Guidelines on the Risk Management of Commercial Banks’ Information Technology

作者:法律资料网 时间:2024-06-03 02:19:43   浏览:9564   来源:法律资料网
下载地址: 点击此处下载

Guidelines on the Risk Management of Commercial Banks’ Information Technology ——附加英文版

China Banking Regulatory Commission


Guidelines on the Risk Management of Commercial Banks’ Information Technology





Chapter I General Provisions

Article 1. Pursuant to the Law of the People’s Republic of China on Banking Regulation and Supervision, the Law of the People's Republic of China on Commercial Banks, the Regulations of the People’s Republic of China on Administration of Foreign-funded Banks, and other applicable laws and regulations, the Guidelines on the Risk Management of Commercial Banks’ Information Technology (hereinafter referred to as the Guidelines) is formulated.

Article 2. The Guidelines apply to all the commercial banks legally incorporated within the territory of the People’s Republic of China.

The Guidelines may apply to other banking institutions including policy banks, rural cooperative banks, urban credit cooperatives, rural credit cooperatives, village banks, loan companies, financial asset management companies, trust and investment companies, finance firms, financial leasing companies, automobile financial companies and money brokers.


Article 3. The term “information technology” stated in the Guidelines shall refer to the system built with computer, communication and software technologies, and employed by commercial banks to handle business transactions, operation management, and internal communication, collaborative work and controls. The term also include IT governance, IT organization structure and IT policies and procedures.

Article 4. The risk of information technology refers to the operational risk, legal risk and reputation risk that are caused by natural factor, human factor, technological loopholes or management deficiencies when using information technology.

Article 5. The objective of information system risk management is to establish an effective mechanism that can identify, measure, monitor, and control the risks of commercial banks’ information system, ensure data integrity, availability, confidentiality and consistency, provide the relevant early warning, and thereby enable commercial banks’ business innovations, uplift their capability in utilizing information technology, improve their core competitiveness and capacity for sustainable development.



Chapter II IT governance

Article 6. The legal representative of commercial bank should be responsible to ensure compliance of this guideline.

Article 7. The board of directors of commercial banks should have the following responsibilities with respect to the management of information systems:
(1) Implementing and complying with the national laws, regulations and technical standards pertaining to the management of information systems, as well as the regulatory requirements set by the China Banking Regulatory Commission (hereinafter referred to as the “CBRC”);
(2) Periodically reviewing the alignment of IT strategy with the overall business strategies and significant policies of the bank, assessing the overall effectiveness and efficiency of the IT organization.
(3) Approving IT risk management strategies and policies, understanding the major IT risks involved, setting acceptable levels for these risks, and ensuring the implementation of the measures necessary to identify, measure, monitor and control these risks.
(4) Setting high ethical and integrity standards, and establishing a culture within the bank that emphasizes and demonstrates to all levels of personnel the importance of IT risk management.
(5) Establishing an IT steering committee which consists of representatives from senior management, the IT organization, and major business units, to oversee these responsibilities and report the effectiveness of strategic IT planning, the IT budget and actual expenditure, and the overall IT performance to the board of directors and senior management periodically.
(6) Establishing IT governance structure, proper segregation of duty, clear role and responsibility, maintaining check and balances and clear reporting relationship. Strengthening IT professional staff by developing incentive program.
(7) Ensuring that there is an effective internal audit of the IT risk management carried out by operationally independent, well-trained and qualified staff. The internal audit report should be submitted directly to the IT audit committee;
(8) Submitting an annual report to the CBRC and its local offices on information system risk management that has been reviewed and approved by the board of directors ;
(9) Ensuring the appropriating funding necessary for IT risk management works;
(10) Ensuring that all employees of the bank fully understand and adhere to the IT risk management policies and procedures approved by the board of directors and the senior management, and are provided with pertinent training.
(11) Ensuring customer information, financial information, product information and core banking system of the legal entity are held independently within the territory, and complying with the regulatory on-site examination requirements of CBRC and guarding against cross-border risk.
(12) Reporting in a timely manner to the CBRC and its local offices any serious incident of information systems or unexpected event, and quickly respond to it in accordance with the contingency plan;
(13) Cooperating with the CBRC and its local offices in the supervisory inspection of the risk management of information systems, and ensure that supervisory opinions are followed up; and
(14) Performing other related IT risk management tasks.

Article 8. The head of the IT organization, commonly known as the Chief Information Officer (CIO) should report directly to the president. Roles and responsibilities of the CIO should include the following:
(1) Playing a direct role in key decisions for the business development involving the use of IT in the bank;
(2) The CIO should ensure that information systems meet the needs of the bank, and IT strategies, in particular information system development strategies, comply with the overall business strategies and IT risk management policies of the bank;
(3) The CIO should also be responsible for the establishment of an effective and efficient IT organization to carry out the IT functions of the bank. These include the IT budget and expenditure, IT risk management, IT policies, standards and procedures, IT internal controls, professional development, IT project initiatives, IT project management, information system maintenance and upgrade, IT operations, IT infrastructure, Information security, disaster recovery plan (DRP), IT outsourcing, and information system retirement;
(4) Ensuring the effectiveness of IT risk management throughout the organization including all branches.
(5) Organizing professional trainings to improve technical proficiency of staff.
(6) Performing other related IT risk management tasks.

Article 9. Commercial banks should ensure that a clear definition of the IT organization structure and documentation of all job descriptions of important positions are always in place and updated in a timely manner. Staff in each position should meet relevant requirements on professional skills and knowledge. The following risk mitigation measures should be incorporated in the management program of related staff:
(1) Verification of personal information including confirmation of personal identification issued by government, academic credentials, prior work experience, professional qualifications;
(2) Ensuring that IT staff can meet the required professional ethics by checking character reference;
(3) Signing of agreements with employees about understanding of IT policies and guidelines, non-disclosure of confidential information, authorized use of information systems, and adherence to IT policies and procedures; and
(4) Evaluation of the risk of losing key IT personnel, especially during major IT development stage or in a period of unstable IT operations, and the relevant risk mitigation measures such as staff backup arrangement and staff succession plan.

Article 10. Commercial banks should establish or designate a particular department for IT risk management. It should report directly to the CIO and the Chief Risk Officer (or risk management committee), serve as a member of the IT incident response team, and be responsible for coordinating the establishment of policies regarding IT risk management, especially the areas of information security, BCP, and compliance with the CBRC regulations, advising the business departments and IT department in implementing these policies, providing relevant compliance information, conducting on-going assessment of IT risks, and ensuring the follow-up of remediation advice, monitoring and escalating management of IT threats and non-compliance events.

Article 11. Commercial banks should establish a special IT audit role and responsibility within internal audit function, which should put in place IT audit policies and procedures, develop and execute IT audit plan.

Article 12. Commercial banks should put in place policies and procedures to protect intellectual property rights according to laws regarding intellectual properties, ensure purchase of legitimate software and hardware, prevention of the use of pirated software, and the protection of the proprietary rights of IT products developed by the bank, and ensure that these are fully understood and complied by all employees.

Article 13. Commercial banks should, in accordance with relevant laws and regulations, disclose the risk profile of their IT normatively and timely.


Chapter III IT Risk Management

Article 14. Commercial banks should formulate an IT strategy that aligns with the overall business plan of the bank, IT risk assessment plan and an IT operational plan that can ensure adequate financial resources and human resources to maintain a stable and secure IT environment.

Article 15. Commercial banks should put in place a comprehensive set of IT risk management policies that include the following areas:
(1) Information security classification policy
(2) System development, testing and maintenance policy
(3) IT operation and maintenance policy
(4) Access control policy
(5) Physical security policy
(6) Personnel security policy
(7) Business Continuity Planning and Crisis and Emergency Management procedure

Article 16. Commercial banks should maintain an ongoing risk identification and assessment process that allows the bank to pinpoint the areas of concern in its information systems, assess the potential impact of the risks on its business, rank the risks, and prioritize mitigation actions and the necessary resources (including outsourcing vendors, product vendors and service vendors).

Article 17. Commercial banks should implement a comprehensive set of risk mitigation measures complying with the IT risk management policies and commensurate with the risk assessment of the bank. These mitigation measures should include:
(1) A set of clearly documented IT risk policies, technical standards, and operational procedures, which should be communicated to the staff frequently and kept up to date in a timely manner;
(2) Areas of potential conflicts of interest should be identified, minimized, and subject to careful, independent monitoring. Also it requires that an appropriate control structure is set up to facilitate checks and balances, with control activities defined at every business level, which should include:
- Top level reviews;
- Controls over physical and logical access to data and system;
- Access granted on “need to know” and “minimum authorization” basis;
- A system of approvals and authorizations; and
- A system of verification and reconciliation.

Article 18. Commercial banks should put in place a set of ongoing risk measurement and monitoring mechanisms, which should include
(1) Pre and post-implementation review of IT projects;
(2) Benchmarks for periodic review of system performance;
(3) Reports of incidents and complaints about IT services;
(4) Reports of internal audit, external audit, and issues identified by CBRC; and
(5) Arrangement with vendors and business units for periodic review of service level agreements (SLAs).
(6) The possible impact of new development of technology and new threats to software deployed.
(7) Timely review of operational risk and management controls in operation area.
(8) Assess the risk profile on IT outsourcing projects periodically.

Article 19. Chinese commercial banks operating offshore and the foreign commercial banks in China should comply with the relevant regulatory requirements on information systems in and outside the People’s Republic of China.


Chapter IV Information Security

Article 20. Information technology department of commercial banks should oversee the establishment of an information classification and protection scheme. All employees of the bank should be made aware of the importance of ensuring information confidentiality and provided with the necessary training to fully understand the information protection procedures within their responsibilities.

Article 21. Commercial banks should put in place an information security management function to develop and maintain an ongoing information security management program, promote information security awareness, advise other IT functions on security issues, serve as the leader of IT incident response team, and report the evaluation of the information security of the bank to the IT steering committee periodically. The Information security management program should include Information security standards, strategy, an implementation plan, and an ongoing maintenance plan.
Information security policy should include the following areas:
(1) IT security policy management
(2) Organization information security
(3) Asset management
(4) Personnel security
(5) Physical and environment security
(6) Communication and operation security
(7) Access control and authentication
(8) Acquirement, development and maintenance of information system
(9) Information security event management
(10) Business continuity management
(11) Compliance

Article 22. Commercial banks should have an effective process to manage user authentication and access control. Access to data and system should be strictly limited to authorized individuals whose identity is clearly established, and their activities in the information systems should be limited to the minimum required for their legitimate business use. Appropriate user authentication mechanism commensurate with the classification of information to be accessed should be selected. Timely review and removal of user identity from the system should be implemented when user transfers to a new job or leave the commercial bank.

Article 23. Commercial banks should ensure all physical security zones, such as computer centers or data centers, network closets, areas containing confidential information or critical IT equipment, and respective accountabilities are clearly defined, and appropriate preventive, detective, and recuperative controls are put in place.

Article 24. Commercial banks should divide their networks into logical security domains (hereinafter referred to as the “domain”) with different levels of security. The following security factors have to be assessed in order to define and implement effective security controls, such as physical or logical segregation of network, network filtering, logical access control, traffic encryption, network monitoring, activity log, etc., for each domain and the whole network.
(1) criticality of the applications and user groups within the domain;
(2) Access points to the domain through various communication channels;
(3) Network protocols and ports used by the applications and network equipment deployed within the domain;
(4) Performance requirement or benchmark;
(5) Nature of the domain, i.e. production or testing, internal or external;
(6) Connectivity between various domains; and
(7) Trustworthiness of the domain.

Article 25. Commercial banks should secure the operating system and system software of all computer systems by
(1) Developing baseline security requirement for each operating system and ensuring all systems meet the baseline security requirement;
(2) Clearly defining a set of access privileges for different groups of users, namely, end-users, system development staff, computer operators, and system administrators and user administrators;
(3) Setting up a system of approval, verification, and monitoring procedures for using the highest privileged system accounts;
(4) Requiring technical staff to review available security patches, and report the patch status periodically; and
(5) Requiring technical staff to include important items such as unsuccessful logins, access to critical system files, changes made to user accounts, etc. in system logs, monitors the systems for any abnormal event manually or automatically, and report the monitoring periodically.

Article 26. Commercial banks should ensure the security of all the application systems by
(1) Clearly defining the roles and responsibilities of end-users and IT staff regarding the application security;
(2) Implementing a robust authentication method commensurate with the criticality and sensibility of the application system;
(3) Enforcing segregation of duties and dual control over critical or sensitive functions;
(4) Requiring verification of input or reconciliation of output at critical junctures;
(5) Requiring the input and output of confidential information are handled in a secure manner to prevent theft, tampering, intentional leakage, or inadvertent leakage;
(6) Ensuring system can handle exceptions in a predefined way and provide meaningful message to users when the system is forced to terminate; and
(7) Maintaining audit trail in either paper or electronic format.
(8) Requiring user administrator to monitor and review unsuccessful logins and changes to users accounts.

Article 27. Commercial banks should have a set of policies and procedures controlling the logging of activities in all production systems to support effective auditing, security forensic analysis, and fraud prevention. Logging can be implemented in different layers of software and on different computer and networking equipment, which falls into two broad categories:
(1) Transaction journals. They are generated by application software and database management system, and contain authentication attempts, modification to data, error messages, etc. Transaction journals should be kept according to the national accounting policy.
(2) System logs. They are generated by operating systems, database management system, firewalls, intrusion detection systems, and routers, etc., and contain authentication attempts, system events, network events, error messages, etc. System logs should be kept for a period scaled to the risk classification, but no less than one year.
Banks should ensure that sufficient items be included in the logs to facilitate effective internal controls, system troubleshooting, and auditing while taking appropriate measures to ensure time synchronization on all logs. Sufficient disk space should be allocated to prevent logs from being overwritten. System logs should be reviewed for any exception. The review frequency and retention period for transaction logs or database logs should be determined jointly by IT organization and pertinent business lines, and approved by the IT steering committee.

Article 28. Commercial banks should have the capacity to employ encryption technologies to mitigate the risk of losing confidential information in the information systems or during its transmission. Appropriate management processes of the encryption facilities should be put in place to ensure that
(1) Encryption facilities in use should meet national security standards or requirements;
(2) Staff in charge of encryption facilities are well trained and screened;
(3) Encryption strength is adequate to protect the confidentiality of the information; and
(4) Effective and efficient key management procedures, especially key lifecycle management and certificate lifecycle management, are in place.

Article 29. Commercial banks should put in place an effective and efficient system of securing all end-user computing equipment which include desktop personal computers (PCs), portable PCs, teller terminals, automatic teller machines (ATMs), passbook printers, debit or credit card readers, point of sale (POS) terminals, personal digital assistant (PDAs), etc and conduct periodic security checks on all equipments.

Article 30. Commercial banks should put in place a set of policies and procedures to govern the collection, processing, storage, transmission, dissemination, and disposal of customer information.

Article 31. All employees, including contract staff, should be provided with the necessary trainings to fully understand these policies procedures and the consequences of their violation. Commercial banks should adopt a zero tolerance policy against security violation.


Chapter V Application System Development, Testing and Maintenance

Article 32. Commercial banks should have the capability to identify, plan, acquire, develop, test, deploy, maintain, upgrade, and retire information systems. Policies and procedures should be in place to govern the initiation, prioritization, approval, and control of IT projects. Progress reports of major IT projects should be submitted to and reviewed by the IT steering committee periodically. Decisions involving significant change of schedule, change of key personnel, change of vendors, and major expenditures should be included in the progress report.

Article 33. Commercial banks should recognize the risks associated with IT projects, which include the possibilities of incurring various kinds of operational risk, financial losses, and opportunity costs stemming from ineffective project planning or inadequate project management controls of the bank. Therefore, appropriate project management methodologies should be adopted and implemented to control the risks associated with IT projects.

Article 34. Commercial banks should adopt and implement a system development methodology to control the life cycle of Information systems. The typical phases of system life cycle include system analysis, design, development or acquisition, testing, trial run, deployment, maintenance, and retirement. The system development methodology to be used should be commensurate with the size, nature, and complexity of the IT project, and, generally speaking, should facilitate the management of the following risks.

Article 35. Commercial banks should ensure system reliability, integrity, and maintainability by controlling system changes with a set of policies and procedures, which should include the following elements.
(1) Ensure that production systems are separated from development or testing systems;
(2) Separating the duties of managing production systems and managing development or testing systems;
(3) Prohibiting application development and maintenance staff from accessing production system under normal circumstances unless management approval is granted to perform emergency repair, and all emergency repair activities should be recorded and reviewed promptly;
(4) Promoting changes of program or system configuration from development and testing systems to production systems should be jointly approved by IT organization and business departments, properly documented, and reviewed periodically.

Article 36. Commercial banks should have in place a set of policies, standards, and procedures to ensure data integrity, confidentiality, and availability. These policies should be in accordance with data integrity amid IT development procedure.

Article 37. Commercial banks should ensure that Information system problems could be tracked, analyzed, and resolved systematically through an effective problem management process. Problems should be documented, categorized, and indexed. Support services or technical assistance from vendors, if necessary, should also be documented. Contacts and relevant contract information should be made readily available to the employees concerned. Accountability and line of command should be delineated clearly and communicated to all employees concerned, which is of utmost importance to performing emergency repair.

Article 38. Commercial banks should have a set of policies and procedures controlling the process of system upgrade. System upgrade is needed when the hardware reaches its lifespan or runs out of capacity, the underpinning software, namely, operating system, database management system, middleware, has to be upgraded, or the application software has to be upgraded. The system upgrade should be treated as a project and managed by all pertinent project management controls including user acceptance testing.


Chapter VI IT Operations

Article 39. Commercial banks should consider fully the environmental threats (e.g. proximity to natural disaster zones, dangerous or hazardous facilities or busy/major roads) when selecting the locations of their data centers. Physical and environmental controls should be implemented to monitor environmental conditions could affect adversely the operation of information processing facilities. Equipment facilities should be protected from power failures and electrical supply interference.

Article 40. In controlling access by third-party personnel (e.g. service providers) to secured areas, proper approval of access should be enforced and their activities should be closely monitored. It is important that proper screening procedures including verification and background checks, especially for sensitive technology-related jobs, are developed for permanent and temporary technical staff and contractors.

Article 41. Commercial banks should separate IT operations or computer center operations from system development and maintenance to ensure segregation of duties within the IT organization. The commercial banks should document the roles and responsibilities of data center functions.

Article 42. Commercial banks are required to retain transactional records in compliance with the national accounting policy. Procedures and technology are needed to be put in place to ensure the integrity, safekeeping and retrieval requirements of the archived data.



Article 43. Commercial banks should detail operational instructions such as computer operator tasks, job scheduling and execution in the IT operations manual. The IT operations manual should also cover the procedures and requirements for on-site and off-site backup of data and software in both the production and development environments (i.e. frequency, scope and retention periods of back-up).

Article 44. Commercial banks should have in place a problem management and processing system to respond promptly to IT operations incidents, to escalate reported incidents to relevant IT management staff and to record, analyze and keep tracks of all these incidents until rectification of the incidents with root cause analysis completed. A helpdesk function should be set up to provide front-line support to users on all technology-related problems and to direct the problems to relevant IT functions for investigation and resolution.

Article 45. Commercial banks should establish service level agreement and assess the IT service level standard attained.

Article 46. Commercial banks should implement a process to ensure that the performance of application systems is continuously monitored and exceptions are reported in a timely and comprehensive manner. The performance monitoring process should include forecasting capability to enable exceptions to be identified and corrected before they affect system performance.

Article 47. Commercial banks should carry out capacity plan to cater for business growth and transaction increases due to changes of economic conditions. Capacity plan should be extended to cover back-up systems and related facilities in addition to the production environment.

Article 48. Commercial banks should ensure the continued availability of technology related services with timely maintenance and appropriate system upgrades. Proper record keeping (including suspected and actual faults and preventive and corrective maintenance records) is necessary for effective facility and equipment maintenance.

Article 49. Commercial banks should have an effective change management process in place to ensure integrity and reliability of the production environment. Commercial banks should develop a formal change management process.


Chapter VII Business Continuity Management

Article 50. Commercial banks should have in place appropriate arrangements, having regard to the nature, scale and complexity of its business, to ensure that it can continue to function and meet its regulatory obligations in the event of an unforeseen interruption. These arrangements should be regularly updated and tested to ensure their effectiveness.

Article 51. Commercial banks should consider the likelihood and impact of a disruption to the continuity of its operation from unexpected events. This should include assessing the disruptions to which it is particularly susceptible including but not limited to:
(1) Loss of failure of internal and external resources (such as people, systems and other assets);
(2) The loss or corruption of its information; and
(3) External events (such as war, earthquake, typhoon, etc).

Article 52. Commercial bank should act to reduce both the likelihood of disruptions (including system resilience and dual processing); and the impact of disruptions (including by contingency arrangements and insurance).

Article 53. Commercial bank should document its strategy for maintaining continuity of its operations, and its plans for communicating and regularly testing the adequacy and effectiveness of this strategy. Commercial bank should establish:
(1) Formal business continuity plans that outline arrangements to reduce the impact of a short, medium and long-term disruption, including:
a) Resource requirements such as people, systems and other assets, and arrangements for obtaining these resources;
b) The recovery priorities for the commercial bank’s operations; and
c) Communication arrangements for internal and external concerned parties (including CBRC, clients and the press);
(2) Escalation and invocation plans that outline the processes for implementing the business continuity plans, together with relevant contact information;
(3) Processes to validate the integrity of information affected by the disruption;
(4) Processes to review and update (1) to (3) following changes to the commercial bank’s operations or risk profile.

Article 54. A final BCP plan and an annual drill result must be signed off by the IT Risk management, or internal auditor and IT Steering Committee.


Chapter VIII Outsourcing

Article 55. Commercial banks cannot contract out its regulatory obligations and should take reasonable care to supervise the discharge of outsourcing functions.

Article 56. Commercial banks should take particular care to manage material outsourcing arrangement (such as outsourcing of data center, IT infrastructure, etc.), and should notify CBRC when it intends to enter into material outsourcing arrangement.

Article 57. Before entering into, or significantly changing, an outsourcing arrangement, the commercial bank should:
(1) Analyze how the arrangement will fit with its organization and reporting structure; business strategy; overall risk profile; and ability to meet its regulatory obligations;
(2) Consider whether the arrangements will allow it to monitor and control its operational risk exposure relating to the outsourcing;
(3) Conduct appropriate due diligence of the service provider’s financial stability, expertise and risk assessment of the service provider, facilities and ability to cover the potential liabilities;
(4) Consider how it will ensure a smooth transition of its operations from its current arrangements to a new or changed outsourcing arrangement (including what will happen on the termination of the contract); and
(5) Consider any concentration risk implications such as the business continuity implications that may arise if a single service provider is used by several firms.

Article 58. In negotiating its contract with a service provider, the commercial bank should have regard to ( but not limited to ):
(1) Reporting and negotiation requirements it may wish to impose on the service provider;
(2) Whether sufficient access will be available to its internal auditors, external auditors and banking regulators;
(3) Information ownership rights, confidentiality agreements and Firewalls to protect client and other information (including arrangements at the termination of contract);
(4) The adequacy of any guarantees and indemnities;
(5) The extent to which the service provider must comply with the commercial bank’s polices and procedures covering IT Risk;
(6) The extent to which the service provider will provide business continuity for outsourced operations, and whether exclusive access to its resources is agreed;
(7) The need for continued availability of software following difficulty at a third party supplier;
(8) The processes for making changes to the outsourcing arrangement and the conditions under which the commercial bank or service provider can choose to change or terminate the outsourcing arrangement, such as where there is:
a) A change of ownership or control of the service provider or commercial bank; or
b) Significant change in the business operations of the service provider or commercial bank; or
c) Inadequate provision of services that may lead to the commercial bank being unable to meet its regulatory obligations.

Article 59. In implementing a relationship management framework, and drafting the service level agreement with the service provider, the commercial bank should have regarded to (but not limited to):
(1) The identification of qualitative and quantitative performance targets to assess the adequacy of service provision, to both the commercial bank and its clients, where appropriate;
(2) The evaluation of performance through service delivery reports and periodic self assessment and independent review by internal or external auditors; and
(3) Remediation action and escalation process for dealing with inadequate performance.

Article 60. The commercial bank should enhance IT related outsourcing management, in place following (not limited to ) measures to ensure data security of sensitive information such as customer information:
(1) Effectively separated from other customer information of the service provider;
(2) The related staff of service provider should be authorized on “need to know” and “minimum authorization” basis;
(3) Ensure service provider guarantee its staff for meeting the confidential requests;
(4) All outsourcing arrangements related to customer information should be identified as material outsourcing arrangements and the customers should be notified;
(5) Strictly monitor re-outsourcing actions of the service provider, and implement adequate control measures to ensure information security of the bank;
(6) Ensure all related sensitive information be refunded or deleted from the service provider’s storage when terminating the outsourcing arrangement.


Article 61. The commercial bank should ensure that it has appropriate contingency in the event of a significant loss of services from the service provider. Particular issues to consider include a significant loss of resources, turnover of key staff, or financial failure of, the service provider, and unexpected termination of the outsourcing agreement.

Article 62. All outsourcing contracts must be reviewed or signed off by IT Risk management, internal IT auditors, legal department and IT Steering Committee. There should be a process to periodically review and refine the service level agreements.


Chapter IX Internal Audit

Article 63. Depending on the nature, scale and complexity of its business, it may be appropriate for the commercial banks to delegate much of the task of monitoring the appropriateness and effectiveness of its systems and controls to an internal audit function. An internal audit function should be adequately resourced and staffed by competent individuals, be independent of the day-to-day activities of the commercial bank and have appropriate access to the bank’s records.

Article 64. The responsibilities of the internal IT audit function are:
(1) To establish, implement and maintain an audit plan to examine and evaluate the adequacy and effectiveness of the bank’s systems and internal control mechanisms and arrangements;
(2) To issue recommendations based on the result of work carried out in accordance with 1;
(3) To verify compliance with those recommendations;
(4) To carry out special audit on information technology. The term “special audit” of information technology refers to the investigation, analysis and assessment on the security incidents of the information system, or the audit performed on a special subject based on IT risk assessment result as deemed necessary by the audit department.

Article 65. Based on the nature, scale and complexity of its business, deployment of information technology and IT risk assessment, commercial banks could determine the scope and frequency of IT internal audit. However, a comprehensive IT internal audit shall be performed at a minimum once every 3 years.

Article 66. Commercial banks should engage its internal audit department and IT Risk management department when implementing system development of significant size and scale to ensure it meets the IT Risk standards of the Commercial banks.


Chapter X External Audit

Article 67. The external information technology audit of commercial banks can be carried out by certified service providers in accordance with laws, rules and regulations.

Article 68. The commercial bank should ensure IT audit service provider to review and examine bank’s hardware, software, documentation and data to identify IT risk when they are commissioned to perform the audit. Vital commercial and technical information which is protected by national laws and regulations should not be reviewed.

Article 69. Commercial bank should communicate with the service provider in depth before the audit to determine audit scope, and should not withhold the truth or do not corporate with the service provider intentionally.

Article 70. CBRC and its local offices could designate certified service providers to carry out IT audit or related review on commercial banks when needed. When carrying out audit on commercial banks, as commissioned or authorized by CBRC or its local offices, the service providers shall present the letter of authority, and carry out the audit in accordance to the scope prescribed in the letter of authority.

Article 71. Once the IT audit report produced by the service providers is reviewed and approved by CBRC or its local offices, the report will have the same legal status as if it is produced by the CBRC itself. Commercial banks should come up with a correction action plan prescribed in the report and implement the corrective actions according to the timeframe.

Article 72. Commercial banks should ensure the service providers to strictly comply with laws and regulations to keep confidential and data security of any commercial secrets and private information learnt and IT risk information when conducting the audit. The service provider should not modify copy or take away any documents provided by the commercial banks.


Chapter XI Supplementary Provisions

Article 73. Commercial banks with no board of directors should have their operating decision-making bodies perform the responsibilities of the board with regard to IT risk management specified herein.

Article 74. The China Banking Regulatory Commission supervises and regulates the IT risk management of commercial banks under its authority by law.

Article 75. The power of interpretation and modification of the Guidelines shall rest with the China Banking Regulatory Commission.

Article 76. The Guidelines shall become effective as of the date of its issuance and the former Guidelines on the Risk Management of Banking Institutions’ Information Systems shall be revoked at the same time.


下载地址: 点击此处下载

吉林省人民政府办公厅关于转发省农委制定的吉林省绿色食品基地建设方案的通知

吉林省人民政府办公厅


吉林省人民政府办公厅关于转发省农委制定的吉林省绿色食品基地建设方案的通知

  吉政办发〔2002〕8号各市州、县(市)人民政府,省政府各厅委、各直属机构:

  省农委制定的《吉林省绿色食品基地建设方案》已经省政府同意,现转发给你们,请认真贯彻执行。

  吉林省人民政府办公厅

  二○○二年三月七日

  吉林省绿色食品基地建设方案

  (省农委 二○○二年二月十九日)

  为了认真贯彻落实省委七届五次全会精神,推进生态省建设,树立吉林“绿色经济”大省形象,“十五”期间要建设一批地域优势强、品牌效益好、产加销一条龙、专业化和系列化强的绿色食品生产基地,扩大绿色食品生产规模,提高我省农产品在国际、国内市场上的竞争能力,增加农民收入,推动农业和农村经济实现跨越式发展。

  一、指导思想和基本原则

  (一)指导思想

  以市场消费需求为导向,以资源优势为基础,以改善生态环境、提高农民收入和人民生活质量为目标,面向国内和国际两个市场,坚持政府推动、市场运作的有效形式,统筹规划,科学布局,规模发展,突出龙头企业拉动,大力提高绿色食品科技含量和生产经营的管理水平,逐步壮大绿色食品产业规模,增强农业和农村经济发展后劲。

  (二)基本原则

  1.坚持以市场为导向的原则。在对市场充分评估、预测的基础上,紧紧围绕国内外市场需求,选择适销对路的品种,搞好绿色食品开发。2.坚持因地制宜、突出特色的原则。从各地、各产业的实际出发,发挥区域比较优势,选准发展绿色食品的重点区域、主要产业和主导产品,科学布局,分类指导。3.坚持可持续发展的原则。适应农业发展新阶段的特点,处理好与生态农业、农业产业化发展的互动关系,处理好短期利益和长远发展的关系,实现生态效益、社会效益和经济效益的良性循环。4.坚持与国际标准接轨的原则。在绿色食品基地建设和产品加工生产时,要严格按照国家绿色食品生产标准,加速科技创新步伐,推动农业产业升级。5.坚持多元开发的原则。坚持市场运作,以企业开发为主,鼓励和支持各行业、各部门、各种经济成分主体开发绿色食品。各级政府也要积极引导绿色食品开发,投入必要的导向资金。6.坚持利益共享的原则。要正确处理企业与农户两者之间的关系,兼顾双方的利益,逐步向利益共享、风险共担的经营一体化方向迈进。

  二、发展目标及实施步骤

  (一)发展目标

  “十五”期间,全省重点建设50个大规模、高水平、牵动力较强的大型龙头企业,搞好水稻、玉米、大豆、水果、肉类、杂粮杂豆、禽蛋、奶类、蔬菜、酒类、矿泉水、特产品12大类绿色食品系列开发,开发产品品牌50个,产品品种300个,种植面积512万亩,总产量313万吨,实现产值131亿元。

  (二)实施步骤

  全省绿色食品发展开发分为启动期、发展期、提高期3个实施阶段。

  2001年为启动期。绿色食品种植面积180万亩,开发绿色食品产品达到140个,产量90万吨。其中,粮豆、蔬菜、水果、蛋等73万吨;畜禽、酒类、饮品类、奶类、特产类等17万吨。初加工产品与精深加工产品比为7:1,实现产值33亿元,比上年增加24亿元,牵动绿色食品基地较强的龙头企业达到30家。

  2002?D2004年为发展期。主要在扩大规模、扩张总量和精深加工上下功夫。绿色食品种植面积达到429.6万亩,绿色食品产品达到260个,产量达到222.4万吨。其中,粮豆、蔬菜、水果、蛋等200.6万吨,畜禽、酒类、饮品类、奶类、特产类等52.8万吨。初级产品与深加工产品比为5:1。经过系列开发和精深加工,实现产值106.6亿元,比上期末增加72.4亿元,牵动绿色食品基地较强的龙头企业达到40家。

  2005年为提高期。主要在规模、质量和提高产品附加值上实现更大的突破。绿色食品种植面积达到512万亩,开发高附加值绿色食品产品达到300个,产量313万吨。其中,粮豆、蔬菜、水果、蛋等243万吨,畜禽、酒类、饮品类、奶类、特产类等70万吨。初级产品与深加工产品比为3:1。实现产值131亿元,比上期末增加24.4亿元,牵动绿色食品基地较强的龙头企业达到50家。

  三、规划布局

  本着“多元投资、多元开发、多元启动”的原则,积极推动一批生产规模较大、科技含量较高、牵动能力较强的农产品加工企业和食品加工企业向绿色食品产业靠拢,重点做好对皓月集团、通化葡萄酒、华正肉业、大成黄龙、吉林酒业集团等农产品加工龙头企业的绿色食品的开发。全省计划建立12类、58个绿色食品产品生产基地,分布在37个县(市、区)。(一)大米生产基地。主要建在榆树市、梅河口市、永吉县、舒兰市、龙井市、和龙市、通化县等地。面积30万亩,产量15万吨,产值4.5亿元。牵动的龙头企业主要有:梅河曙光谷物有限公司、榆树市禾丰米业有限公司、吉林市北方米业有限公司、吉林市第一粮油加工厂、延边绿色食品米业有限公司、和龙市平岗绿色食品米业有限公司、通化县粮食收储经销有限公司等7家企业。(二)特用玉米基地。主要建在九台市、德惠市、前郭县等地。面积30万亩,产量15万吨,产值1.9亿元。牵动的龙头企业有:长春市新月食品加工厂、长春市绿色食品公司、德惠市农业开发公司、东辽县绿色食品开发公司、前郭县绿色食品有限责任公司、吉林市第二粮油加工厂等企业。(三)优质大豆基地。主要建在德惠市、榆树市、敦化市等地。面积20万亩,产量3万吨,产值8000万元。牵动的龙头企业有:敦化市大山镇商贸公司、德惠市农业开发公司、榆树市农业开发公司等企业。(四)水果生产及加工基地。主要建在延吉市、长春市绿园区等地。面积3万亩,产量3万吨,产值6000万元。牵动的龙头企业有:延边华龙集团有限公司、长春市绿园区宏达农工商有限公司等企业。

  (五)肉类生产加工基地。主要建在德惠市、大安市、公主岭市、长春市郊区、吉林市昌邑区等地。产量9万吨,产值9.5亿元。牵动的龙头企业有:吉林鹊源公司、大安市白鹅集团、长春市皓月集团等企业。

  (六)禽类基地。主要建在德惠市、吉林市、珲南县等地。禽类产量4000吨,产值4000万元。牵动的龙头企业有:吉林德大公司、吉林市昌邑区科技交流中心、公主岭市稷丰公司等企业。

  (七)油料杂粮杂豆基地。主要建在通榆县、扶余县、洮南市等地。面积13万亩,产量2.6万吨,产值5200万元。牵动的龙头企业有:通榆榆香食品实业有限公司、松原市宁江区民乐农工商总公司、扶余增盛农产品开发中心、洮南市上园源农场等企业。

  (八)蔬菜和瓜类基地。主要建在长春市南关区、长春市绿园区、德惠市、通化市二道江区、永吉县等地。面积5万亩,产量10万吨,产值1.8亿元。牵动的龙头企业有:长春幸福乡农工商总公司、德惠市升阳乡综合批发市场、长春市绿园区宏达农工商有限责任公司、通化市二道江区蔬菜生产经营公司、永吉县农业科技开发公司等企业。(九)特产品加工基地。主要建在延边、通化、白山等地。面积1.4万亩,产量1万吨,销售收入3.2亿元。牵动的龙头企业有:延边蜂业公司、露水河林业局、长白山特产实业公司等企业。

  (十)矿泉水基地。主要建在白山、通化、延边、吉林等市州。产量5000吨,产值1000万元。牵动的龙头企业有:长白山啤酒厂、吉源矿泉饮品有限公司、吉林省海外集团等企业。

  (十一)乳制品加工基地。主要建在通榆县、长春市区等地。产量3000吨,销售收入1200万元。牵动的龙头企业有:通榆县红牛奶业公司、吉林农大乳制品加工厂、长春市绿色食品公司等企业。

  (十二)酒类加工基地。主要建在双阳区、抚松县等地。产量4000吨,产值4000万元。牵动的龙头企业有:长白山啤酒厂、吉林粤海银瀑啤酒有限公司、吉林特产研究所山葡萄酿酒实验厂等企业。

  四、保证措施

  (一)扶强扶壮一批龙头企业,加快绿色食品开发步伐。从实际出发,重点扶持一批具有一定基础和规模,科技含量高,产品附加值大,市场前景好,具备一定竞争能力的粮油、乳业、畜禽、果菜、山特产及饮品等加工企业,增强绿色食品龙头企业的市场开拓能力,加大对基地的牵动作用。一是加快绿色食品加工企业的技术改造步伐,推进产业结构优化升级。对现有企业进行更新改造,促进企业上规模、上水平、上档次,延长产品加工产业链条,提高企业的整体素质,增强市场竞争力,促进我省绿色食品加工行业产品结构的科学调整。对于新建骨干项目,抓好规划布局,在市场开发、技术工艺、投资构成、管理机制、基地建设等方面评估论证的基础上,加快建设步伐,争取早投产、早见效。二是积极推进绿色食品产品结构的提档升级。依据国内外市场的需求,从现实要求和潜在的市场出发,调整和开发绿色食品,解决初级产品比重大、加工产品品种趋同、科技含量低等问题,逐步扩大精深加工产品比重,实现绿色食品产品的多样化,扩大在国内外市场的占有率。三是实施品牌战略,抢占国内外市场。选择一批质量叫得响的品牌,集中进行广告宣传,扩大影响。中小企业和基地要积极主动向名牌靠拢,联合联营,发挥整体优势,共同开拓市场。争取在年内开创一批全国驰名、国际认可的名牌产品。四是活化机制,强化管理。积极推动企业内部改革,加快企业和基地一体化建设进程,逐步形成企业和基地农户风险共担、利益共享的新机制。强化企业内部管理,健全各项规章制度,重点在产品成本、质量、财务和产销管理上下功夫,不断提高企业经营管理水平。五是筹划组建绿色食品企业集团。借鉴外省的经验,从产业结构优化升级、产品技术含量提高、企业组织结构实现规模效益、区域经济结构突出优势特点出发,筹划以绿色食品优势企业为龙头,名牌产品为依托,资产重组为纽带,采取联合、兼并、收购等资本运营方式,着手组建跨地区、跨行业、跨所有制的绿色食品企业集团,共同抵御市场风险。

  (二)建立和完善绿色食品市场体系,加大绿色食品市场开拓力度。统筹规划、突出重点,在建立以平等竞争为基本准则的市场秩序的基础上,逐步建立和完善统一开放、竞争有序的绿色食品市场体系,为绿色食品发展创造一个良好的环境。一是加强在北京、上海、广州、深圳等地的绿色食品配送中心建设,广泛开展绿色食品配送业务,使其成为面向国际市场的绿色食品贸易“窗口”。二是建设绿色食品营销网络。以全省现有的各类相关专业批发市场设立的绿色食品批发专柜为基础,逐步建立辐射到全国各地的各类相关专业批发市场,形成绿色批发营销网络。近期,市场要定位在全国一些高消费大城市和沿海发达地区以及日本、韩国、中东地区等国家。建立绿色食品连锁经营,设立专营店、连锁店,逐步形成产地市场与外埠市场、连锁经营与网络销售相结合的绿色食品市场网络;进一步完善绿色食品专用信息网络,在生产者、经营者和消费者之间架起一条绿色食品国际信息高速公路,促进绿色食品生产经营向现代化、信息化方向发展。

  (三)建设高标准原料生产基地,促进绿色食品专业化生产。本着市场牵动、科技先行、区域发展、规模推进的原则,高标准、高质量地建设好绿色食品原料生产基地。一是加强绿色食品基地良种工程建设。优化种植业和养殖业品种,推广优质专用动植物品种,绿色食品基地优质品种率要达到100%。通过两至三年的努力,逐步建立起区域化、专业化的绿色食品良种繁育基地。二是加强科技培训,建立专业技术人才队伍。认真执行绿色食品种养生产技术操作规程和有关动植物基地建设管理办法。通过报刊杂志、电视讲座、巡回宣传、现场培训等形式,向农民普及绿色食品知识和技术,提高广大农民对绿色食品认知度,增强做好工作的自觉性和创造性。三是保护好生态环境,促进生态示范省建设。重点抓好三北防护林体系建设工程、天然林资源保护工程、治沙工程、退耕还林还草和“一水五地”建设工程,加强小流域治理和水土保持,扩大绿色植被面积,提高森林覆盖率,不断改善大气环境。加强土壤环境建设,减少“白色污染”。大力推广应用经国家认证有绿色标识的生物肥、有机肥和生物农药等,减少土壤中农药残留。引导和鼓励工业企业实行清洁生产,严禁在绿色食品生产区域建设有污染的工业企业,依据绿色食品发展的需要,建立起高标准生态农业保护区。对列入实施方案的绿色食品基地县(市、区),环保监测部门要对其大气环境、土壤条件、灌溉水质等方面进行检测,根据检测结果确定整治方案,尽快达到国家要求的标准。四是加大资金投入,支持绿色食品基地建设。逐步建立以绿色食品加工龙头企业和农民投入为主体,财政和信贷投入为导向,广泛吸纳国内外资金的绿色食品开发投入机制。金融部门要进一步加大对绿色食品基地开发项目的信贷扶持力度,有计划地扶持一批市场前景好、发展潜力大的绿色食品生产基地。各部门也要集中有限资金重点向绿色食品产业倾斜,形成合力,促进绿色食品基地建设。

  (四)强化产品质量监管,提高绿色食品市场信誉。从长远发展和市场竞争的需要出发,按照坚持标准、严格质量的要求,在绿色食品产业建设中,要建立配套的质量管理标准体系。一是严格标准和审批程序。按照国家确定的各种绿色食品产品标准,严格检测和评价绿色食品基地生产的各项技术指标和生态环境。同时积极与发达国家同类食品标准接轨,按国际标准组织基地生产经营。二是规范合同,提高合同履约率。按照产业化经营的方式,把企业和基地农户连接起来,明确两者之间的权利与义务,提高合同履约率,逐步推进加工企业与基地农户利益一体化进程。三是定期抽检,动态管理。对基地的绿色食品产品及其生产环境定期进行化验检测,定期发布绿色食品检测公告,凡不符合标准的一律取消其绿色食品标志使用资格。四是加强对绿色食品的市场管理。进一步统一和规范绿色食品的包装和标识,将各种绿色食品的质量标准以最直观的方式告示消费者。相关部门和新闻单位要定期对绿色食品商品市场进行联合检查,对生产经营假冒伪劣绿色食品的责任者依法惩处,公开曝光,保护生产企业和消费者的利益。

  (五)切实加强组织领导,建立绿色食品开发有效推进机制。发展绿色食品产业,建立高标准的绿色食品生产基地,是今后一个时期农村经济结构战略性调整重点工作之一,必须予以高度重视。要理顺绿色食品管理机构,实行归口统一管理。省农委全面负责绿色食品基地建设方案实施的综合协调指导,加强有关政策法规的制定,绿色食品标志认证,基地开发项目的论证和实施,绿色食品基地生产经营全过程监控,从业人员培训等工作。各基地县(市、区)要加强对此项工作的领导,根据绿色食品基地和产业发展的要求,确定重点推进项目,通过一个基地、一个产业、一个班子、一个规划、一个政策、一个实施办法 的“六个一”工作机制,切实推进绿色食品产业发 展。


十堰市政府办公室关于印发《十堰市城区预拌混凝土管理办法》的通知

湖北省十堰市人民政府办公室


十政办发[2006]105号


十堰市政府办公室关于印发《十堰市城区预拌混凝土管理办法》的通知

各区人民政府,市政府各部门:
  《十堰市城区预拌混凝土管理办法》已经市政府研究同意,现印发给你们,请遵照执行。

                          二○○六年八月四日

             十堰市城区预拌混凝土管理办法

                第一章 总 则
  第一条 为了加强建筑节能管理,加快推广使用预拌混凝土工作,减少城市噪声和粉尘污染,改善城市环境,确保建设工程质量,推进建筑业技术进步,根据有关规定,结合我市实际,制定本办法。
  第二条 本办法适用于城区规划建设区内生产、销售、运输和使用预拌混凝土的单位和个人。
  第三条 本办法所称建设工程包括工业与民用建筑、市政公用设施、公路、桥梁、人防等工程。
  第四条 市建设委员会是预拌混凝土的行政主管部门,负责预拌混凝土的管理、指导和监督工作。具体工作由市散装水泥办公室(以下简称"市散办")组织实施。
  第五条 市发改委、规划、国土、公安、交通、环保、城管、建管、技术监督部门(单位)应按各自职责,协同建设主管部门做好预拌混凝土的监督管理工作。
  市交通、市政、水利等部门负责做好本部门专业工程建设使用预拌混凝土的监督管理工作。

            第二章 预拌混凝土的生产和销售
  第六条 预拌混凝土搅拌站的设置应纳入城市规划。预拌混凝土搅拌站的布点方案由市规划、环保、城建部门根据城市建设发展规划、建设规模、预拌混凝土需求量,以及城区道路交通运输状况编制。
  第七条 预拌混凝土生产企业的建设项目,必须遵守国家有关建设项目环境保护管理的规定,遵守污染物排放标准,建设项目需要配套建设环境保护设施的,必须与主体工程同时设计,同时施工,同时投产使用,并通过环保竣工验收。 
  第八条 预拌混凝土生产企业,须到建设行政主管部门办理资质证书,到环保部门办理环境影响评价审批手续,到工商行政管理部门申办营业执照,在市散办登记备案。否则,不得从事预拌混凝土的生产和销售。
  第九条 生产预拌混凝土必须使用散装水泥。若有特殊情况需要使用袋装水泥的,应报市散装水泥办公室批准,并按有关规定缴纳发展散装水泥专项资金。
  第十条 预拌混凝土搅拌站应严格按国家标准和规范要求组织生产,定期进行原材料和混凝土各项性能指标的检测,以确保预拌混凝土的质量。
  第十一条 本市预拌混凝土的价格由市有关部门依据相关政策规定和预拌混凝土构成材料的市场情况制定,报市物价部门备案,并按季度发布价格信息。
  第十二条 预拌混凝土搅拌站生产、销售预拌混凝土,应接受质量技术监督部门和工程质量监督部门的质量监督。

            第三章 预拌混凝土的使用和运输
  第十三条 从本办法施行之日起,城区东起白浪黄莲垭,西至柏林阳南沟,南至二堰街办代家沟,北至汉江街办洪溪湾内的所有新建、改建、扩建建设工程,凡符合下列条件之一者,必须使用预拌混凝土。
  建设工程造价在100万元以上(含本数,下同)的;
  建设工程混凝土总用量在150立方米以上的;
  建设工程一次浇注混凝土用量在30立方米以上的;
  桥梁建设工程最大跨度在20米以上或长度在50米以上的;
  第十四条 按本办法规定应当使用预拌混凝土的建设工程,但有下列情况之一的,由建设单位或个人提出书面申请,经预拌混凝土主管机构(市散办)审核批准并办理《现场搅拌合准通知书》后,可在施工现场搅拌预拌混凝土。
  属特殊类型预拌混凝土,且预拌混凝土生产企业无法生产的。
  施工区因道路交通原因,运送预拌混凝土的专用车辆无法到达施工现场的。
  其他原因确需在施工现场搅拌才能满足工程技术要求的。
  现场搅拌混凝土应符合环境保护和城市卫生管理的有关规定。
  第十五条 按规定必须使用预拌混凝土的建设工程,其设计、建设、施工单位均应按使用预拌混凝土编制概算、上报计划、确定投资、编制预算(标底、标函),并予以注明。
  工程监理机构在实施监理中发现应当使用预拌混凝土而未使用的,应当及时制止并向有关主管部门报告。
  第十六条 使用预拌混凝土的建筑施工企业应保持施工现场道路平整、畅通,为预拌混凝土的运输、使用提供照明、水源设施和其他必要条件。
  第十七条 散装水泥运输车、预拌混凝土搅拌车、输送泵车均为工程专用车辆,由市散装水泥办公室开具证明,市公安交通管理部门核发工程专用车辆通行证。
  第十八条 散装水泥运输车、预拌混凝土搅拌运输车、输送泵车均应保持车况良好,车容整洁,严禁渗漏和随地冲洗。

                第四章 处 罚
  第十九条 未取得《预拌混凝土生产企业资质证书》而生产、销售预拌混凝土的,由建设行政主管部门负责查处;未进行环境影响评价审批或没有通过环保"三同时"竣工验收而生产、售销预拌混凝土的,由环境保护行政主管部门负责查处;未取得营业执照而生产、销售预拌混凝土的,由工商行政管理部门负责查处。
  第二十条 生产销售使用不符合质量标准的预拌混凝土的,由质量技术监督部门和工程质量监督部门依照有关规定给予处罚。出现质量事故的,应承担相应的法律责任。
  第二十一条 在施工现场自行搅拌混凝土的,预拌混凝土主管部门应责令其停止现场搅拌,并按有关规定予以处罚。对妨碍道路交通、市容市貌、城市卫生、或造成环境污染的,有关部门依法予以查处。
  第二十二条 对应当使用而不使用或不完全使用散装水泥的预拌混凝土、预拌砂浆的生产企业,责令其整改,并可处以每立方米混凝土100元或者每吨袋装水泥300元的罚款,罚款总额不超过30000元。
  第二十三条 对违反本办法规定在施工现场使用袋装水泥的,应责令其改正,并按实际现场使用袋装水泥量,按每袋(50公斤)袋装水泥0.5元处以罚款,以上处罚最高罚款不得超过30000元。法律、法规另有规定的,从其规定。
  第二十四条 对拒绝供应小批量混凝土的预拌混凝土生产企业,责令其限期改正。

                第五章 附 则
  第二十五条 本办法实施前已办理了施工许可证手续,但未组织施工(或未完成基础部分)的建设工程,应按本办法规定使用预拌混凝土。
  第二十六条 各县(市)可根据国家、省、市有关规定和实际情况,积极推广使用预拌混凝土。
  第二十七条 本办法自颁布之日起30日后施行。