Job description of the leading specialist of the information security department. Job description of a specialist in information security in key information infrastructure systems Job description of a computer security specialist

Job description information security specialist [name of organization, enterprise, etc.]

This job description was developed and approved in accordance with the provisions and other regulations governing employment relationship in Russian Federation.

I. General provisions

1.1. An information security specialist belongs to the category of specialists, is hired and dismissed by order of the head of the enterprise on the proposal of the head of the information security department.

1.2. A person with a higher professional (technical) education and work experience in the position of an information protection specialist of the II category for at least [meaning] years shall be appointed to the position of an information protection specialist of the I category; for the position of an information protection specialist of the II category - a person with a higher professional (technical) education and work experience in the position of an information protection specialist or other positions filled by specialists with a higher professional education, at least [meaning] years; for the position of an information protection specialist - a person with a higher professional (technical) education, without presenting requirements for work experience.

1.3. The Data Protection Officer reports directly to [fill in].

1.4. In his activities, an information protection specialist is guided by:

Legislative and regulatory documents on information security;

Methodological materials related to relevant issues;

The company's charter;

Rules work schedule;

Orders and orders of the director of the enterprise (direct manager);

This job description.

1.5. An information security officer should know:

Legislative acts, normative and methodological materials on issues related to ensuring the protection of information;

The specialization of the enterprise and the features of its activities;

Industry production technology;

Equipment of computing centers with technical means, prospects for their development and modernization;

Organization system comprehensive protection industry information;

Methods and means of control over protected information, identification of information leakage channels, organization of technical intelligence;

Methods for planning and organizing work to protect information and ensure state secrets;

Technical means of control and protection of information, prospects and directions for their improvement;

Methods for conducting special studies and inspections, works to protect technical means of transmission, processing, display and storage of information;

The procedure for the use of abstract and reference and information publications, as well as other sources of scientific and technical information;

Achievements of science and technology in the country and abroad in the field of technical intelligence and information protection;

Methods and tools for performing calculations and computational work;

Fundamentals of Economics, Organization of Production, Labor and Management;

Fundamentals of the labor legislation of the Russian Federation;

Rules and regulations for labor protection, safety, industrial sanitation and fire protection;

- [write in what you want].

1.6. During the absence of an information protection specialist (business trip, vacation, illness, etc.), his duties are performed by a person appointed in accordance with the established procedure. This person acquires the corresponding rights and is responsible for the proper performance of the duties assigned to him.

II. Functions

The information security specialist is responsible for the following functions:

2.1. Providing comprehensive information protection, observance of state secrets.

2.2. Participation in the survey, certification and categorization of objects of protection.

2.3. Development of organizational and administrative documents regulating the work on information protection.

2.4. Determining the need for technical means protection and control.

2.5. Checking the fulfillment of requirements regulatory documents for information protection.

III. Job responsibilities

To perform the functions assigned to him, an information protection specialist must:

3.1. Execute complex workrelated to the provision of comprehensive protection of information based on the developed programs and methods, compliance with state secrets.

3.2. Collect and analyze materials from institutions, organizations and enterprises of the industry in order to develop and make decisions and measures to ensure the protection of information and the effective use of automatic control means, to detect possible channels of leakage of information representing state, military, official and commercial secrets.

3.3. Analyze the existing methods and tools used to control and protect information, and develop proposals for improving them and increasing the effectiveness of this protection.

3.4. Participate in the survey of protected objects, their certification and categorization.

3.5. Develop and prepare for approval drafts of normative and methodological materials regulating the work on information protection, as well as regulations, instructions and other organizational and administrative documents.

3.6. Organize the development and timely submission of proposals for inclusion in the relevant sections of long-term and current work plans and programs of measures to control and protect information.

3.7. Give feedback and opinions on projects of newly built and reconstructed buildings and structures and other developments on information security issues.

3.8. Participate in the review technical specifications for design, draft, technical and working projects, to ensure their compliance with the current regulatory and methodological documents, as well as in the development of new schematic diagrams of control equipment, control automation equipment, models and information security systems, assessment of the technical and economic level and effectiveness of proposed and implemented organizationally -technical solutions.

3.9. Determine the need for technical means of protection and control, draw up applications for their purchase with the necessary justifications and calculations for them, control their delivery and use.

3.10. Verify compliance with the requirements of cross-industry and industry-specific regulatory documents on information protection.

IV. Rights

An information protection specialist has the right to:

4.1. To get acquainted with the draft decisions of the management of the enterprise concerning its activities.

4.2. Submit proposals for improving the work related to the responsibilities provided for in this instruction for the management's consideration.

4.3. Receive from the heads of structural divisions, specialists information and documents necessary to fulfill their job duties.

4.4. Engage specialists from all structural divisions of the enterprise to solve the responsibilities assigned to it (if this is provided for by the provisions on structural unitsif not - with the permission of the head of the enterprise).

4.5. Require the management of the enterprise to assist in the performance of their duties and rights.

V. Responsibility

The data protection officer is responsible for:

5.1. For non-fulfillment (improper fulfillment) of their duties stipulated by this job description, within the limits determined labor legislation Russian Federation.

5.2. For offenses committed in the course of carrying out their activities - within the limits determined by the administrative, criminal and civil legislation of the Russian Federation.

5.3. For causing material damage - within the limits determined by the labor, criminal and civil legislation of the Russian Federation.

The job description is developed in accordance with [name, number and date of the document].

Head of structural unit

[initials, surname]

[signature]

[day month Year]

Agreed:

Head of the legal department

[initials, surname]

[signature]

[day month Year]

I have read the instructions:

[initials, surname]

[signature]

[day month Year]

Out in the open, ConsultantPlus unexpectedly found a rather amusing form of job description for a specialist in information security in key information infrastructure systems. As the unknown author says, "the form was prepared using legal acts as of 03.02.2014."

Interesting, but sometimes controversial (debatable) provisions. For those who are involved in the protection of CEP, it may be useful to get acquainted with the aspen moments, they are further.

name \u003d "more"\u003e

1.1. This job description defines functional responsibilities, rights and responsibilities of a specialist in ensuring information security in key information infrastructure systems _______________ (hereinafter referred to as the Organization).

1.5. An information security specialist in key information infrastructure systems should know:

Laws and other regulations legal acts Of the Russian Federation, regulating relations related to the protection of state secrets and other information of limited access; normative and methodological documents on issues related to information security;

The structure of management, communication and automation and the main elements of the key system of the information infrastructure of the Organization;

Access control subsystems, attack detection subsystems, protection subsystems against deliberate actions, information integrity control;

The procedure for creating a secure channel between interacting objects through a public system using dedicated communication channels;

The procedure for authenticating interacting objects and verifying the authenticity of the sender and the integrity of the data transmitted through the public system;

Equipping the Organization with basic and auxiliary technical means and systems, prospects for their development and modernization;

Prospects and directions of development of methods and means of hardware and software and hardware for protecting information from destructive information influences;

The order of design and certification of objects of informatization; control of the effectiveness of information protection at the objects of informatization;

The procedure for monitoring the use of open radio communication channels;

Methods and tools for identifying threats to information security, methods for identifying information leakage channels;

Methods of conducting scientific research, developments on technical protection of information;

The procedure for examining key information infrastructure systems, drawing up inspection reports, test reports, instructions for the right to operate special means of ensuring information security, as well as regulations, instructions and other organizational and administrative documents;

Powers on information security issues, possibilities and procedure for the use of standard technical means of information security and control over their effectiveness;

Methods for analyzing the results of inspections, accounting for violations of requirements for ensuring information security;

Methodology for preparing proposals, methods and means of performing computational work in the interests of planning, organizing and carrying out work to ensure the security of information and ensure state secrets;

Achievements of science and technology in the country and abroad in the field of technical intelligence and information protection;

Methods for assessing the professional level of information security specialists, certification of specialists;

Fundamentals of Labor Law;

Labor protection and fire safety regulations.

2. FUNCTIONAL RESPONSIBILITIES

Information security specialist in key information infrastructure systems:

2.1. Carries out measures to ensure information security in key information infrastructure systems.

2.2. Identifies possible threats to information security, vulnerability of software and hardware, develops intrusion detection technologies, assesses and re-evaluates the risks associated with threats of destructive information attacks that can damage systems and networks due to unauthorized access, use of disclosure, modification or destruction of information and information resources. control systems.

2.3. Defines restrictions on information input, procedures for managing security incidents and prevents their development, the procedure for connecting to open information systems, taking into account security related to agreements on access and resource prioritization, requirements for backup storage, processing and copying of information, priorities for servicing software the use of basic and backup telecommunication services (services).

2.4. Develops procedures for protecting information carriers, communications and restoring information and control systems after a failure or failure.

2.5. Monitors activities to ensure the security of information in key systems of information infrastructure; informational, material and technical, scientific and technical support for information security; monitoring the status of work to ensure the security of information in key information infrastructure systems and their compliance with regulatory legal acts Russian Federation.

2.6. Provides feedback and opinions on projects of newly created and modernized facilities and other developments on information security issues in key information infrastructure systems.

2.7. Participates in the review of technical specifications for research and development work to ensure the security of information in key information infrastructure systems, assesses their compliance with the current regulatory and methodological documents.

2.8. Participates in the implementation of new means of technical protection of information.

2.9. Promotes the dissemination of best practices in the Organization and the introduction of modern organizational and technical measures, means and methods of ensuring information security in key information infrastructure systems.

2.10. Conducts assessments of the technical and economic level and efficiency of proposed and implemented organizational and technical solutions to ensure information security in key information infrastructure systems.

2.11. Develops lists of personnel access to objects of protection, the procedure and rules of behavior for employees, including when they move, dismiss and interact with personnel of third-party organizations.

2.12. Provides guidance and training for personnel in crisis situations, including procedures for managers and other responsible persons of key information infrastructure systems.

We bring to your attention a typical example of a job description for an information security engineer, sample 2019/2020. A person who has a higher professional (technical) education without presenting requirements for work experience or secondary vocational (technical) education and work experience as a category I information security technician for at least 3 years or other positions filled by specialists with secondary vocational education, at least 5 years. Do not forget, each information security engineer's instruction is handed out against a receipt.

It provides typical information about the knowledge that an information security engineer should have. About duties, rights and responsibilities.

This material is included in the huge library of our site, which is updated daily.

1. General Provisions

1. An information security engineer belongs to the category of specialists.

2. An information security engineer is a person who has a higher professional (technical) education without presenting requirements for work experience or secondary vocational (technical) education and work experience as a category I information security technician for at least 3 years or other positions replaced by specialists with a secondary vocational education, at least 5 years.

3. An information security engineer is hired and dismissed from the position of the ___________ organization (director, manager) upon the recommendation of _________. (position)

4. An information security engineer should know:

- decrees, orders, orders, methodological and regulatory materials on issues related to ensuring the technical protection of information;

- the specialization of the enterprise and features of its activities;

- methods and means of receiving, processing and transmitting information;

- scientific and technical and other special literature on the technical support of information security;

- technical means of information protection;

- software and mathematical means of information protection;

- order of registration technical documentation information protection;

- channels of possible information leakage;

- methods of analysis and protection of information;

- organization of work to protect information;

- instructions on how to comply with the special works;

- domestic and foreign experience in the field of technical intelligence and information protection;

- fundamentals of economics, organization of production, labor and management;

- fundamentals of labor legislation;

- rules and norms of labor protection.

5. In his activities, an information security engineer is guided by:

- the legislation of the Russian Federation,

- Charter (statute) of the organization,

- orders and orders of the __________ organization, ( general director, director, head)

- this job description,

- The internal labor regulations of the organization.

6. The Information Security Engineer reports directly to: __________. (position)

7. During the absence of an information protection engineer (business trip, vacation, illness, etc.), his duties are performed by a person appointed by the __________ (position) of the organization in accordance with the established procedure, who acquires the corresponding rights, obligations and is responsible for the performance of the duties assigned to him.

2. Job responsibilities of an information security engineer

Information Security Engineer:

1. Performs work on the design and implementation of special technical and software-mathematical means of information security, providing organizational and engineering protection measures information systems, conducts research in order to find and select the most appropriate practical solutions within the task.

2. Carries out selection, study and generalization of scientific and technical literature, normative and methodological materials on technical means and methods of information protection.

3. Participates in the consideration of draft technical specifications, plans and schedules for the technical protection of information, in the development of the necessary technical documentation.

4. Draws up calculation methods and programs for experimental research on the technical protection of information, performs calculations in accordance with the developed methods and programs.

5. Conducts a comparative analysis of research and test data, examines possible sources and channels of information leakage.

6. Carries out the development technical support information security systems, maintenance means of information protection, takes part in the preparation of recommendations and proposals for improving and increasing the efficiency of information protection, in the writing and execution of sections of scientific and technical reports.

7. Compiles information reviews on the technical protection of information.

8. Performs operational tasks related to the control of technical means and mechanisms of the information protection system, participates in inspections of institutions, organizations and enterprises to comply with the requirements of regulatory and technical documentation for the protection of information, in the preparation of reviews and conclusions on regulatory and methodological materials and technical documentation.

9. Prepares proposals for the conclusion of agreements and contracts with other institutions, organizations and enterprises providing services in the field of technical means of information security, draws up applications for necessary materials, equipment, devices.

10. Participates in the attestation of facilities, premises, hardware, programs, algorithms for compliance with information protection requirements for the relevant security classes.

11. Conducts control checks of the operability and efficiency of existing systems and technical means of information protection, draws up and draws up acts of control checks, analyzes the results of checks and develops proposals for improving and increasing the effectiveness of measures taken.

12. Studies and summarizes the experience of other institutions, organizations and enterprises in the use of technical means and methods of protecting information in order to increase the efficiency and improve work on its protection and preservation of state secrets.

13. Performs work on time at a high scientific and technical level, observing the requirements of the instructions for the mode of work.

3. Rights of an information security engineer

Information Security Engineer has the right to:

1. Submit proposals to the management:

- to improve the work related to the provisions of this instruction responsibilities,

- on the encouragement of distinguished workers subordinate to him,

- about attracting to material and disciplinary responsibility workers who have violated production and labor discipline.

2. Request from the structural divisions and employees of the organization the information necessary for him to perform his duties.

3. To get acquainted with the documents defining his rights and obligations in the position held, the criteria for assessing the quality of the performance of official duties.

4. To get acquainted with the draft decisions of the organization's management concerning its activities.

5. Require the management of the organization to provide assistance, including the provision of organizational and technical conditions and the execution of the established documents necessary for the performance of official duties.

6. Other rights established by the current labor legislation.

4. Responsibility of the information security engineer

The information security engineer is responsible in the following cases:

1. For improper performance or non-performance of their official duties provided for by this job description - within the limits established by the labor legislation of the Russian Federation.

2. For offenses committed in the course of their activities - within the limits established by the current administrative, criminal and civil legislation of the Russian Federation.

3. For causing material damage to the organization - within the limits established by the current labor and civil legislation of the Russian Federation.

The job description of an information security engineer is a sample of 2019/2020. Responsibilities of an information security engineer, rights of an information security engineer, responsibility of an information security engineer.

APPROVED:
Manager _____________________
__________________________________
(__________________)
"___" ________ ___
M.P.

DUTY INSTRUCTIONS of a specialist in technical protection of information

1. GENERAL PROVISIONS

1.1. This job description defines the functional duties, rights and responsibilities of a specialist in technical protection of information _______________ (hereinafter referred to as the Organization).

1.2. A specialist in the technical protection of information is appointed and dismissed in accordance with the procedure established by labor legislation by order of the head of the Organization.

1.3. The information security specialist reports directly to the _______________ Organization.

1.4. Qualification requirements to the person to be appointed:

Specialist in technical protection of information of the 1st category: higher professional education in the specialty "Information security" and work experience as a specialist in technical protection of information of the 2nd category at least 3 years.

Specialist in technical protection of information of the II category: higher professional education in the specialty "Information security" and work experience as a specialist in technical protection of information or in other positions replaced by specialists with higher professional education, at least 3 years.

Information technical security specialist: higher professional education in the specialty "Information Security" without requiring any length of service.

1.5. Information security specialist should know:

Laws and other normative legal acts of the Russian Federation regulating relations related to the protection of state secrets and other information of limited access;

Regulatory and methodological documents on issues related to information security;

Methods and tools for identifying threats to information security, methods for identifying information leakage channels;

Specialization, basics technological processes production of the Organization and the consequences of their violation;

The structure of management, communication and automation, the equipment of the objects of informatization of the Organization with basic and auxiliary technical means and systems, the prospects for their development and modernization;

Achievements of science and technology in the country and abroad in the field of technical intelligence and technical protection of information; prospects and directions of development of technical and software and hardware information security;

The procedure and content of special studies and control checks, work on categorization, certification of objects of informatization and other work on the technical protection of information;

Methods for planning works on technical protection of information;

Methods for conducting scientific research, developments on the technical protection of information;

Documentation developed at the objects of informatization for the technical protection of information;

Rules for the development and preparation for approval of draft regulatory and methodological documents governing the work on the technical protection of information, drawing up inspection reports, test reports, instructions for the right to operate information technical protection means, as well as provisions, instructions and other documents in the field of technical information protection;

The structure, purpose, tasks, powers of the department for the technical protection of information;

The procedure for the use of standard means of technical protection of information and control of its effectiveness;

Access control subsystems, attack detection subsystems, methods for analyzing test results, accounting for violations of requirements for technical protection of information;

The procedure for preparing proposals, methods and means of performing computational work in the interests of planning, organizing and carrying out work on the technical protection of information;

The procedure for creating secure channels between interacting objects through a public system using dedicated communication channels;

The procedure for authenticating interacting objects, verifying the authenticity of the sender and the integrity of the data transmitted through the public system;

The procedure for the use of abstract and reference and information publications, as well as other sources of scientific and technical information;

Achievements of science and technology in the country and abroad in the field of technical intelligence and technical protection of information;

Fundamentals of Labor Law;

Labor protection and fire safety regulations.

1.6. During the period of temporary absence of a specialist in technical protection of information, his duties are assigned to ____________________.

2. FUNCTIONAL RESPONSIBILITIES

Information security specialist:

2.1. Performs work on the technical protection of information in organizations.

2.2. Carries out work to identify threats to information security, determine the possibility of technical intelligence and carry out measures for the technical protection of information.

2.3. Participates in the categorization of objects of informatization, identification of threats to the security of information and technical channels of information leakage, work on conducting special checks and special studies of objects of informatization.

2.4. Develops proposals for the placement of basic and auxiliary technical means and systems in compliance with the established standards of technical protection of information.

2.5. Organizes and conducts (if necessary) measures for the technical protection of information when placing third-party organizations within the controlled area.

2.6. Participates in the survey of objects of informatization, their categorization and certification.

2.7. Develops and prepares for approval drafts of normative and methodological documents regulating the work on the technical protection of information, inspection reports, test reports, instructions for the right to operate, as well as regulations, instructions and other organizational and administrative documents.

2.8. Participates in determining the need for technical protection of information, draws up applications for their purchase with the necessary justifications and calculations for them, controls their delivery and use.

2.9. Checks compliance with the requirements of regulatory documents for the technical protection of information.

3. RIGHTS

A specialist in technical protection of information has the right:

3.1. Require the leadership of the Organization to assist in the performance of their duties.

3.2. To get acquainted with the draft decisions of the management of the Organization concerning its activities.

3.3. Submit proposals on their activities for consideration by their immediate supervisor.

3.4. Receive official information necessary to carry out their duties.

4. LIABILITY

The information security specialist is responsible for:

4.1. For non-fulfillment or improper fulfillment of their duties provided for by this job description - in accordance with the current labor legislation.

4.2. For offenses committed during the period of implementation of their activities - in accordance with the current civil, administrative and criminal legislation.

4.3. For causing material damage - in accordance with applicable law.

5. CONDITIONS AND EVALUATION OF WORK

5.1. The mode of work of a specialist in technical protection of information is determined in accordance with the internal labor regulations established in the Organization.

5.2. Assessment of work:

Regular - carried out by the immediate supervisor in the process of performing labor functions by the Employee;

- ____________________________________________________________________. (indicate the procedure and grounds for other types of work)

This job description was developed in accordance with the Order of the Ministry of Health and Social Development of the Russian Federation of April 22, 2009 N 205 "On approval of the qualification handbook positions of managers, specialists and employees, section " Qualification characteristics positions of managers and specialists in information security in key information infrastructure systems, countering technical intelligence and technical protection of information. "

____________________________ ________________ ___________________________ (Position name (Personal signature) (Signature decoding) of the head of the structural unit) "___" __________ ____ AGREED (indicate all interested parties and their signatures) ____________________________ ________________ ___________________________ (Personal signature) (Signature decoding) "___" __________ ____ g. I have read the instructions: ________________ ___________________________ (Personal signature) (Signature decoding) "___" __________ ____

I. General provisions

1.1. Data Protection Officer belongs to the category
specialists, is hired and dismissed by order
the head of the enterprise on the proposal of the head of the protection department
information.
1.2. For the position of category I information protection specialist
a person with a higher professional (technical)
education and work experience as a data protection specialist II
category of at least _______ years; for the position of protection specialist
information category II - a person who has a higher professional
(technical) education and work experience as a security specialist
information or other positions filled by specialists with higher
professional education, at least _________ years; for the position
information security specialist - a person who has a higher professional
(technical) education, no work experience requirements.
1.3. The Data Protection Officer reports directly to
________________________________________________________________________.
1.4. In his activity, an information security specialist
guided by:
- legislative and regulatory documents on issues
ensuring the protection of information;
- methodological materials related to relevant issues;
- the charter of the enterprise;
- labor regulations;
- orders and orders of the director of the enterprise
(immediate supervisor);
- this job description.
1.5. An information security officer should know:
- legislative acts, normative and methodological materials on
issues related to ensuring the protection of information;
- specialization of the enterprise and features of its activities;
- production technology in the industry;
- equipment of computing centers with technical means,
prospects for their development and modernization;
- a system for organizing comprehensive information protection operating in
industry;
- methods and means of monitoring protected information, identifying channels
information leaks, organization of technical intelligence;
- methods of planning and organizing protection work
information and state secrets;
- technical means of control and protection of information, prospects and
directions for their improvement;
- methods for conducting special studies and inspections, works on
protection of technical means of transmission, processing, display and storage
information;
- the procedure for using abstracts and reference information
publications, as well as other sources of scientific and technical information;
- achievements of science and technology in the country and abroad in the field
technical intelligence and information protection;
- methods and means of performing calculations and computational work;
- fundamentals of economics, organization of production, labor and management;
- fundamentals of labor legislation of the Russian Federation;
- rules and norms of labor protection, safety measures,
industrial sanitation and fire protection;
- _________________________________________________________________.
1.6. During the absence of a data protection officer
(business trip, vacation, illness, etc.) his duties are performed by a person
appointed in the prescribed manner. This person acquires
relevant rights and is responsible for the proper implementation
the responsibilities assigned to him.

II. Functions

The information security specialist is responsible for the following functions:
2.1. Providing comprehensive information protection, compliance
state secrets.
2.2. Participation in the survey, certification and categorization of objects
protection.
2.3. Development of organizational and administrative documents,
regulating the work to protect information.
2.4. Determination of the need for technical means of protection and
control.
2.5. Verification of compliance with the requirements of regulatory documents for protection
information.

III. Job responsibilities

To perform the functions assigned to him, a protection specialist
information is obliged:
3.1. Perform complex work related to providing complex
information protection based on developed programs and methods, compliance
state secrets.
3.2. Collect and analyze materials from institutions, organizations and
enterprises of the industry in order to develop and adopt decisions and measures for
ensuring the protection of information and the effective use of funds
automatic control, detection of possible channels of information leakage,
representing state, military, service and commercial secrets.
3.3. Analyze existing methods and tools used to
control and protection of information, and develop proposals for their
improving and increasing the effectiveness of this protection.
3.4. Participate in the examination of objects of protection, their certification and
categorization.
3.5. Develop and prepare for approval drafts of regulatory and
methodological materials regulating the work on information protection, and
also provisions, instructions and other organizational and administrative
documents.
3.6. Organize development and timely submission
proposals for inclusion in the relevant sections of promising and
current work plans and programs of measures to control and protect information.
3.7. Give feedback and opinions on projects under construction and
reconstructed buildings and structures and other developments on issues
ensuring the protection of information.
3.8. Participate in the review of technical specifications for
design, draft, technical and working projects, provide them
compliance with applicable regulatory and methodological documents, as well as
development of new schematic diagrams of control equipment,
automation of control, models and systems of information protection, assessment
technical and economic level and efficiency of the proposed and implemented
organizational and technical solutions.
3.9. Determine the need for technical means of protection and
control, draw up applications for their purchase with the necessary
justifications and calculations for them, control their delivery and
using.
3.10. Verify compliance with the requirements of cross-sectoral and
industry regulations on information protection.

IV. Rights

An information protection specialist has the right to:
4.1. Get acquainted with the projects of decisions of the management of the enterprise,
concerning his activities.
4.2. Submit proposals for management
improving the work associated with the responsibilities provided
this manual.
4.3. Receive from heads of structural divisions,
information and documents necessary for specialists to carry out their
job responsibilities.
4.4. Engage specialists from all structural divisions
enterprise to solve the responsibilities assigned to it (if it is
provided for by the provisions on structural units, if not - with
permission of the head of the enterprise).
4.5. Require the management of the enterprise to provide assistance in
performance of their official duties and rights.

V. Responsibility

The data protection officer is responsible for:
5.1. For non-performance (improper performance) of their official
duties stipulated by this job description, in
limits determined by the labor legislation of the Russian Federation.
5.2. For those committed in the process of carrying out their activities
offenses - within the limits determined by administrative, criminal and
the civil legislation of the Russian Federation.
5.3. For causing material damage - within the limits determined
labor, criminal and civil legislation of the Russian Federation.