【正文】
use of data encryption, echo inspection techniques for work management in order to prevent the shading problems, equipment failures leading to data loss, and criminals of illegal interception of financial data theft and other security risks, protect the puterized accounting system, the safe operation of the work environment. With puter technology and work technology continues to evolve, the file management information to replace the traditional manual work is inevitable. At present, the file management information system has been developing in various enterprises, government departments widely. Strengthen and improve the puterized accounting records management will be the work of various enterprises in the financial and business management in the whole must be taken into account, financial records management directly affects the enterprise39。s accounting. Magic media to store information on magic signals, if the data have been maliciously modified without leaving any traces. Therefore, we should also the entire puter system security and stability to do some work, such as puter virus prevention. Third, puting the need of expert management of accounting file. Accounting system implementation of the main people, but no matter how good software quality, how to improve rules and regulations as the main body of Computerized Accounting System Implementation person can not play a role, there is a system not to perform, or even malicious modify the software program, modify the data in the database, illegally obtained a password, will not be tolerated. Therefore, managers should pay attention to the file selection and training of staff, enhanced staff files the standard of professional ethics and business standards to electronic data processing accounting records management system, the main integrity. This requires the puterized accounting system to deal with business arising from the various books, reports, documents should be managed by hand, and to develop appropriate management system. Fourth, strengthening the puterized accounting system, management and maintenance of the work environment. Network security indicators include data security, access control, and identity recognition. Login using the password management and control of online financial data systems to read。 backup disk should be installed in the protection of seals and the box, stored in a safe, clean, heat, moisture, antimagic place, and regularly turn storage。 used as a backup floppy disk must be well kept。 strengthening financial records staff, continuing education at different levels phases and in accordance with the principle of business needs for training. Focus on strengthening financial management personnel file information technology training and application of new technologies, new equipment, new methods of training to enhance their control and use of information technology and means of awareness and skills. Financial records to establish a rational management of performance appraisal evaluation provides information on the financial records management ability, good results in time units and individuals to recognize and encourage everyone to learn the information, and use information. In addition, also on the puter information technology staff must work files, financial management knowledge and skills introduction, to understand the objective laws of the financial records of work, and better information for financial records management to provide technical support. Computerized accounting exits some problems in the file record: Firstly, after the implementati