Workflow
豫光金铅: 河南豫光金铅股份有限公司内幕信息知情人登记备案制度

Core Points - The article outlines the insider information management and registration system of Henan Yuguang Gold Lead Co., Ltd, aiming to regulate insider information handling and prevent insider trading [1][2][3] Group 1: General Principles - The system is established to ensure the confidentiality of insider information and to maintain fair information disclosure principles according to relevant laws and regulations [1][2] - The board of directors is responsible for ensuring the accuracy and completeness of insider information registries, with the chairman being the primary responsible person [2][3] Group 2: Definition of Insider Information - Insider information refers to non-public information that could significantly impact the company's operations, finances, or stock prices [3][4] - Specific examples of insider information include major changes in business strategy, significant asset transactions exceeding 30% of total assets, and major losses or debts [3][4] Group 3: Registration Management - The company implements a registration and filing management system for insider information, requiring detailed records of individuals who have access to such information [5][6] - The registration must include personal details, the nature of the insider information, and the circumstances under which it was obtained [5][6] Group 4: Confidentiality Obligations - All insider information personnel are required to maintain confidentiality and are prohibited from disclosing or trading based on insider information [10][11] - The company must take necessary measures to control the dissemination of insider information and ensure that only authorized individuals have access [10][11] Group 5: Accountability and Compliance - The company is mandated to conduct self-inspections regarding insider trading activities and report any violations to regulatory authorities [11][12] - Violations of the insider information management system may result in penalties, including potential criminal liability for severe breaches [11][12]