Workflow
科思科技: 内幕信息知情人管理制度

General Principles - The company establishes an insider information management system to regulate insider information handling, enhance confidentiality, and protect investors' rights [1][2] - The system is based on relevant laws and regulations, including the Company Law and Securities Law of the People's Republic of China [1] Insider Information Management - The Board of Directors is responsible for managing insider information and must maintain accurate and complete records of insider information personnel [2][3] - The Securities Affairs Department oversees the daily management of insider information, including supervision, registration, disclosure, and filing [2] Definition of Insider Information - Insider information refers to non-public information that significantly impacts the company's operations, finances, or market trading prices of its securities [3][4] - Insider information personnel include company directors, senior management, major shareholders, and other individuals who can access insider information due to their roles or relationships with the company [4][5] Registration and Filing of Insider Information Personnel - The company must accurately fill out and timely submit insider information personnel records before public disclosure [7][8] - The registration process involves notifying the Securities Affairs Department immediately when insider information arises and ensuring confidentiality [8][9] Confidentiality Management - All directors and insider personnel must sign confidentiality agreements to limit the dissemination of insider information [21][22] - Insider personnel are prohibited from trading the company's stock or disclosing insider information before it is publicly released [22][23] Responsibilities and Penalties - The company must conduct self-checks on insider trading activities and report any violations to regulatory authorities [13][14] - Violations of the insider information management system may result in penalties ranging from warnings to termination of employment, depending on the severity of the breach [29][30]