您的位置: 首页 » 法律资料网 » 法律法规 »

Guidelines on the Risk Management of Commercial Banks’ Information Technology

时间:2024-07-09 17:41:08 来源: 法律资料网 作者:法律资料网 阅读:8014
下载地址: 点击此处下载

Guidelines on the Risk Management of Commercial Banks’ Information Technology ——附加英文版

China Banking Regulatory Commission


Guidelines on the Risk Management of Commercial Banks’ Information Technology





Chapter I General Provisions

Article 1. Pursuant to the Law of the People’s Republic of China on Banking Regulation and Supervision, the Law of the People's Republic of China on Commercial Banks, the Regulations of the People’s Republic of China on Administration of Foreign-funded Banks, and other applicable laws and regulations, the Guidelines on the Risk Management of Commercial Banks’ Information Technology (hereinafter referred to as the Guidelines) is formulated.

Article 2. The Guidelines apply to all the commercial banks legally incorporated within the territory of the People’s Republic of China.

The Guidelines may apply to other banking institutions including policy banks, rural cooperative banks, urban credit cooperatives, rural credit cooperatives, village banks, loan companies, financial asset management companies, trust and investment companies, finance firms, financial leasing companies, automobile financial companies and money brokers.


Article 3. The term “information technology” stated in the Guidelines shall refer to the system built with computer, communication and software technologies, and employed by commercial banks to handle business transactions, operation management, and internal communication, collaborative work and controls. The term also include IT governance, IT organization structure and IT policies and procedures.

Article 4. The risk of information technology refers to the operational risk, legal risk and reputation risk that are caused by natural factor, human factor, technological loopholes or management deficiencies when using information technology.

Article 5. The objective of information system risk management is to establish an effective mechanism that can identify, measure, monitor, and control the risks of commercial banks’ information system, ensure data integrity, availability, confidentiality and consistency, provide the relevant early warning, and thereby enable commercial banks’ business innovations, uplift their capability in utilizing information technology, improve their core competitiveness and capacity for sustainable development.



Chapter II IT governance

Article 6. The legal representative of commercial bank should be responsible to ensure compliance of this guideline.

Article 7. The board of directors of commercial banks should have the following responsibilities with respect to the management of information systems:
(1) Implementing and complying with the national laws, regulations and technical standards pertaining to the management of information systems, as well as the regulatory requirements set by the China Banking Regulatory Commission (hereinafter referred to as the “CBRC”);
(2) Periodically reviewing the alignment of IT strategy with the overall business strategies and significant policies of the bank, assessing the overall effectiveness and efficiency of the IT organization.
(3) Approving IT risk management strategies and policies, understanding the major IT risks involved, setting acceptable levels for these risks, and ensuring the implementation of the measures necessary to identify, measure, monitor and control these risks.
(4) Setting high ethical and integrity standards, and establishing a culture within the bank that emphasizes and demonstrates to all levels of personnel the importance of IT risk management.
(5) Establishing an IT steering committee which consists of representatives from senior management, the IT organization, and major business units, to oversee these responsibilities and report the effectiveness of strategic IT planning, the IT budget and actual expenditure, and the overall IT performance to the board of directors and senior management periodically.
(6) Establishing IT governance structure, proper segregation of duty, clear role and responsibility, maintaining check and balances and clear reporting relationship. Strengthening IT professional staff by developing incentive program.
(7) Ensuring that there is an effective internal audit of the IT risk management carried out by operationally independent, well-trained and qualified staff. The internal audit report should be submitted directly to the IT audit committee;
(8) Submitting an annual report to the CBRC and its local offices on information system risk management that has been reviewed and approved by the board of directors ;
(9) Ensuring the appropriating funding necessary for IT risk management works;
(10) Ensuring that all employees of the bank fully understand and adhere to the IT risk management policies and procedures approved by the board of directors and the senior management, and are provided with pertinent training.
(11) Ensuring customer information, financial information, product information and core banking system of the legal entity are held independently within the territory, and complying with the regulatory on-site examination requirements of CBRC and guarding against cross-border risk.
(12) Reporting in a timely manner to the CBRC and its local offices any serious incident of information systems or unexpected event, and quickly respond to it in accordance with the contingency plan;
(13) Cooperating with the CBRC and its local offices in the supervisory inspection of the risk management of information systems, and ensure that supervisory opinions are followed up; and
(14) Performing other related IT risk management tasks.

Article 8. The head of the IT organization, commonly known as the Chief Information Officer (CIO) should report directly to the president. Roles and responsibilities of the CIO should include the following:
(1) Playing a direct role in key decisions for the business development involving the use of IT in the bank;
(2) The CIO should ensure that information systems meet the needs of the bank, and IT strategies, in particular information system development strategies, comply with the overall business strategies and IT risk management policies of the bank;
(3) The CIO should also be responsible for the establishment of an effective and efficient IT organization to carry out the IT functions of the bank. These include the IT budget and expenditure, IT risk management, IT policies, standards and procedures, IT internal controls, professional development, IT project initiatives, IT project management, information system maintenance and upgrade, IT operations, IT infrastructure, Information security, disaster recovery plan (DRP), IT outsourcing, and information system retirement;
(4) Ensuring the effectiveness of IT risk management throughout the organization including all branches.
(5) Organizing professional trainings to improve technical proficiency of staff.
(6) Performing other related IT risk management tasks.

Article 9. Commercial banks should ensure that a clear definition of the IT organization structure and documentation of all job descriptions of important positions are always in place and updated in a timely manner. Staff in each position should meet relevant requirements on professional skills and knowledge. The following risk mitigation measures should be incorporated in the management program of related staff:
(1) Verification of personal information including confirmation of personal identification issued by government, academic credentials, prior work experience, professional qualifications;
(2) Ensuring that IT staff can meet the required professional ethics by checking character reference;
(3) Signing of agreements with employees about understanding of IT policies and guidelines, non-disclosure of confidential information, authorized use of information systems, and adherence to IT policies and procedures; and
(4) Evaluation of the risk of losing key IT personnel, especially during major IT development stage or in a period of unstable IT operations, and the relevant risk mitigation measures such as staff backup arrangement and staff succession plan.

Article 10. Commercial banks should establish or designate a particular department for IT risk management. It should report directly to the CIO and the Chief Risk Officer (or risk management committee), serve as a member of the IT incident response team, and be responsible for coordinating the establishment of policies regarding IT risk management, especially the areas of information security, BCP, and compliance with the CBRC regulations, advising the business departments and IT department in implementing these policies, providing relevant compliance information, conducting on-going assessment of IT risks, and ensuring the follow-up of remediation advice, monitoring and escalating management of IT threats and non-compliance events.

Article 11. Commercial banks should establish a special IT audit role and responsibility within internal audit function, which should put in place IT audit policies and procedures, develop and execute IT audit plan.

Article 12. Commercial banks should put in place policies and procedures to protect intellectual property rights according to laws regarding intellectual properties, ensure purchase of legitimate software and hardware, prevention of the use of pirated software, and the protection of the proprietary rights of IT products developed by the bank, and ensure that these are fully understood and complied by all employees.

Article 13. Commercial banks should, in accordance with relevant laws and regulations, disclose the risk profile of their IT normatively and timely.


Chapter III IT Risk Management

Article 14. Commercial banks should formulate an IT strategy that aligns with the overall business plan of the bank, IT risk assessment plan and an IT operational plan that can ensure adequate financial resources and human resources to maintain a stable and secure IT environment.

Article 15. Commercial banks should put in place a comprehensive set of IT risk management policies that include the following areas:
(1) Information security classification policy
(2) System development, testing and maintenance policy
(3) IT operation and maintenance policy
(4) Access control policy
(5) Physical security policy
(6) Personnel security policy
(7) Business Continuity Planning and Crisis and Emergency Management procedure

Article 16. Commercial banks should maintain an ongoing risk identification and assessment process that allows the bank to pinpoint the areas of concern in its information systems, assess the potential impact of the risks on its business, rank the risks, and prioritize mitigation actions and the necessary resources (including outsourcing vendors, product vendors and service vendors).

Article 17. Commercial banks should implement a comprehensive set of risk mitigation measures complying with the IT risk management policies and commensurate with the risk assessment of the bank. These mitigation measures should include:
(1) A set of clearly documented IT risk policies, technical standards, and operational procedures, which should be communicated to the staff frequently and kept up to date in a timely manner;
(2) Areas of potential conflicts of interest should be identified, minimized, and subject to careful, independent monitoring. Also it requires that an appropriate control structure is set up to facilitate checks and balances, with control activities defined at every business level, which should include:
- Top level reviews;
- Controls over physical and logical access to data and system;
- Access granted on “need to know” and “minimum authorization” basis;
- A system of approvals and authorizations; and
- A system of verification and reconciliation.

Article 18. Commercial banks should put in place a set of ongoing risk measurement and monitoring mechanisms, which should include
(1) Pre and post-implementation review of IT projects;
(2) Benchmarks for periodic review of system performance;
(3) Reports of incidents and complaints about IT services;
(4) Reports of internal audit, external audit, and issues identified by CBRC; and
(5) Arrangement with vendors and business units for periodic review of service level agreements (SLAs).
(6) The possible impact of new development of technology and new threats to software deployed.
(7) Timely review of operational risk and management controls in operation area.
(8) Assess the risk profile on IT outsourcing projects periodically.

Article 19. Chinese commercial banks operating offshore and the foreign commercial banks in China should comply with the relevant regulatory requirements on information systems in and outside the People’s Republic of China.


Chapter IV Information Security

Article 20. Information technology department of commercial banks should oversee the establishment of an information classification and protection scheme. All employees of the bank should be made aware of the importance of ensuring information confidentiality and provided with the necessary training to fully understand the information protection procedures within their responsibilities.

Article 21. Commercial banks should put in place an information security management function to develop and maintain an ongoing information security management program, promote information security awareness, advise other IT functions on security issues, serve as the leader of IT incident response team, and report the evaluation of the information security of the bank to the IT steering committee periodically. The Information security management program should include Information security standards, strategy, an implementation plan, and an ongoing maintenance plan.
Information security policy should include the following areas:
(1) IT security policy management
(2) Organization information security
(3) Asset management
(4) Personnel security
(5) Physical and environment security
(6) Communication and operation security
(7) Access control and authentication
(8) Acquirement, development and maintenance of information system
(9) Information security event management
(10) Business continuity management
(11) Compliance

Article 22. Commercial banks should have an effective process to manage user authentication and access control. Access to data and system should be strictly limited to authorized individuals whose identity is clearly established, and their activities in the information systems should be limited to the minimum required for their legitimate business use. Appropriate user authentication mechanism commensurate with the classification of information to be accessed should be selected. Timely review and removal of user identity from the system should be implemented when user transfers to a new job or leave the commercial bank.

Article 23. Commercial banks should ensure all physical security zones, such as computer centers or data centers, network closets, areas containing confidential information or critical IT equipment, and respective accountabilities are clearly defined, and appropriate preventive, detective, and recuperative controls are put in place.

Article 24. Commercial banks should divide their networks into logical security domains (hereinafter referred to as the “domain”) with different levels of security. The following security factors have to be assessed in order to define and implement effective security controls, such as physical or logical segregation of network, network filtering, logical access control, traffic encryption, network monitoring, activity log, etc., for each domain and the whole network.
(1) criticality of the applications and user groups within the domain;
(2) Access points to the domain through various communication channels;
(3) Network protocols and ports used by the applications and network equipment deployed within the domain;
(4) Performance requirement or benchmark;
(5) Nature of the domain, i.e. production or testing, internal or external;
(6) Connectivity between various domains; and
(7) Trustworthiness of the domain.

Article 25. Commercial banks should secure the operating system and system software of all computer systems by
(1) Developing baseline security requirement for each operating system and ensuring all systems meet the baseline security requirement;
(2) Clearly defining a set of access privileges for different groups of users, namely, end-users, system development staff, computer operators, and system administrators and user administrators;
(3) Setting up a system of approval, verification, and monitoring procedures for using the highest privileged system accounts;
(4) Requiring technical staff to review available security patches, and report the patch status periodically; and
(5) Requiring technical staff to include important items such as unsuccessful logins, access to critical system files, changes made to user accounts, etc. in system logs, monitors the systems for any abnormal event manually or automatically, and report the monitoring periodically.

Article 26. Commercial banks should ensure the security of all the application systems by
(1) Clearly defining the roles and responsibilities of end-users and IT staff regarding the application security;
(2) Implementing a robust authentication method commensurate with the criticality and sensibility of the application system;
(3) Enforcing segregation of duties and dual control over critical or sensitive functions;
(4) Requiring verification of input or reconciliation of output at critical junctures;
(5) Requiring the input and output of confidential information are handled in a secure manner to prevent theft, tampering, intentional leakage, or inadvertent leakage;
(6) Ensuring system can handle exceptions in a predefined way and provide meaningful message to users when the system is forced to terminate; and
(7) Maintaining audit trail in either paper or electronic format.
(8) Requiring user administrator to monitor and review unsuccessful logins and changes to users accounts.

Article 27. Commercial banks should have a set of policies and procedures controlling the logging of activities in all production systems to support effective auditing, security forensic analysis, and fraud prevention. Logging can be implemented in different layers of software and on different computer and networking equipment, which falls into two broad categories:
(1) Transaction journals. They are generated by application software and database management system, and contain authentication attempts, modification to data, error messages, etc. Transaction journals should be kept according to the national accounting policy.
(2) System logs. They are generated by operating systems, database management system, firewalls, intrusion detection systems, and routers, etc., and contain authentication attempts, system events, network events, error messages, etc. System logs should be kept for a period scaled to the risk classification, but no less than one year.
Banks should ensure that sufficient items be included in the logs to facilitate effective internal controls, system troubleshooting, and auditing while taking appropriate measures to ensure time synchronization on all logs. Sufficient disk space should be allocated to prevent logs from being overwritten. System logs should be reviewed for any exception. The review frequency and retention period for transaction logs or database logs should be determined jointly by IT organization and pertinent business lines, and approved by the IT steering committee.

Article 28. Commercial banks should have the capacity to employ encryption technologies to mitigate the risk of losing confidential information in the information systems or during its transmission. Appropriate management processes of the encryption facilities should be put in place to ensure that
(1) Encryption facilities in use should meet national security standards or requirements;
(2) Staff in charge of encryption facilities are well trained and screened;
(3) Encryption strength is adequate to protect the confidentiality of the information; and
(4) Effective and efficient key management procedures, especially key lifecycle management and certificate lifecycle management, are in place.

Article 29. Commercial banks should put in place an effective and efficient system of securing all end-user computing equipment which include desktop personal computers (PCs), portable PCs, teller terminals, automatic teller machines (ATMs), passbook printers, debit or credit card readers, point of sale (POS) terminals, personal digital assistant (PDAs), etc and conduct periodic security checks on all equipments.

Article 30. Commercial banks should put in place a set of policies and procedures to govern the collection, processing, storage, transmission, dissemination, and disposal of customer information.

Article 31. All employees, including contract staff, should be provided with the necessary trainings to fully understand these policies procedures and the consequences of their violation. Commercial banks should adopt a zero tolerance policy against security violation.


Chapter V Application System Development, Testing and Maintenance

Article 32. Commercial banks should have the capability to identify, plan, acquire, develop, test, deploy, maintain, upgrade, and retire information systems. Policies and procedures should be in place to govern the initiation, prioritization, approval, and control of IT projects. Progress reports of major IT projects should be submitted to and reviewed by the IT steering committee periodically. Decisions involving significant change of schedule, change of key personnel, change of vendors, and major expenditures should be included in the progress report.

Article 33. Commercial banks should recognize the risks associated with IT projects, which include the possibilities of incurring various kinds of operational risk, financial losses, and opportunity costs stemming from ineffective project planning or inadequate project management controls of the bank. Therefore, appropriate project management methodologies should be adopted and implemented to control the risks associated with IT projects.

Article 34. Commercial banks should adopt and implement a system development methodology to control the life cycle of Information systems. The typical phases of system life cycle include system analysis, design, development or acquisition, testing, trial run, deployment, maintenance, and retirement. The system development methodology to be used should be commensurate with the size, nature, and complexity of the IT project, and, generally speaking, should facilitate the management of the following risks.

Article 35. Commercial banks should ensure system reliability, integrity, and maintainability by controlling system changes with a set of policies and procedures, which should include the following elements.
(1) Ensure that production systems are separated from development or testing systems;
(2) Separating the duties of managing production systems and managing development or testing systems;
(3) Prohibiting application development and maintenance staff from accessing production system under normal circumstances unless management approval is granted to perform emergency repair, and all emergency repair activities should be recorded and reviewed promptly;
(4) Promoting changes of program or system configuration from development and testing systems to production systems should be jointly approved by IT organization and business departments, properly documented, and reviewed periodically.

Article 36. Commercial banks should have in place a set of policies, standards, and procedures to ensure data integrity, confidentiality, and availability. These policies should be in accordance with data integrity amid IT development procedure.

Article 37. Commercial banks should ensure that Information system problems could be tracked, analyzed, and resolved systematically through an effective problem management process. Problems should be documented, categorized, and indexed. Support services or technical assistance from vendors, if necessary, should also be documented. Contacts and relevant contract information should be made readily available to the employees concerned. Accountability and line of command should be delineated clearly and communicated to all employees concerned, which is of utmost importance to performing emergency repair.

Article 38. Commercial banks should have a set of policies and procedures controlling the process of system upgrade. System upgrade is needed when the hardware reaches its lifespan or runs out of capacity, the underpinning software, namely, operating system, database management system, middleware, has to be upgraded, or the application software has to be upgraded. The system upgrade should be treated as a project and managed by all pertinent project management controls including user acceptance testing.


Chapter VI IT Operations

Article 39. Commercial banks should consider fully the environmental threats (e.g. proximity to natural disaster zones, dangerous or hazardous facilities or busy/major roads) when selecting the locations of their data centers. Physical and environmental controls should be implemented to monitor environmental conditions could affect adversely the operation of information processing facilities. Equipment facilities should be protected from power failures and electrical supply interference.

Article 40. In controlling access by third-party personnel (e.g. service providers) to secured areas, proper approval of access should be enforced and their activities should be closely monitored. It is important that proper screening procedures including verification and background checks, especially for sensitive technology-related jobs, are developed for permanent and temporary technical staff and contractors.

Article 41. Commercial banks should separate IT operations or computer center operations from system development and maintenance to ensure segregation of duties within the IT organization. The commercial banks should document the roles and responsibilities of data center functions.

Article 42. Commercial banks are required to retain transactional records in compliance with the national accounting policy. Procedures and technology are needed to be put in place to ensure the integrity, safekeeping and retrieval requirements of the archived data.



Article 43. Commercial banks should detail operational instructions such as computer operator tasks, job scheduling and execution in the IT operations manual. The IT operations manual should also cover the procedures and requirements for on-site and off-site backup of data and software in both the production and development environments (i.e. frequency, scope and retention periods of back-up).

Article 44. Commercial banks should have in place a problem management and processing system to respond promptly to IT operations incidents, to escalate reported incidents to relevant IT management staff and to record, analyze and keep tracks of all these incidents until rectification of the incidents with root cause analysis completed. A helpdesk function should be set up to provide front-line support to users on all technology-related problems and to direct the problems to relevant IT functions for investigation and resolution.

Article 45. Commercial banks should establish service level agreement and assess the IT service level standard attained.

Article 46. Commercial banks should implement a process to ensure that the performance of application systems is continuously monitored and exceptions are reported in a timely and comprehensive manner. The performance monitoring process should include forecasting capability to enable exceptions to be identified and corrected before they affect system performance.

Article 47. Commercial banks should carry out capacity plan to cater for business growth and transaction increases due to changes of economic conditions. Capacity plan should be extended to cover back-up systems and related facilities in addition to the production environment.

Article 48. Commercial banks should ensure the continued availability of technology related services with timely maintenance and appropriate system upgrades. Proper record keeping (including suspected and actual faults and preventive and corrective maintenance records) is necessary for effective facility and equipment maintenance.

Article 49. Commercial banks should have an effective change management process in place to ensure integrity and reliability of the production environment. Commercial banks should develop a formal change management process.


Chapter VII Business Continuity Management

Article 50. Commercial banks should have in place appropriate arrangements, having regard to the nature, scale and complexity of its business, to ensure that it can continue to function and meet its regulatory obligations in the event of an unforeseen interruption. These arrangements should be regularly updated and tested to ensure their effectiveness.

Article 51. Commercial banks should consider the likelihood and impact of a disruption to the continuity of its operation from unexpected events. This should include assessing the disruptions to which it is particularly susceptible including but not limited to:
(1) Loss of failure of internal and external resources (such as people, systems and other assets);
(2) The loss or corruption of its information; and
(3) External events (such as war, earthquake, typhoon, etc).

Article 52. Commercial bank should act to reduce both the likelihood of disruptions (including system resilience and dual processing); and the impact of disruptions (including by contingency arrangements and insurance).

Article 53. Commercial bank should document its strategy for maintaining continuity of its operations, and its plans for communicating and regularly testing the adequacy and effectiveness of this strategy. Commercial bank should establish:
(1) Formal business continuity plans that outline arrangements to reduce the impact of a short, medium and long-term disruption, including:
a) Resource requirements such as people, systems and other assets, and arrangements for obtaining these resources;
b) The recovery priorities for the commercial bank’s operations; and
c) Communication arrangements for internal and external concerned parties (including CBRC, clients and the press);
(2) Escalation and invocation plans that outline the processes for implementing the business continuity plans, together with relevant contact information;
(3) Processes to validate the integrity of information affected by the disruption;
(4) Processes to review and update (1) to (3) following changes to the commercial bank’s operations or risk profile.

Article 54. A final BCP plan and an annual drill result must be signed off by the IT Risk management, or internal auditor and IT Steering Committee.


Chapter VIII Outsourcing

Article 55. Commercial banks cannot contract out its regulatory obligations and should take reasonable care to supervise the discharge of outsourcing functions.

Article 56. Commercial banks should take particular care to manage material outsourcing arrangement (such as outsourcing of data center, IT infrastructure, etc.), and should notify CBRC when it intends to enter into material outsourcing arrangement.

Article 57. Before entering into, or significantly changing, an outsourcing arrangement, the commercial bank should:
(1) Analyze how the arrangement will fit with its organization and reporting structure; business strategy; overall risk profile; and ability to meet its regulatory obligations;
(2) Consider whether the arrangements will allow it to monitor and control its operational risk exposure relating to the outsourcing;
(3) Conduct appropriate due diligence of the service provider’s financial stability, expertise and risk assessment of the service provider, facilities and ability to cover the potential liabilities;
(4) Consider how it will ensure a smooth transition of its operations from its current arrangements to a new or changed outsourcing arrangement (including what will happen on the termination of the contract); and
(5) Consider any concentration risk implications such as the business continuity implications that may arise if a single service provider is used by several firms.

Article 58. In negotiating its contract with a service provider, the commercial bank should have regard to ( but not limited to ):
(1) Reporting and negotiation requirements it may wish to impose on the service provider;
(2) Whether sufficient access will be available to its internal auditors, external auditors and banking regulators;
(3) Information ownership rights, confidentiality agreements and Firewalls to protect client and other information (including arrangements at the termination of contract);
(4) The adequacy of any guarantees and indemnities;
(5) The extent to which the service provider must comply with the commercial bank’s polices and procedures covering IT Risk;
(6) The extent to which the service provider will provide business continuity for outsourced operations, and whether exclusive access to its resources is agreed;
(7) The need for continued availability of software following difficulty at a third party supplier;
(8) The processes for making changes to the outsourcing arrangement and the conditions under which the commercial bank or service provider can choose to change or terminate the outsourcing arrangement, such as where there is:
a) A change of ownership or control of the service provider or commercial bank; or
b) Significant change in the business operations of the service provider or commercial bank; or
c) Inadequate provision of services that may lead to the commercial bank being unable to meet its regulatory obligations.

Article 59. In implementing a relationship management framework, and drafting the service level agreement with the service provider, the commercial bank should have regarded to (but not limited to):
(1) The identification of qualitative and quantitative performance targets to assess the adequacy of service provision, to both the commercial bank and its clients, where appropriate;
(2) The evaluation of performance through service delivery reports and periodic self assessment and independent review by internal or external auditors; and
(3) Remediation action and escalation process for dealing with inadequate performance.

Article 60. The commercial bank should enhance IT related outsourcing management, in place following (not limited to ) measures to ensure data security of sensitive information such as customer information:
(1) Effectively separated from other customer information of the service provider;
(2) The related staff of service provider should be authorized on “need to know” and “minimum authorization” basis;
(3) Ensure service provider guarantee its staff for meeting the confidential requests;
(4) All outsourcing arrangements related to customer information should be identified as material outsourcing arrangements and the customers should be notified;
(5) Strictly monitor re-outsourcing actions of the service provider, and implement adequate control measures to ensure information security of the bank;
(6) Ensure all related sensitive information be refunded or deleted from the service provider’s storage when terminating the outsourcing arrangement.


Article 61. The commercial bank should ensure that it has appropriate contingency in the event of a significant loss of services from the service provider. Particular issues to consider include a significant loss of resources, turnover of key staff, or financial failure of, the service provider, and unexpected termination of the outsourcing agreement.

Article 62. All outsourcing contracts must be reviewed or signed off by IT Risk management, internal IT auditors, legal department and IT Steering Committee. There should be a process to periodically review and refine the service level agreements.


Chapter IX Internal Audit

Article 63. Depending on the nature, scale and complexity of its business, it may be appropriate for the commercial banks to delegate much of the task of monitoring the appropriateness and effectiveness of its systems and controls to an internal audit function. An internal audit function should be adequately resourced and staffed by competent individuals, be independent of the day-to-day activities of the commercial bank and have appropriate access to the bank’s records.

Article 64. The responsibilities of the internal IT audit function are:
(1) To establish, implement and maintain an audit plan to examine and evaluate the adequacy and effectiveness of the bank’s systems and internal control mechanisms and arrangements;
(2) To issue recommendations based on the result of work carried out in accordance with 1;
(3) To verify compliance with those recommendations;
(4) To carry out special audit on information technology. The term “special audit” of information technology refers to the investigation, analysis and assessment on the security incidents of the information system, or the audit performed on a special subject based on IT risk assessment result as deemed necessary by the audit department.

Article 65. Based on the nature, scale and complexity of its business, deployment of information technology and IT risk assessment, commercial banks could determine the scope and frequency of IT internal audit. However, a comprehensive IT internal audit shall be performed at a minimum once every 3 years.

Article 66. Commercial banks should engage its internal audit department and IT Risk management department when implementing system development of significant size and scale to ensure it meets the IT Risk standards of the Commercial banks.


Chapter X External Audit

Article 67. The external information technology audit of commercial banks can be carried out by certified service providers in accordance with laws, rules and regulations.

Article 68. The commercial bank should ensure IT audit service provider to review and examine bank’s hardware, software, documentation and data to identify IT risk when they are commissioned to perform the audit. Vital commercial and technical information which is protected by national laws and regulations should not be reviewed.

Article 69. Commercial bank should communicate with the service provider in depth before the audit to determine audit scope, and should not withhold the truth or do not corporate with the service provider intentionally.

Article 70. CBRC and its local offices could designate certified service providers to carry out IT audit or related review on commercial banks when needed. When carrying out audit on commercial banks, as commissioned or authorized by CBRC or its local offices, the service providers shall present the letter of authority, and carry out the audit in accordance to the scope prescribed in the letter of authority.

Article 71. Once the IT audit report produced by the service providers is reviewed and approved by CBRC or its local offices, the report will have the same legal status as if it is produced by the CBRC itself. Commercial banks should come up with a correction action plan prescribed in the report and implement the corrective actions according to the timeframe.

Article 72. Commercial banks should ensure the service providers to strictly comply with laws and regulations to keep confidential and data security of any commercial secrets and private information learnt and IT risk information when conducting the audit. The service provider should not modify copy or take away any documents provided by the commercial banks.


Chapter XI Supplementary Provisions

Article 73. Commercial banks with no board of directors should have their operating decision-making bodies perform the responsibilities of the board with regard to IT risk management specified herein.

Article 74. The China Banking Regulatory Commission supervises and regulates the IT risk management of commercial banks under its authority by law.

Article 75. The power of interpretation and modification of the Guidelines shall rest with the China Banking Regulatory Commission.

Article 76. The Guidelines shall become effective as of the date of its issuance and the former Guidelines on the Risk Management of Banking Institutions’ Information Systems shall be revoked at the same time.


关于印发国家邮政局标准化工作管理办法(试行)的通知

国家邮政局


关于印发国家邮政局标准化工作管理办法(试行)的通知

国家邮政局文件
国邮[2003]138号


各省、自治区、直辖市邮政局,局直属各单位:

  根据全国邮政标准化工作电视电话会议精神,为了加强邮政标准化工作的管理,推进标准化工作,现将《国家邮政局标准化工作管理办法(试行)》印发给你们,请认真遵照执行。2000年6月19日印发的《邮政标准管理办法(试行)》(国邮(2000)219号)同时废止。

  在执行该办法过程中有何问题和建议,请及时向国家邮政局计划财务司反馈。

国家邮政局

二○○三年四月二十八日



国家邮政局标准化工作管理办法(试行)

第一章 总 则

第一条 为加强邮政标准化工作管理,根据《中华人民共和国标准化法》和有关规章及规定制定本办法。

第二条 邮政标准化工作的任务是制定邮政标准、组织实施标准和对标准的实施进行监督。

第三条 为保证邮政通信网的完整、统一、先进和有效,树立中国邮政的统一品牌和形象,对邮政实物网和信息网需统一的要求,应当制定邮政标准。

第四条 邮政标准应积极采用国际标准和国外先进标准。

第二章 组织机构和职责

第五条 国家邮政局标准化工作组织机构由“邮政标准化工作领导小组”、“邮政标准化工作领导小组办公室”、“标准技术工作组”和“邮政标准化技术归口单位”(以下简称“技术归口单位”)组成。

第六条 全国范围内的邮政标准化工作由邮政标准化工作领导小组统一领导。领导小组组长由国家邮政局分管标准化工作的领导担任,其成员由国家邮政局相关司部负责人和技术归口单位负责人组成。邮政标准化工作领导小组下设办公室,办公室设在计划财务部,日常工作由科技处负责。
第七条 国家邮政局是邮政行业标准化工作的行政主管部门,业务上受国务院标准化行政主管部门的指导。国家邮政局计划财务部归口统一管理邮政行业标准。

第八条 标准技术工作组由邮政标准化工作领导小组批准成立,是开展邮政专业领域标准研究活动的技术工作组织,其成员由各专业领域的专家组成,其秘书处设在技术归口单位,业务上接受邮政标准化工作领导小组办公室的指导和监督。

第九条 技术归口单位负责邮政全国性的标准化技术归口工作。业务上受邮政标准化工作领导小组办公室的领导。

第十条 各省(自治区、直辖市)邮政局应参照国家邮政局标准化管理模式成立本省(自治区、直辖市)邮政标准化工作领导小组和所属办公室,组织领导全省(自治区、直辖市)的邮政标准化工作。组长由省(自治区、直辖市)邮政局分管标准化工作的领导担任。标准化工作办公室设在科技管理部门,日常工作由科技管理部门指定专人负责。

第十一条 邮政标准化工作领导小组的职责是:

(一) 贯彻国家标准化法律、法规和方针、政策;
(二) 负责邮政标准化的宏观管理工作,审批邮政标准化的规章制度和实施办法;
(三) 审批邮政标准化组织机构;
(四) 审批标准化工作规划、标准体系和年度计划;
(五) 确定承担各类标准制定、实施、监督工作的责任单位或部门;
(六) 审批邮政行业标准和国家邮政局标准化指导性文件的发布;
(七) 对重大事项进行协调与落实。

第十二条 邮政标准化工作领导小组办公室的职责是:

(一) 负责组织制定邮政标准化工作的规章制度和实施办法;
(二) 负责组织编制标准化工作规划、标准体系;
(三) 负责组织编制相关国家标准、邮政行业标准和国家邮政局标准化指导性文件的年度计划;
(四) 负责组织制修订相关国家标准、邮政行业标准和国家邮政局标准化指导性文件,并负责标准化项目计划的落实、检查和督促;
(五) 负责向国务院标准化行政主管部门上报国家标准;
(六) 负责邮政行业标准和国家邮政局标准化指导性文件报批稿的审核,统一编号并办理发布事宜;
(七) 组织标准化研究成果参加科技成果评奖事宜;
(八) 组织国际标准化合作和交流活动;
(九) 负责组织标准化宣贯、普及、咨询、经验交流及学术研究活动;
(十) 负责组织标准的实施并进行监督检查;
(十一) 负责重大引进技术、设备、工程等项目的标准化审查工作;
(十二) 负责标准化工作经费的管理;
(十三) 协调标准化工作中出现的问题;
(十四) 完成邮政标准化工作领导小组交办的其他事宜。

第十三条 标准技术工作组的职责是:

(一) 按照国家有关标准化的方针政策,结合邮政实际情况,及时向邮政标准化工作领导小组提出相关专业标准化政策和技术措施的建议;
(二) 提出相关专业的邮政标准体系、规划和年度计划的建议;
(三) 提出相关专业标准责任部门的建议;
(四) 负责相关专业标准送审稿的审查,提出审查结论意见;
(五) 负责相关专业标准起草中重大问题的协调,提出书面报告;
(六) 对相关专业已发布标准的实施情况进行跟踪调查和分析研究,做出标准化效果的评价报告;
(七) 负责相关专业标准的复审,并提出继续有效、修改、修订、废止的建议;
(八) 受国家邮政局有关行政主管部门的委托,承担相关专业引进项目的标准化审查工作,并向项目主管部门提出标准化水平的分析报告;
(九) 相关专业标准的技术咨询服务工作。

第十四条 邮政标准化技术归口单位的职责是:

(一) 制定《邮政标准制修订程序》,并组织实施;
(二) 承担标准技术工作组秘书处工作;
(三) 承担标准立项的审议工作;
(四) 受相关部门的委托,承办部分标准送审稿的审查工作;
(五) 办理标准草案的上报工作和标准的报批手续;
(六) 根据邮政标准项目计划完成的进度,提出分期拨付项目经费的报告;
(七) 承办标准复审工作;
(八) 组织邮政标准出版发行工作;
(九) 受相关部门的委托,承办邮政标准的宣贯工作;
(十) 负责标准化培训工作;
(十一) 管理标准成果,建立邮政标准化档案;
(十二) 负责邮政行业标准和企业标准的备案;
(十三) 收集并组织交流国内外标准化信息资料;
(十四) 跟踪研究UPU标准,并提出标准转化的建议;
(十五) 上级主管部门交办的其他任务。

第十五条 国家邮政局各司部及直属单位标准化工作的职责是:

(一) 提出本部门业务范围内的标准及标准化工作的建议;
(二) 参加与本部门业务范围有关标准的审查;
(三) 负责本部门业务范围内标准的宣贯、实施和监督检查。

第十六条 省(自治区、直辖市)邮政标准化工作领导小组的职责是:
(一) 贯彻执行标准化的方针、政策、法规以及相关的国家标准、邮政行业标准和国家邮政局标准化指导性文件;
(二) 组织提出对相关国家标准、邮政行业标准、国家邮政局标准化指导性文件及标准化工作的建议;
(三) 组织制定本省(自治区、直辖市)需要的邮政企业标准,并报技术归口单位备案;
(四) 组织本省(自治区、直辖市)人员参与、配合相关国家标准、邮政行业标准、国家邮政局标准化指导性文件的制修订工作,并参加有关标准的审查;
(五) 负责本省(自治区、直辖市)范围内邮政标准的宣贯、实施和监督检查;
(六) 负责省内邮政引进项目的标准化审查工作;
(七) 承办国家邮政局邮政标准化工作领导小组交办的其他标准化工作。

第三章 邮政标准项目计划

第十七条 邮政标准项目包括邮政标准的制修订项目和邮政标准化研究课题。

第十八条 邮政标准分为国家标准、邮政行业标准、国家邮政局标准化指导性文件和邮政企业标准。

(一) 对需要在全国范围内统一的要求,应当制定国家标准;
(二) 对没有国家标准而需要在邮政行业内统一的要求,应当制定行业标准;
(三) 以下情况之一的,可以制定国家邮政局标准化指导性文件。

1.技术尚在发展中,在短时间内制定不出技术标准,而需要有相应的文件引导其发展的;
2.有标准化价值的资料,而暂时不适合制定行业标准的项目;
3.采用国际标准化组织(ISO)、国际电工委员会(IEC)及其他国际组织(如UPU)的技术报告的项目。

(四) 对没有国家标准和邮政行业标准而需要在本省(自治区、直辖市)统一的要求,可制定本省(自治区、直辖市)的邮政企业标准。鼓励制定严于国家标准和邮政行业标准的企业标准。邮政企业标准由各省(自治区、直辖市)邮政标准化工作领导小组组织制定、贯彻实施和检查。

第十九条 标准化项目计划的提出应根据邮政发展的实际需要,并以邮政标准化规划和邮政标准体系为主要依据。

第二十条 国家邮政局各司部及直属单位、各标准技术工作组是标准化项目的提出单位。提出标准项目时,由提出单位填写标准项目建议表;建议的项目承担单位填写项目任务书和标准项目计划汇总表,由技术归口单位汇总后上报邮政标准化工作领导小组办公室(标准项目建议表、项目任务书、标准项目计划汇总表见《邮政标准制修订程序》)。

第二十一条 标准化项目建议由技术归口单位组织审议,审议结论上报邮政标准化工作领导小组办公室。予以立项的项目由邮政标准化工作领导小组办公室编制计划草案,国家标准制修订项目报国务院标准化行政主管部门审批;邮政行业标准、国家邮政局标准化指导性文件及其他标准化研究项目由国家邮政局审批后下达。

第二十二条 对于邮政发展急需、关系重大的标准项目,随时下达项目计划。

第四章 邮政标准制修订和审批发布

第二十三条 邮政标准化工作领导小组办公室负责组织标准的制修订工作和监督检查标准项目计划的完成情况;技术归口单位协助完成计划的落实。

第二十四条 国家邮政局各司部及直属单位、各省邮政局应配合标准起草工作,对涉及的有关技术与业务问题及时提出意见与建议。

第二十五条 标准的制修订按《邮政标准制修订程序》进行。

第二十六条 国家标准上报国家质量监督检验检疫总局审批发布。邮政行业标准和国家邮政局标准化指导性文件由国家邮政局审批发布。邮政企业标准由各省(自治区、直辖市)邮政局审批发布。

第二十七条 强制性邮政行业标准的编号由强制性邮政行业标准代号YZ、顺序号及发布年号组成。



第二十八条 推荐性邮政行业标准的编号由推荐性邮政行业标准代号YZ/T、顺序号及发布年号组成。



第二十九条 国家邮政局标准化指导性文件的编号由国家邮政局标准化指导性文件代号YZ/Z、顺序号及发布年号组成。



第三十条 邮政企业标准的编号由企业标准代号YQ、各省(自治区、直辖市)两字母代码(按GB/T2260中规定,见附件1)、顺序号及发布年号组成。



第五章 邮政标准的复审

第三十一条 标准发布后,应根据技术进步和业务发展适时复审。相关国家标准和邮政行业标准复审一般不超过五年,以确定现行标准继续有效或者予以修改、修订、废止。国家邮政局标准化指导性文件发布后三年必须复审,以确定是否继续有效、转化为邮政行业标准或撤消。邮政企业标准由各省(自治区、直辖市)邮政局组织适时复审。

第三十二条 标准内容不作修改,仍能适应邮政发展需要的,给予确认继续有效;标准内容不够完善,或者不完全符合邮政实际和当前科学技术水平,在不降低标准技术水平和不影响产品互换性能的前提下,可对标准内容采用修改单的形式进行个别、少量修改或补充;标准中主要技术规定需要修订才能适应邮政发展需要的,应作为修订项目列入标准项目计划,按照邮政标准修订程序进行;标准内容已不适应当前需要,或已被新的标准所代替,以及无存在必要的,应予以废止。

第六章 标准的实施与监督

第三十三条 邮政全行业都应执行已发布的标准,并作好有关标准的宣贯。

第三十四条 国家邮政局各司部及直属单位、各省(自治区、直辖市)邮政局应建立健全标准化工作的管理制度和考核制度。

第三十五条 国家邮政局标准化工作年度计划中规定本年度标准贯彻落实情况的检查内容,各省(自治区、直辖市)邮政局应据此要求,组织本省(自治区、直辖市)实施标准的监督检查工作,并以书面报告形式逐级上报。

第三十六条 各部门应积极参与标准的贯彻实施工作。对于重大标准的贯彻实施,应确定专门人员负责,提出标准的实施计划和方法,并及时总结标准实施情况,提出进一步贯彻实施和完善标准的建议。

第三十七条 加强邮政用品用具的监制和重要设备的检测,不符合标准的邮政用品用具和设备不得使用。对于监制的邮政生产用品用具和设备检测不符合标准的,由有关部门按有关规定进行处理。

第三十八条 各单位在引进技术、设备、统一招投标和工程建设工作中,有关部门应当组织标准化咨询,认真听取标准化部门的意见和建议,作好标准化审查工作。

第三十九条 对制定标准、执行标准和宣传标准工作中做出突出业绩的人员和单位,应予以表扬和奖励。

第四十条 对不执行标准的单位与个人,应进行教育,并按考核规章制度进行处罚;对严重影响邮政企业形象或造成重大经济损失的,应对当事人和单位负责人追究责任,并给予相应的行政处分;构成犯罪的,由司法机关依法追究直接责任人的刑事责任。

第四十一条 对于销售、购入、引进不符合相关标准的设备和用品用具的单位与当事人,应对当事人和单位负责人追究责任,并按《邮政用品用具监督管理办法》和其他相关规定进行相应的经济处罚。造成人员伤亡、设备损失或其他严重危害社会后果的,追究有关人员的行政责任和对他人的损害赔偿责任;构成犯罪的,依法追究有关人员的刑事责任。

第四十二条 违反有关标准,造成人员伤亡、设备损失或其他严重危害社会后果的,追究有关人员的行政责任和对他人的损害赔偿责任;构成犯罪的,依法追究有关人员的刑事责任。

第四十三条 标准化工作的监督、检验、管理人员违法失职、徇私舞弊、滥用职权、索贿受贿的,由有关主管部门给予行政处分;构成犯罪的,由司法机关依法追究刑事责任。

第四十四条 对单位的经济处罚,其罚款一律从其自有资金中支付。对当事人及责任人的经济处罚,其罚款由本人支付,不得从公款中核销。

第七章 邮政标准化经费

第四十五条 邮政标准化经费应专款专用。

第四十六条 邮政标准化经费来源渠道:
(一) 国家邮政局划拨经费;
(二) 单位或部门自筹经费。

第四十七条 邮政标准化经费的相关规定见国家邮政局相关管理办法。

第八章 附 则

第四十八条 本办法由国家邮政局负责解释。

第四十九条 本办法自发布之日起实施。

附件:
省、自治区、直辖市两字母代码

附件1

省、自治区、直辖市两字母代码

名 称
字母码

北京市
BJ
天津市
TJ

河北省
HE

山西省
SX

内蒙古自治区
NM

辽宁省
LN

吉林省
JL

黑龙江
HL

上海市
SH

江苏省
JS

浙江省
ZJ

安徽省
AH

福建省
FJ

江西省
JX

山东省
SD

河南省
HA

湖北省
HB
湖南省
HN

广东省
HN

广西壮族自治区
GX

海南省
HI

重庆市
CQ

四川省
SC

贵州省
GZ

云南省
YN

西藏自治区
XZ

陕西省
SN

甘肃省
GS

青海省
QH

宁夏回族自治区
NX

新疆维吾尔自治区
XJ


深圳市职工劳动能力鉴定办法

广东省深圳市人民政府


深圳市人民政府令

第176号

  《深圳市职工劳动能力鉴定办法》已经市政府四届七十一次常务会议审议通过,现予发布,自2007年12月1日起施行。

市长 许宗衡
二○○七年十月三十一日

深圳市职工劳动能力鉴定办法

第一章 总 则

  第一条 为规范本市职工劳动能力鉴定工作,维护劳动者、用人单位的合法权益,根据有关法律、法规规定,结合本市实际,制定本办法。
  第二条 本市国家机关、企业、事业单位、社会团体、民办非企业单位和个体经济组织(以下简称用人单位)以及其职工需要进行劳动能力鉴定的,适用本办法。
  第三条 本办法所称劳动能力鉴定包括以下内容:
  (一)工伤(含职业病)的劳动功能障碍程度等级鉴定(含复查鉴定)、生活自理障碍程度的等级鉴定(含复查鉴定);
  (二)因病致残或非因工致残的伤残等级评定;
  (三)旧伤复发确认;
  (四)工伤、因病致残或非因工致残医疗终结日期的确认;
  (五)工伤医疗终结期延长的确认;
  (六)停工留薪期的确认;
  (七)工伤职工安装、维修或更换康复器具的确认。
  第四条 市劳动能力鉴定委员会进行劳动能力鉴定应当遵循实事求是、客观公正、秉公办事的原则。严禁以权谋私,弄虚作假。

第二章 组织机构和职责

  第五条 市人民政府设立劳动能力鉴定委员会(以下简称市劳动能力鉴定委员会),市劳动能力鉴定委员会设主任一名,副主任二名,委员若干名。主任由市劳动保障部门负责人担任,其他委员由市人事部门、市卫生部门、市财政部门、市总工会、市总商会、市妇联、市社会保险经办机构代表以及医学、法律等社会专业人员组成,社会专业人员不得少于五人。市劳动能力鉴定委员会定期召开会议,履行其相关职责。
  市劳动保障行政部门所属的市劳动能力鉴定委员会办公室为该委员会的办事机构,具体负责市劳动能力鉴定委员会的日常工作,定期向市劳动能力鉴定委员会报告工作。
  第六条 市劳动能力鉴定委员会履行下列职责:
  (一)宣传、贯彻、落实国家、广东省、深圳市有关劳动能力鉴定工作的法律、法规、规章和政策;
  (二)建立、健全市劳动能力鉴定规章制度和工作制度;
  (三)负责管理、组织和监督劳动能力鉴定工作;
  (四)负责专家咨询委员会和医疗鉴定专家库的建立与管理以及医疗鉴定专家的聘任;
  (五)根据专家咨询委员会或者专家组的鉴定意见作出劳动能力鉴定结论;
  (六)负责医疗鉴定专家的鉴定业务培训。
  第七条 市劳动能力鉴定委员会建立专家咨询委员会。专家咨询委员会由相关学科的权威医学专家组成。
  专家咨询委员会的鉴定专家应当具备下列条件:
  (一)具有医疗卫生高级专业技术职务任职资格的医学专业知名权威专家或者学科带头人;
  (二)熟练掌握劳动能力鉴定的相关专业知识;
  (三)具有良好的职业品德;
  (四)身体健康。
  专家咨询委员会鉴定专家由符合上述条件的医疗卫生专业技术人员申请并经所在单位推荐,由市劳动能力鉴定委员会考核聘任。聘期四年,期满可连续聘任。
  第八条 专家咨询委员会履行下列职责:
  (一)处理我市劳动能力鉴定中的疑难案件及技术问题;
  (二)提供劳动能力鉴定工作咨询服务;
  (三)劳动能力鉴定委员会交办的其他事项。
  第九条 市劳动能力鉴定委员会建立医疗鉴定专家库,专家库的医疗鉴定专家从具备下列条件的医疗卫生专业技术人员中聘任:
  (一)具有医疗卫生高级专业技术职务任职资格;
  (二)熟练掌握劳动能力鉴定的相关专业知识;
  (三)具有良好的职业品德;
  (四)身体健康。
  医疗鉴定专家由符合上述条件的医疗卫生专业技术人员本人申请并经所在单位推荐,由市劳动能力鉴定委员会考核聘任。医疗鉴定专家聘期二年,期满可连续聘任。
  第十条 医疗鉴定专家履行下列职责:
  (一)按照有关劳动能力鉴定的规定和标准,客观、独立地对被鉴定人进行医学鉴定,提出鉴定意见;
  (二)负责劳动能力鉴定的医学咨询、解释和指导;
  (三)协助和参与鉴定业务培训工作。
  第十一条 专家咨询委员会和医疗鉴定库的鉴定专家履行职责可以获得适当的报酬。

第三章 鉴定程序

第一节 申请和受理

  第十二条 因工伤申请劳动能力鉴定的,应由用人单位、工伤职工或者其近亲属按下列规定的期限向市劳动能力鉴定委员会提出申请:
  (一)医疗终结前已经作出工伤认定的,应当在医疗终结后三十日内提出申请;
  (二)医疗终结后作出工伤认定的,应当在作出工伤认定后三十日内提出申请;
  (三)申请旧伤复发鉴定的,应当在病情发生后治疗终结前提出。
  申请因病致残或非因工致残的等级评定和其他鉴定的,按照相关规定的时限提出申请。
  第十三条 自劳动能力鉴定结论作出之日起一年后,工伤职工或者其近亲属、所在单位或者社会保险经办机构认为伤残情况发生变化的,可以向市劳动能力鉴定委员会申请劳动能力复查鉴定。
  第十四条 申请人可以委托律师或者其他代理人申请劳动能力鉴定。委托律师和其他代理人申请劳动能力鉴定的,应当同时向市劳动能力鉴定委员会提交授权委托书。
  第十五条 申请人申请鉴定应当填写申请表,并提供鉴定所需的下列材料:
  (一)申请人为被鉴定人的,提供身份证明原件和复印件一份;申请人为工伤职工近亲属的,还应提供近亲属关系证明;申请人为单位的,应提供单位设立批准文件和复印件一份(加盖单位公章),经办人身份证原件和复印件一份以及单位的授权委托书(加盖单位公章);
  (二)被鉴定人身份证复印件一份(验原件);
  (三)门诊病历原件及复印件一份,经诊治医院核准的住院病例或者手术记录复印件一份(仅住院病人提供);
  (四)各项检查报告原件;
  (五)疾病诊断书或者职业病诊断证明书原件及复印件一份;
  (六)法律、法规和规章规定须提交的其他材料。
  因工伤申请劳动能力鉴定的,还需提交工伤认定书原件及其复印件一份。
  第十六条 市劳动能力鉴定委员会办公室或者市劳动能力鉴定委员会委托的市社会保险经办机构对申请人提交的申请表和相关材料进行审核、登记,并根据申请材料进行资格审查,材料齐全的,应当当场受理并发给劳动能力鉴定受理通知书;材料不齐全的,应当当即一次性书面告知其补齐材料。
  但对申请第三条第(一)项劳动能力鉴定的,还应当具备下列条件之一,市劳动能力鉴定委员会办公室方可受理:
  (一)被鉴定人或其近亲属提出申请的,被鉴定人应已满最短工伤医疗期且病情相对稳定;
  (二)用人单位单独申请的,被鉴定人应已满最长工伤医疗期且病情相对稳定。

第二节 鉴定专家组的组成

  第十七条 市劳动能力鉴定委员会办公室受理鉴定申请后,应当从医疗鉴定专家库中随机抽取三名或者五名相关医疗鉴定专家组成鉴定专家组。
  第十八条 被抽取的医疗鉴定专家有下列情形之一的,应当回避:
  (一)本人是申请人、被鉴定人,或者与申请人、被鉴定人及其代理人有利害关系的;
  (二)与鉴定结论有利害关系的;
  (三)因其他原因,可能影响作出公正鉴定结论的。
  医疗鉴定专家有上述回避情形的,申请人可以在鉴定之前提出回避申请,并说明理由。申请人在鉴定过程中发现有回避情形的,可以在鉴定结论作出之前提出。
  被申请回避的人员在市劳动能力鉴定委员会作出是否回避的决定前,应当暂停参与相关鉴定工作。
  市劳动能力鉴定委员会对申请人提出的回避申请,应当在申请提出之日起三日内,以书面形式作出决定。
  第十九条 医疗鉴定专家因回避或者其他原因不能履行职责的,市劳动能力鉴定委员会应当按本办法的规定重新抽取医疗鉴定专家,由重新抽取的医疗鉴定专家履行职责。

第三节 鉴 定

  第二十条 被鉴定人应持劳动能力鉴定受理通知书在指定的时间及地点进行鉴定;有特殊情形的,申请人可提交书面申请并经市劳动能力鉴定委员会批准,延期进行鉴定。申请延期的时间不计算在劳动能力鉴定时限内。
  被鉴定人逾期未到指定地点进行鉴定,视为放弃本次鉴定。申请人仍需要鉴定的,应当依照本办法重新提出鉴定申请。
  第二十一条 鉴定专家组对被鉴定人进行鉴定时,认为鉴定所需资料不齐或者需要进一步检查、治疗或者调查核实资料的,鉴定专家组应当按以下规定处理:
  (一)对资料不齐全的,应当一次性书面告知其补齐资料,并告知其下次鉴定时间和地点;
  (二)对需要进一步检查的,应当书面告知用人单位、被鉴定人或者其近亲属应当在六十日内提交有关检查资料和检查结果;
  (三)对需要进一步治疗的,应当书面告知用人单位、被鉴定人或者其近亲属应当在规定的时间内进行治疗,并在完成治疗之日起十日内,提交有关治疗资料;
  (四)鉴定专家组认为有必要对资料进行调查核实的,应当在十个工作日内调查核实清楚;经调查核实应当继续鉴定的,市劳动能力鉴定委员会办公室应当书面告知下次鉴定时间和地点。
  要求被鉴定人补齐资料或需进一步检查、治疗的,被鉴定人应当按规定时间补齐资料或者进行检查、治疗;被鉴定人未按规定时间补齐资料或者进行检查、治疗的,视为放弃本次鉴定。
  补齐资料、检查、治疗以及调查核实资料所需时间,不计算在劳动能力鉴定时限内。
  第二十二条 市劳动能力鉴定委员会在进行医疗终结期、停工留薪期确认的,应当按照国家、广东省、深圳市的有关规定执行。
  多部位或组织器官受到损害进行医疗终结期、停工留薪期确认的,以受损部位最长的医疗期为准,各受损部位医疗期时间不得累加。
  第二十三条 鉴定专家组根据国家、广东省、深圳市有关规定,客观地对被鉴定人进行医学鉴定,提出劳动能力鉴定意见,并在三日内报市劳动能力鉴定委员会。
  医疗鉴定专家意见不一致的,劳动能力鉴定意见应当按照多数医疗鉴定专家的意见作出,少数医疗鉴定专家的意见应当记入笔录。医疗鉴定专家组不能形成多数意见的,由市劳动能力鉴定委员会办公室提交专家咨询委员会研究提出鉴定意见,市劳动能力鉴定委员会根据专家咨询委员会的鉴定意见做出鉴定决定。专家咨询委员会鉴定专家有本办法第十五条第一款规定回避情形的,应当回避。
  第二十四条 市劳动能力鉴定委员会应当自收到劳动能力鉴定申请之日起六十日内根据医疗鉴定专家组的鉴定意见,作出劳动能力鉴定结论;必要时,作出劳动能力鉴定结论的期限可以延长三十日。
  第二十五条 劳动能力鉴定结论书应当载明下列事项:
  (一)用人单位名称;
  (二)申请人的姓名或者名称;
  (三)被鉴定人的姓名、性别、身份证号码;
  (四)医疗鉴定专家组鉴定依据的国家有关规定和标准的相关条款;
  (五)鉴定结论;
  (六)不服鉴定结论可否申请复审或者再次鉴定,以及申请复审或者再次鉴定的部门和期限;
  (七)作出鉴定结论的日期。
  劳动能力鉴定结论书应加盖市劳动能力鉴定委员会的公章。
  第二十六条 劳动能力鉴定结论书应当同时送达用人单位、被鉴定人及其他申请人。
  第二十七条 对劳动能力鉴定结论书中的文字错误或者遗漏事项,市劳动能力鉴定委员会应当补正;申请人自收到劳动能力鉴定结论之日起三十日内,可以申请市劳动能力鉴定委员会补正。
  第二十八条 劳动能力鉴定结论书自作出之日起发生法律效力。

第四节 复审鉴定

  第二十九条 用人单位、被鉴定人及其近亲属对市劳动能力鉴定委员会作出的鉴定结论不服的,可以依照有关规定自收到该鉴定结论之日起十五日内向市劳动能力鉴定委员会申请复审鉴定。
  市劳动能力鉴定委员会收到劳动能力复审鉴定申请后,从医疗鉴定专家库中随机抽取三名或者五名相关医疗鉴定专家组成专家组,由专家组提出复审鉴定意见;必要时,可委托具备资格的医疗机构协助进行有关的诊断。
  医疗鉴定专家在进行复审鉴定时有本办法第十五条第一款规定回避情形的,应当回避;申请人也可以提出回避申请,并说明理由。
  参与首次鉴定的医疗鉴定专家不得参与复审鉴定。
  其他未予明确规定的复审鉴定程序,参照本办法规定的首次鉴定程序执行。
  第三十条 用人单位、被鉴定人及其近亲属对市劳动能力鉴定委员会作出的复审鉴定结论不服的,可以自收到该鉴定结论之日起十五日内依照有关规定向广东省劳动能力鉴定委员会申请再次鉴定。
第四章 鉴定费用

  第三十一条 市劳动能力鉴定委员会进行劳动能力鉴定按规定收取鉴定费。
  鉴定费应在鉴定前支付。
  鉴定费专款专用,实行收支两条线管理。
  第三十二条 因病或者非因工致残的职工申请劳动能力鉴定,可以按照下列规定向市劳动能力鉴定委员会申请减交或者免交鉴定费:
  (一)最低生活保障对象或者领取失业保险金的人员可以申请免交鉴定费;
  (二)因自然灾害等不可抗力造成生活困难,正在接受社会救济或者属于国家规定的优抚、安置对象的人员可以申请减交鉴定费。
  因工伤申请劳动能力鉴定的职工属于上款所列情形的,可以申请缓交鉴定费。
  市劳动能力鉴定委员会办公室应当在收到申请之日起三个工作日内作出是否同意缓交、减交或者免交的决定。
  第三十三条 因工伤申请劳动能力鉴定的,参保工伤职工的鉴定费,由工伤保险基金按规定报销;未参保工伤职工的鉴定费,由用人单位支付。
  因病或非因工伤残申请鉴定的,鉴定费由申请人支付。
  复审鉴定后等级发生变更的,申请人不承担鉴定费;未发生变更的,申请人应当承担鉴定费。

第五章 罚 则

  第三十四条 市劳动能力鉴定委员会的工作人员在鉴定过程中,徇私舞弊、收受贿赂、滥用职权、失职渎职,或者侵犯当事人合法权益的,由其所在单位或者有关行政主管部门依法给予处分;情节严重,涉嫌犯罪的,依法移送司法机关处理。
  第三十五条 从事劳动能力鉴定的医疗鉴定专家有下列情形之一的,市劳动能力鉴定委员会应当予以解聘;情节严重,涉嫌犯罪的,依法移送司法机关处理:
  (一)无正当理由不履行职责的;
  (二)以权谋私,弄虚作假的;
  (三)违反回避原则的;
  (四)收受申请人、被鉴定人及其代理人的财物的;
  (五)其他违法行为的。
  第三十六条 用人单位、被鉴定人及其近亲属提供虚假材料影响鉴定结论的,该鉴定结论无效。利用虚假鉴定结论进行诈骗的,由劳动保障行政部门依法处理;情节严重,涉嫌犯罪的,依法移送司法机关处理。

第六章 附 则

  第三十七条 劳动保障部门或者人事部门委托的工伤直接导致疾病确认的鉴定参照本办法执行。
  受劳动保障部门或者人事部门委托所作出的工伤直接导致疾病的确认结论,仅作为工伤认定的证明材料。
  第三十八条 无营业执照或者未经依法登记、备案的单位以及被依法吊销营业执照或者撤销登记、备案的单位受到事故伤害或者患职业病的职工,或者用人单位使用童工造成伤残、死亡需要进行劳动能力鉴定的,参照本办法执行。劳动能力鉴定费用由伤亡职工或者童工所在单位支付。
  第三十九条 市劳动能力鉴定委员会应当自本办法实施之日起六个月内制定相应的工作规则。
  第四十条 本办法自2007年12月1日起实施,《深圳经济特区职工伤、病、残劳动能力鉴定暂行办法》(1989年7月6日深圳市人民政府公布,1993年10月21日深圳市人民政府令第16号重新公布)同时废止。