Taipei Veterans General Hospital library public area "surveillance system" management operation method |
2019.11.21 Beijing Zongjiaozi No. 1080400897 Letter Amendment
one. |
in accordance with: |
It is handled in accordance with the management operation regulations of the "digital surveillance system" in the public area of the hospital. | |
two. |
Purpose: |
Establish a standard operating procedure for the "digital surveillance system" in the public area of the library to prevent violations (negligence) of illegal activities or violations of personality rights. | |
ginseng. | Responsibilities: |
1. Business supervision units: Political Style Office, Zhide Building Safety Management Committee. | |
2. Operation and management unit: library | |
Four. | Main control room management: |
1. The software and hardware facilities of the "monitoring system" in the public area of the library are installed on the third floor of the library, and are operated and managed by the designated personnel of the library. | |
2. The host computer mentioned above should be equipped with a combination lock and managed by a designated person. Non-administrative personnel are not allowed to operate the host. | |
3. The manufacturer shall be accompanied by the management personnel to carry out the maintenance of the monitoring system; if necessary, please ask the engineering office for support. | |
4. The software and hardware facilities of the "surveillance system" are not open for inspection. If the visit of the chief executive of the superior unit should be accompanied by a person of a certain level in the hospital signed by the government office model, and a special person is designated to be responsible for the presentation and other related procedures; the physical screen is not allowed. Available for viewing. | |
Wu. | Video data management: |
1. The management personnel shall keep the screen data of the "surveillance system" in public areas in accordance with the regulations, and shall not disclose them, and strictly abide by the discipline of confidentiality; in the case of investigation by public agencies in accordance with the law, the files (discs) of the screen reproductions shall be kept confidential in comparison with official documents The signing operation procedure is handled in order to comply with the "Personal Data Protection Act" and other laws and regulations to protect the privacy rights of all parties. | |
2. In addition to judicial cases, those units (personnel) or parties in the hospital who need to know the content of surveillance images should fill out the "Application Form for Viewing Surveillance Screens" (see page 1 of the second page of the attachment), explain the specific reasons, and sign the report After approval, after the inspection is assisted by a dedicated person, the results of the inspection will be explained to the applicant depending on the circumstances, so as to maintain the privacy of an unspecified third party. | |
3. Those in the hospital who need to copy the content of the above-mentioned video screen should state the reason and purpose, first obtain the consent of the library, then set up a government office, and then obtain the approval of the vice-president and above, depending on the circumstances, and refer to the Executive Yuan " "Affair Management Manual" document processing - document confidentiality related regulations. | |
4. Judicial organs requesting to provide surveillance content according to the law should prepare a document and submit it to the executive at the level of vice-president or above for approval before processing; the same applies to those who hold a letter to read the content on-site. All parties involved in the on-site reading should sign the "Access to Surveillance Screen Security Consolidation Letter" (see Appendix 2) to protect the personal rights and interests of an unspecified third party. | |
5. Library colleagues who urgently need to check the content of the video screen due to official duties may report to the team leader or job agent for consent, and the library management personnel will handle it first, and then go through the review procedures afterwards; in case of major or abnormal applications, the operation management unit should Immediately report the reason to the political style room. | |
6. The storage period of digital surveillance video images is two weeks from the day of recording; the contents of the screens that have been approved and reproduced by case signatures shall be kept for one year in principle like general official documents (it may be extended depending on the case), and shall be recorded and destroyed in accordance with regulations. | |
7. The time limit for viewing or duplicating applications on digital surveillance screens shall be handled in accordance with the regulations on document processing operations; in emergencies, the Chen method shall be adopted for verification. | |
land. | Manage operating procedures: |
1. Surveillance system management personnel should create a special file (one file for each case) for each application for viewing and copying video screens, and fill in the "Surveillance Screen Viewing Register" (see Appendix 3) for auditing and check. | |
2. The library should include surveillance camera lenses and transmission lines in the key inspection items to check at any time to prevent damage (damage) by external forces. | |
3. If the content of the copied video screen is leaked for profit-making, credit investigation or other improper use, each applicant unit shall not only pursue criminal responsibility in accordance with the law; the third page of civil compensation involved shall be responsible for the compensation, which shall not be related to Libraries are not involved. | |
Seven. | Maintenance and repair of facilities: The property management, use, and construction requirements of the monitoring system, as well as equipment maintenance and repairs, shall be handled by the library in accordance with the business rights and responsibilities system. |
eight. | rewards and punishments: |
A special person is responsible for system operation, management, viewing, and copying, etc., and should strictly abide by the operation regulations. Anyone who actively discovers and reports major safety incidents during the implementation period, or has significant performance in preventing safety incidents, shall be signed and reported by each affiliated unit. If the regulations are not implemented and the third party’s privacy is leaked or the rights and interests of the third party are compromised, review and discussion will be conducted depending on the circumstances. | |
appendix: | |
1. View the monitoring screen application form. | |
2. Access to the monitoring screen security close statement. | |
3. View the register on the monitoring screen |
View the library monitoring system screen application form library monitoring screen call book keeping close book library monitoring screen view register book
最後更新: