors; and
(3) Remediation action and escalation process for dealing with inadequate performance.

Article 60. The commercial bank should enhance IT related outsourcing management, in place following (not limited to ) measures to ensure data security of sensitive information such as customer information:
(1) Effectively separated from other customer information of the service provider;
(2) The related staff of service provider should be authorized on “need to know” and “minimum authorization” basis;
(3) Ensure service provider guarantee its staff for meeting the confidential requests;
(4) All outsourcing arrangements related to customer information should be identified as material outsourcing arrangements and the customers should be notified;
(5) Strictly monitor re-outsourcing actions of the service provider, and implement adequate control measures to ensure information security of the bank;
(6) Ensure all related sensitive information be refunded or deleted from the service provider’s storage when terminating the outsourcing arrangement.


Article 61. The commercial bank should ensure that it has appropriate contingency in the event of a significant loss of services from the service provider. Particular issues to consider include a significant loss of resources, turnover of key staff, or financial failure of, the service provider, and unexpected termination of the outsourcing agreement.

Article 62. All outsourcing contracts must be reviewed or signed off by IT Risk management, internal IT auditors, legal department and IT Steering Committee. There should be a process to periodically review and refine the service level agreements.


Chapter IX Internal Audit

Article 63. Depending on the nature, scale and complexity of its business, it may be appropriate for the commercial banks to delegate much of the task of monitoring the appropriateness and effectiveness of its systems and controls to an internal audit function. An internal audit function should be adequately resourced and staffed by competent individuals, be independent of the day-to-day activities of the commercial bank and have appropriate access to the bank’s records.

Article 64. The responsibilities of the internal IT audit function are:
(1) To establish, implement and maintain an audit plan to examine and evaluate the adequacy and effectiveness of the bank’s systems and internal control mechanisms and arrangements;
(2) To issue recommendations based on the result of work carried out in accordance with 1;
(3) To verify compliance with those recommendations;
(4) To carry out special audit on information technology. The term “special audit” of information technology refers to the investigation, analysis and assessment on the security incidents of the information system, or the audit performed on a special subject based on IT risk assessment result as deemed necessary by the audit department.

Article 65. Based on the nature, scale and complexity of its business, deployment of information technology and IT risk assessment, commercial banks could determine the scope and frequency of IT internal audit. However, a comprehensive IT internal audit shall be performed at a minimum once every 3 years.

Article 66. Commercial banks should engage its internal audit department and IT Risk management department when implementing system development of significant size and scale to ensure it meets the IT Risk standards of the Commercial banks.


Chapter X External Audit

Article 67. The external information technology audit of commercial banks can be carried out by certified service providers in accordance with laws, rules and regulations.

Article 68. The commercial bank should ensure IT audit service provider to review and examine bank’s hardware, software, documentation and data to identify IT risk when they are commissioned to perform the audit. Vital commercial and technical information which is protected by national laws and regulations should not be reviewed.

Article 69. Commercial bank should communicate with the service provider in depth before the audit to determine audit scope, and should not withhold the truth or do not corporate with the service provider intentionally.

Article 70. CBRC and its local offices could designate certified service providers to carry out IT audit or related review on commercial banks when needed. When carrying out audit on commercial banks, as commissioned or authorized by CBRC or its local offices, the service providers shall present the letter of authority, and carry out the audit in accordance to the scope prescribed in the letter of authority.

Article 71. Once the IT audit report produced by the service providers is reviewed and approved by CBRC or its local offices, the report will have the same legal status as if it is produced by the CBRC itself. Commercial banks should come up with a correction action plan prescribed in the report and implement the corrective actions according to the timeframe.

Article 72. Commercial banks should ensure the service providers to strictly comply with laws and regulations to keep confidential and data security of any commercial secrets and private information learnt and IT risk information when conducting the audit. The service provider should not modify copy or take away any documents provided by the commercial banks.


Chapter XI Supplementary Provisions

Article 73. Commercial banks with no board of directors should have their operating decision-making bodies perform the responsibilities of the board with regard to IT risk management specified herein.

Article 74. The China Banking Regulatory Commission supervises and regulates the IT risk management of commercial banks under its authority by law.

Article 75. The power of interpretation and modification of the Guidelines shall rest with the China Banking Regulatory Commission.

Article 76. The Guidelines shall become effective as of the date of its issuance and the former Guidelines on the Risk Management of Banking Institutions’ Information Systems shall be revoked at the same time.


下载地址: 点击此处下载

关于加强网络游戏虚拟货币管理工作通知

文化部 商务部


关于加强网络游戏虚拟货币管理工作通知

  文市发〔2009〕20号


  各省、自治区、直辖市文化厅(局)、商务厅(局),新疆生产建设兵团文化局、商务局,北京市、天津市、上海市、重庆市、宁夏回族自治区文化市场行政执法总队:

  近年来,随着网络游戏的迅速发展,网络游戏虚拟货币广泛应用于网络游戏经营服务之中。网络游戏虚拟货币在促进网络游戏产业发展的同时,也带来了新的经济和社会问题。主要体现在:一是用户权益缺乏保障;二是市场行为缺乏监管;三是网络游戏虚拟货币在使用中引发的纠纷不断。

  为规范网络游戏市场经营秩序,根据《互联网文化管理暂行规定》、《关于进一步加强网吧及网络游戏管理工作的通知》(文市发[2007]10号)和《关于规范网络游戏经营秩序查禁利用网络游戏赌博的通知》(公通字[2007]3号)等文件精神,经商中国人民银行等部门同意,现就加强网络游戏虚拟货币管理工作通知如下。

  一、严格市场准入,加强主体管理

  (一)本通知所称的网络游戏虚拟货币,是指由网络游戏运营企业发行,游戏用户使用法定货币按一定比例直接或间接购买,存在于游戏程序之外,以电磁记录方式存储于网络游戏运营企业提供的服务器内,并以特定数字单位表现的一种虚拟兑换工具。网络游戏虚拟货币用于兑换发行企业所提供的指定范围、指定时间内的网络游戏服务,表现为网络游戏的预付充值卡、预付金额或点数等形式,但不包括游戏活动中获得的游戏道具。

  (二)文化行政部门要严格市场准入,加强对网络游戏虚拟货币发行主体和网络游戏虚拟货币交易服务提供主体的管理。从事“网络游戏虚拟货币发行服务”和“网络游戏虚拟货币交易服务”业务的,依据《国务院对确需保留的行政审批项目设定行政许可的决定》(国务院第412号令)和《互联网文化管理暂行规定》管理。凡提供上述两项服务的企业,须符合设立经营性互联网文化单位的有关条件,向企业所在地省级文化行政部门提出申请,省级文化行政部门初审后报文化部审批。“网络游戏虚拟货币发行企业”是指发行并提供虚拟货币使用服务的网络游戏运营企业。“网络游戏虚拟货币交易服务企业”是指为用户间交易网络游戏虚拟货币提供平台化服务的企业。同一企业不得同时经营以上两项业务。

  (三)企业申请从事“网络游戏虚拟货币发行服务”业务的,除依法提交相关材料外,须在业务发展报告中提交虚拟货币表现形式、发行范围、单位购买价格、终止服务时的退还方式、用户购买方式(含现金、银行卡、网上支付等购买方式)、用户权益保障措施、技术安全保障措施等内容。

  (四)从事“网络游戏虚拟货币交易服务”业务须符合商务主管部门关于电子商务(平台)服务的有关规定。此类企业在提出申请时,除依法提交的材料外,须在业务发展报告中提交服务(平台)模式、用户购买方式(含现金、银行卡、网上支付等购买方式)、用户权益保障措施、用户账号与实名银行账户绑定情况、技术安全保障措施等内容。

  (五)已经从事网络游戏虚拟货币发行或交易服务的企业,应在本通知印发之日起3个月内,向文化行政部门申请相关经营业务。逾期未申请的,由文化行政部门按照《互联网文化管理暂行规定》予以查处。文化行政部门批准文件抄送商务部和中国人民银行。

  二、规范发行和交易行为,防范市场风险

  (六)网络游戏运营企业应当依据自身的经营状况和产品营运情况,适量发行网络游戏虚拟货币。严禁以预付资金占用为目的的恶意发行行为。网络游戏运营企业发行虚拟货币总量等情况,须按季度报送企业所在地省级文化行政部门。

  (七)除利用法定货币购买之外,网络游戏运营企业不得采用其它任何方式向用户提供网络游戏虚拟货币。在发行网络游戏虚拟货币时,网络游戏运营企业必须保存用户的充值记录。该记录保存期自用户充值之日起不少于180天。

  (八)网络游戏虚拟货币的使用范围仅限于兑换发行企业自身所提供的虚拟服务,不得用以支付、购买实物产品或兑换其它企业的任何产品和服务。

  (九)网络游戏运营企业应采取必要的措施和申诉处理程序措施保障用户的合法权益,并在企业向用户提供服务的网站上显著位置进行说明。

  (十)用户在网络游戏虚拟货币的使用过程中出现纠纷的,应出示与所注册的身份信息相一致的个人有效身份证件。网络游戏运营企业在核实用户身份后,应提供虚拟货币充值和转移记录,按照申诉处理程序处理。用户合法权益受到侵害时,网络游戏运营企业应积极协助进行取证和协调解决。

  (十一)网络游戏运营企业计划终止其产品和服务提供的,须提前60天予以公告。终止服务时,对于用户已经购买但尚未使用的虚拟货币,网络游戏运营企业必须以法定货币方式或用户接受的其它方式退还用户。

  网络游戏因停止服务接入、技术故障等网络游戏运营企业自身原因连续中断服务30天的,视为终止。

  (十二)网络游戏运营企业不得变更网络游戏虚拟货币的单位购买价格,在新增虚拟货币发行种类时,需根据本通知第三条所列材料内容报文化行政部门备案。

  (十三)网络游戏运营企业不支持网络游戏虚拟货币交易的,应采取技术措施禁止网络游戏虚拟货币在用户账户之间的转移功能。

  (十四)网络游戏虚拟货币交易服务企业在提供网络游戏虚拟货币相关交易服务时,须规定出售方用户使用有效身份证件进行实名注册,并要求其绑定与实名注册信息一致的境内银行帐户。网络游戏虚拟货币交易服务企业必须保留用户间的相关交易记录和账务记录,保留期自交易行为发生之日起不少于180天。

  (十五)网络游戏虚拟货币交易服务企业要建立违法交易责任追究制度和技术措施,严格甄别交易信息的真伪,禁止违法交易。在明知网络游戏虚拟货币为非法获取或接到举报并核实的,应及时删除虚假交易信息和终止提供交易服务。

  (十六)网络游戏虚拟货币交易服务企业不得为未成年人提供交易服务。

  (十七)网络游戏虚拟货币发行企业和交易服务企业应积极采取措施保护个人信息安全,在相关部门依法调查时,必须积极配合,并提供相关记录。

  (十八)网络游戏运营企业提供用户间虚拟货币转移服务的,应采取技术措施保留转移记录,相关记录保存时间不少于180天。

  三、加强市场监管,严厉打击利用虚拟货币从事赌博等违法犯罪行为

  (十九)各地要按照公安部、文化部等部门《关于规范网络游戏经营秩序查禁利用网络游戏赌博的通知》(公通字[2007]3号)的要求,配合公安机关从严整治带有赌博色彩的网络游戏,严厉打击利用网络游戏虚拟货币从事赌博的违法犯罪行为。

  (二十)网络游戏运营企业不得在用户直接投入现金或虚拟货币的前提下,采取抽签、押宝、随机抽取等偶然方式分配游戏道具或虚拟货币。

  (二十一)网络游戏虚拟货币发行和交易服务企业应积极配合管理部门,采取技术手段打击“盗号”、“私服”、“外挂”等。

  (二十二)对经文化部认定的网络游戏“私服”、“外挂”网站上提供网上支付服务的,由文化部通报中国人民银行。

  四、加大执法力度,净化市场环境

  (二十三)对未经许可,擅自从事网络游戏虚拟货币发行和交易服务的企业,由省级以上文化行政部门依据《互联网文化管理暂行规定》予以查处。

  (二十四)对违反本通知要求的网络游戏虚拟货币发行和交易服务企业,由文化行政部门、商务主管部门通知其限期整改。逾期未整改的,由有关部门依法予以查处。

  (二十五)建立网络游戏虚拟货币管理工作协调机制,加大对“盗号”、“私服”、“外挂”、非法获利、洗钱等违法行为的打击力度。各部门应定期沟通,协调配合,及时通报有关情况,在各自职责范围内做好网络游戏虚拟货币的管理工作。

  (二十六)网络游戏运营企业所发行的网络游戏虚拟货币不得与游戏内道具名称重合。网络游戏内道具的管理规定由国务院文化行政部门会同有关部门另行制订。

   特此通知。

   文 化 部 商 务 部

  二○○九年六月四日

福建省人事厅关于印发《自主择业的军队转业干部退役金发放管理办法》的通知

福建省人事厅


关于印发《自主择业的军队转业干部退役金发放管理办法》的通知

国转联(2001)9号


关于印发《自主择业的军队转业干部退役金发放管理办法》的通知

 

各省、 自治区、直辖市和计划单列市军队转业干部安置工作小组,人事厅(局)、财政厅(局):

  自主择业的军队转业干部退役金发放与管理工作,是军队转业干部安置制度改革的重要环节,对于继续深化军队转业干部安置制度改革具有重要意义。各地各有关部门要高度重视,加强领导,密切配合,做好工作。现将《自主择业的军队转业干部退役金发放管理办法》印发你们,请遵照执行。



                     二○○一年十二月十三日





自主择业的军队转业干部退役金发放管理办法



  第一章  总   则

  第一条 为了适应军队转业干部安置制度改革的需要,建立自主择业的军队转业干部退役金预算、拨款、支付的正常运行机制,确保自主择业的军队转业干部退役金的按时、安全、足额发放,根据《中共中央、国务院、中央军委关于印发〈军队转业干部安置暂行办法〉的通知(中发[2001]3号)、国务院军队转业干部安置工作小组等13个部门《关于自主择业的军队转业干部安置管理若干问题的意见》(国转联[2001]8号)和国家财政管理的规定,制定本办法。



  第二条 退役金由中央财政专项安排,参照公务员统发工资办法,由军转、则政部门委托国有商业银行(即代发银行)直接拨付到个人帐户。退役金发放实行“军转部门核准人数、核定标准、编制预算,则政部门拨付经费,银行代发到人”的管理办法。



  第三条 各级军转、财政部门和代发银行应密切协作,各负其责,切实做好退役金发放管理工作。



                  第二章 主管部门职责



  第四条 退役金管理工作实行分级负责制。国务院有关部门负责编制预算、核拨经费、进行决算、监督检查。省、自治区、直辖市、计划单列市(以下简称省级)有关部门负责本地区退役金的核定、预(决)算、申报、发放确认、停发审批和监督等,地(市)有关部门负责退役金的发放、统计及日常管理等事宜。

  第五条 省级军转部门负责自主择业的军队转业干部退役金的核定、统计、预(决)算、申报、审核,建立人员和退役金数据库,会同财政部门与代发银行办理退役金发放事宜。向财政部门提供退役金发放清单,向个人出具退役金明细单。

  第六条 省级财政部门按照军转部门核准的应发退役金的人数和标准,负责退役金预算的审核和资金拨付,向银行提供退役金发放清单,建立退役金预算档案。



  第七条 代发银行设立自主择业的军队转业干部退役金专户,并按照代发合同逐月将退役金拨付到转业干部个人帐户。



                  第三章 发放范围及标准

  第八条 发放退役金的人员范围为:自主择业并未被党和国家机关、人民团体或者财政拨款的事业单位选用为正式工作人员的军队转业干部。

  第九条 自主择业的军队转业干部月退役金,按照本人转业时安置地同职务等级军队干部月职务工资、军衔(级别)工资和军队统一规定的津贴补贴为计发基数80%的数额与基础、军龄工资的全额之和计发。增发退役金的条件和标准,按中发[2001]3号文件第三十八条和第三十九条规定执行。

退役金数额={[职务工资+军衔(级别)工资+军队统一规定的津贴补贴]x(80%+增发%)}+基础工资+军龄工资。



  第十条 军队统一规定的津贴补贴包括:军人职业津贴、生活补贴、伙食补贴、福利补助、地区津贴(含边远地区津贴、艰苦地区津贴、驻西藏部队特殊津贴、地区生活津贴)、生活补助、房租补贴。

  第十一条 自主择业的军队转业干部退役金的计发时间从退出现役下一年度1月1日开始。



                  第四章 发放程序



  第十二条 年度的退役金经费,由财政部通过追加中央对地方专项拨款方式划拨给省级财政部门,省级财政部门按规定拨入代发银行。

  第十三条 省级军转部门按照国家规定的标准,对自主择业的军队转业干部人数和退役金款项进行审核确认,汇总后送本级财政部门。

  第十四条 省级财政部门对本级军转部门提供的自主择业的军队转业干部人数和退役金金额进行复核,制定发放退役金汇总表送交代发银行。

  第十五条 代发银行收到省级财政部门拨付的退役金款项和退役金发放清单后,将退役金分解划拨到自主择业的军队转业干部户口所在地代发银行的个人退役金帐户。同时为财政、军转部门分别出具退役金对帐表和退役金发放明细单。

  第十六条 在预算执行中,发生人数变化和退役金数额调整时,省级军转部门应在当月规定日期以前将审核后的变动情况送本级财政部门。

  第十七条 退役金的发放时间为每月10日。

  第十八条 自主择业的军队转业干部,按代发银行的有关规定办理领取退役金手续。

  第十九条 自主择业的军队转业干部去世后的抚恤金和丧葬费由地(市)军转部门报省级军转部门确认后,提供给省级财政部门,省级财政部门通过代发银行按规定金额及时拨入转业干部个人帐户,所需费用由财政部在年度决算时予以核销。其标准按中发[2001]3号和国转联[2001]8号文件规定执行。



                  第五章 预、决算与管理监督



  第二十条 省级军转部门对首次领取退役金的自主择业的军队转业干部个人款项,依照标准逐一进行核定,并将核定表格一式三份分别存入个人档案和军转部门,并发给自主择业的军队转业干部。如本人对地方核定的退役金结果有异议,应与部队复核后再予确认。

  第二十一条 省级军转部门会同财政部门每年对本省上年度退役金发放执行情况进行审核,作出决算,二月底前上报;对下年度退役金作出预算,八月底前上报,分别报国务院军队转业干部安置工作小组和财政部。

  第二十二条 国务院军队转业干部安置工作小组每年将军队和省级军转部门提供的退役金款项进行汇总,于九月底送财政部审核,列入中央财政支出。国务院军队转业干部安置工作小组和财政部每年对全国退役金发放执行情况进行决算。

  第二十三条 财政部根据决算情况,在次年划拨经费时对退役金的增加和减少作出相应调整。

  第二十四条 退役金的预算、决算,采用纸质和计算机软盘方式同时上报。

  第二十五条 每季度终了,代发银行、财政和军转部门将退役金发放情况进行对帐, 以确保退役金发放准确无误。

  第二十六条 各级军转、财政部门通过预算审核、年终决算、定期检查和专项审计等措施,对退役金发放管理情况进行严格监督。

  第二十七条 管理单位应按中发[2001]3号和国转联[2001]8号文件规定及时上报人数、标准、汇总金额以及因转业干部就业、死亡等发生的人员变动情况,如违反规定,要追究有关领导和直接责任者的责任。

  第二十八条 代发银行应按照合同规定完成其退役金代发业务。如违反合同规定,军转、财政部门可终止合同,另行委托其他代发银行。



                  第六章 停发与调整



  第二十九条 退役金的停发按中发[2001]3号和国转联[2001]8号文件规定执行,由地(市)军转部门上报省级军转部门审核批准,办理停发手续。停发手续注明停发的原因和时间,记入本人档案,并通过财政部门通知代发银行,同时向国务院军队转业干部安置工作小组备案,年报时相应核减人数和退役金数额。

  第三十条 退役金标准调整的具体实施办法,由国务院军队转业干部安置工作小组会同人事部、财政部、总政治部等有关部门研究制定。



                  第七章  附  则

  第三十一条 本办法由国务院军队转业干部安置工作小组、财政部负责解释。

  第三十二条 本办法自2002年1月1日起施行。