Home >

Notice Of The State Commission For Discipline Inspection On The Authorization Of The National Document Software Product Quality Supervision And Inspection Center

2014/4/20 15:22:00 41

National Commission On AccreditationDocument SoftwareProduct Quality

Institute of electronic industry standardization, Ministry of industry and information technology:


According to the "standardization law of the People's Republic of China", "PRC quality control law", "People's Republic of China certification and accreditation Ordinance" and relevant regulations, the National Commission for quality supervision and inspection center, which has been approved by the National Commission for approval, has completed the preparatory work according to the requirements, and has passed the examination and acceptance. After examination, it is in conformity with the relevant statutory requirements of the national product quality supervision and inspection center, and now decides to authorize the national document software product quality supervision and inspection center.


I. national document software product quality supervision and inspection center, the main inspection product is documentation software. Authorization certificate The serial number is: (2014) the word recognition (578).


Two, the national document software product quality supervision and inspection center should carry out product quality supervision and inspection business within the scope of authorization.


Three. Product quality supervision carried out by the national document software product quality supervision and Inspection Center Inspection business It is supervised and directed by the AQSIQ and the National Commission for Discipline Inspection and supervision.


Four, the national document software product quality supervision and inspection center shall ensure that the inspection data issued are objective, fair, authentic and accurate.


Five, your unit is the state. Document software The inspection activities of the product quality supervision and inspection center and the inspection conclusions issued are legal liabilities.


Related links:


If someone recently sent you RTF format Word document, you must not easily open it. According to Microsoft's emergency safety bulletin, there is a high risk vulnerability in all versions of Word, and has been attacked by hackers. Windows and Mac users are affected by vulnerabilities. 360 the security center also launched the loophole early warning mechanism for the first time to prevent Trojan horses from attacking users' computers with poisonous documents.


Using Word vulnerabilities, hackers can insert malicious code into RTF files, so that arbitrary Trojan viruses can be implanted when users open files. 360 safety guard official micro-blog pointed out that office software vulnerabilities are more harmful to enterprises and institutions. Hackers will carefully create document titles, and use e-mail to deceive enterprises and office personnel to click, thus infiltrating into the intranet to steal important information.


It is worth noting that Microsoft Outlook 2007/2010/2013 uses Word as an email preview, and when the user previews or opens the RTF mail message with poison, Trojan horse will take the opportunity to infect the system, which is difficult for ordinary users to detect.


At present, Microsoft official website has launched a temporary solution to Word vulnerabilities, temporarily resolving the problem by disabling RTF format files. However, if users often use RTF files, installation of the temporary solution will bring inconvenience.


360 security experts said that before Microsoft launched a formal patch to fix vulnerabilities, Word users should be alert to RTF format files sent by strangers, try not to open them, or use 360 isolation sandboxes and other protective measures to open suspicious files in isolation sandboxes, so that the system will not infect Trojan horses. At the same time, users should pay attention to update security software and intercept Trojan horse using this vulnerability in time.

  • Related reading

Information Security: Document Permissions Are The Key To Security Control.

Document management
|
2014/4/20 15:09:00
21

Private Cloud Disk To Solve Enterprise Document Sharing Problems

Document management
|
2014/4/20 15:04:00
43

How To Protect Desktop Documents Under The Trend Of Desktop Virtualization

Document management
|
2014/4/20 14:55:00
34

Documents In Agile: How Much And When To Write?

Document management
|
2014/4/20 14:47:00
25

OA System: From Document Management To Knowledge Management

Document management
|
2014/4/20 14:42:00
30
Read the next article

Two High And New Technologies To Achieve Cooperative Document Management System Landing "Cloud" End

In recent years, the most popular concept is "cloud". At first, it was just something on the computer. Rapidly developing into various fields. Mobile phones, TV, navigation, cars... Basically every item that is closely related to intelligence and high technology will involve "cloud". Next, let's take a look at the detailed information with the Xiaobian.