Joke Collection Website - Blessing messages - Five self-examination reports on strengthening confidentiality management
Five self-examination reports on strengthening confidentiality management
#report# Introduction A self-examination report is a self-examination report style in which a unit or department examines problems existing in the execution of a certain job within a certain period of time. The following is a self-examination report on strengthening confidentiality management. Welcome to read it!
Self-examination report on strengthening confidentiality management Part 1
According to the requirements of Da Municipal Committee Office [XX] No. 66 and Kaijiang Committee Office [XX] No. 104 and the instructions of the leaders of the county party committee and county government spirit, our township’s confidentiality work leading group attaches great importance to it and conducted a comprehensive self-examination of the confidentiality work. The basic scenario is as follows:
1. Unify thinking, raise awareness, and strengthen leadership
The township party and government leaders attach great importance to confidentiality work and regard it as an important task and include it Comprehensive target assessment data for the whole year is planned, implemented, inspected and assessed in the same way as other work. The township has specially established a confidentiality work leading group to be responsible for the confidentiality work of the agency. The group leader is Comrade xx, the party committee secretary, and the deputy group leader is Comrade xx, the government township mayor, and Comrade xx, the deputy township mayor.
The heads of the main functional departments of the party and government, the main persons in charge of key confidentiality positions and the confidentiality officers are members. At the same time, the leaders in charge are responsible and the handling personnel are responsible. The party and government leaders of our township can give attention and support to the facilities, equipment and funds required for confidentiality work, ensuring the smooth development of daily work.
2. The situation of confidentiality work in our township
1. The situation of confidentiality work in key departments and key parts
After research and determination by our township party committee, our township Departments such as the party and government offices, finance offices, printing rooms, archives rooms, and material warehouses are key areas for confidentiality. Due to the wide range of sources of secrets and the depth of secrets involved, the confidentiality work leading group conducts irregular inspections and supervision of the confidentiality work in these areas to prevent confidentiality leaks. It is necessary to establish and improve rules and regulations for important parts of confidentiality, starting from every link, with a strong sense of confidentiality, effective measures, and good implementation.
For example: the archives office has formulated confidentiality responsibilities for archives staff, and has complete procedures for checking, borrowing and reading archives; the fax machines in the party and government offices, computers, printers, scanners and other equipment in the printing room are all kept by dedicated personnel. Office staff have confidentiality rules and management methods. The transfer, recycling and cancellation of confidential documents and internal information are strictly handled in accordance with the relevant requirements of superiors, forming a complete set of systems and regulations with smooth management channels. After changes in confidentiality cadres, they are required to participate in on-the-job training in a timely manner, put forward requirements for confidentiality work, and provide guidance on daily confidentiality management work.
2. The confidentiality work situation of computer information systems
In recent years, due to the development of the situation and work needs, our township has equipped each printing office and financial office with computers, printers, and copiers. The party and government network and local area network were established, and the party and government offices were equipped with telephones and fax machines to solve the problem of backward network information. In order to strengthen the confidentiality of computer information systems, our township has taken the following measures:
First, each computer system must install firewalls and anti-virus software to prevent hackers and virus intrusions.
The second is to designate staff who understand computer operation, management, and have high political and ideological consciousness to be responsible for the management of confidential computers. They must strictly check whether computers with Internet access are confidential, effectively strengthen management, and clearly require confidential computers. Computers are physically isolated, and access to the Internet is strictly prohibited. Computers that involve confidential information do not access the Internet, and computers that do access the Internet do not involve confidential information.
The third is to formulate computer security operating specifications, requiring confidential personnel to operate strictly in accordance with the specifications, report viruses in a timely manner, and have dedicated personnel handle them. Fourth, online information must be approved by the confidentiality work leading group before being uploaded to strictly prevent leaks.
3. Scenario of establishing confidentiality rules and regulations
Establishing and improving confidentiality rules and regulations is an important guarantee for confidentiality work in the new era. In recent years, our township has revised and improved the following confidentiality work system:
(1) The confidentiality work system further clarifies the confidentiality responsibilities of leading cadres, employees and confidentiality personnel.
(2) Computer confidentiality management responsibility system has effectively strengthened computer confidentiality management.
(3) Mobile storage media confidentiality management system.
(4) Confidentiality management system for confidential networks.
(5) Office automation equipment confidentiality management system.
(6) Keep confidential key departments and position management systems.
(7) Confidential management system for computer repair, replacement and scrapping.
(8) Public information network confidentiality management system.
4. Scenarios of carrying out confidentiality education for cadres and employees of government agencies
The township party committee attaches great importance to confidentiality education and adopts various methods and uses various opportunities to conduct regular education for cadres and employees throughout the township. Confidential education. Our township insists on conducting it three times a year, and carefully organizes cadres and workers to study the "Decision of the Central Committee of the Communist Party of China on Strengthening Secrecy Work under the New Situation", the "Law of the People's Republic of China on the Protection of State Secrets", and the "Measures for the Implementation of the Secrecy Law" 》And the meeting spirit and regulations of superiors regarding confidentiality work.
Organize all cadres and employees to watch TV video programs about the "Secrecy Law", study materials from the "Secrecy Work" magazine, and participate in the "Secrecy Law" knowledge competition organized by the Municipal Security Bureau. The implementation of these activities has enhanced the awareness of confidentiality among cadres and faculty and laid a solid mass foundation for the confidentiality work in our township.
3. Main existing problems and improvement suggestions
1. The publicity and education on confidentiality work is not enough. The practice of confidentiality work in recent years has made us realize that it is very important to strengthen the confidentiality education of township leaders and employees and to improve the confidentiality awareness of every citizen. Nowadays, it is very common to use computer networks and emails to send information externally, but this may also bring the risk of leakage.
In view of this situation, it is necessary to strengthen publicity, enhance people's awareness of confidentiality, improve the initiative and consciousness of confidentiality work, and formulate corresponding rules and regulations to standardize prior behavior. Prevent possible loss of confidentiality, theft, and leakage of secrets, and eliminate hidden dangers to ensure national security.
2. The problem of determining the confidentiality level of internal information. Since the classification level and scope are difficult to grasp, it is difficult to clarify requirements and specifications at work.
3. To do a good job in confidentiality work, a strong material foundation is also needed to ensure it. In addition to necessary investment in funds and equipment, professional training for confidentiality staff should also be strengthened to improve the quality of confidentiality cadres. At present, full-time (part-time) confidentiality staff at the grassroots level in rural areas have less training and are not skilled in business work. Negligence and omissions in the work result from this. In addition, there are frequent personnel changes, so the professional training of confidentiality staff needs to be further strengthened. .
4. Confidential management of computer systems and networks is an arduous task, and there is still a lack of fully guaranteed technical support. At present, it can only be restricted by the conventional confidentiality system, and strict monitoring measures are taken to prevent emergencies, which sometimes seems to be insufficient. Our hometown can only explore and practice through exploration.
Over the years, under the leadership of the county party committee, county government, and county confidentiality bureau, our township’s confidentiality work has gradually been standardized and institutionalized, and there have been no confidential incidents. In the future, we will continue to work hard to consolidate and carry forward the achievements made in the past, actively explore and study new scenarios and new issues in confidentiality work in the new era, and strive to reach a new level in confidentiality work.
Self-examination report on strengthening confidentiality management Part 2
In order to conscientiously do a good job in confidentiality work, our bureau will combine the actual work with the inspection catalog and self-examination one by one. The self-inspection will now be carried out The status report is as follows:
1. Basic situation
All computers in our bureau are equipped with anti-virus software, which is regularly anti-virus and upgraded, and designated personnel are responsible for computer confidentiality management. Designate a dedicated person to properly handle the sending and receiving, registration, delivery, archiving and destruction of documents, ensuring the safety of confidential documents, records, information, etc. during the delivery and use process, and that no errors or leaks occur. It is further clarified that the confidentiality work must be truly institutionalized, standardized and scientific with rules, basis and inspection criteria. Through self-examination, our bureau’s computer confidentiality work has basically ensured that the system, management and inspection are in place.
2. Main practices
(1) Pay high attention and strengthen organizational leadership. The leaders of our bureau attach great importance to it and have established a confidentiality leadership group to strictly implement confidentiality work. Members of the leadership team set an example, consciously learn and master the confidentiality system, understand the law, know the law, and enforce the law. Among the cadres and workers, they have truly established a style of law that must be followed, rules must be followed, violations of the law must be investigated, and orders and prohibitions must be followed.
(2) Focus on the key points and pay close attention to the implementation of the work. Our bureau regularly focuses on inspections of illegal outreach and special Trojans on computers and mobile storage media to investigate and promote management, take preventive measures in a timely manner, and resolutely cut off all channels for confidential information to flow to the Internet.
(3) Promote education and enhance confidentiality awareness. In order to strengthen the confidentiality and security awareness of the secret-related personnel of our bureau, we adopt various methods and channels to carry out publicity and education for relevant personnel, and forward various confidential learning documents to each department. It is required to combine the actual situation, carefully organize the learning, and do a good job in implementation. Implement to ensure the security of computers and their networks.
(4) Improve measures and strictly regulate systems. Strengthening system construction is the guarantee for computer confidentiality management. In order to build a scientific and rigorous institutional prevention system, our bureau continues to improve various rules and regulations and standardize the confidentiality management of computers and their networks. It has mainly taken the following measures: First, computers implement relevant regulations and requirements of superior confidentiality department documents , and continuously enhance the potential of computer confidentiality management in accordance with the law; the second is to formulate the bureau's various confidential and non-confidential computer and network management systems; the third is to strictly regulate the flow of confidential information, and strictly implement the "confidential information does not go online, The principle of "non-confidential information on the Internet".
In the future work, our bureau will further strengthen the emphasis on confidentiality work, strengthen the management of confidential information, strive to achieve new results in confidentiality work, and ensure the smooth development of confidentiality work.
Self-examination report on strengthening confidentiality management Part 3
According to the "Opinions of the General Office of the Huangshan Municipal Committee of the Communist Party of China and the General Office of the Huangshan Municipal People's Government on Further Strengthening the Secret Management of the Work of Party and Government Agencies" (Official Office [20xx] No. 35) requires that in order to further strengthen the confidentiality management of party and government agencies, our bureau promptly conducted a self-examination on the implementation of confidentiality work. The self-inspection report is now as follows:
1 , Self-examination situation
(1) Strictly implement the responsibility system for confidentiality work of leading cadres
Focus on the confidentiality management of confidential personnel, confidential carriers, and confidential computers, and further strengthen confidentiality work Leaders, strengthen confidentiality management, strengthen supervision and inspection, pay close attention to the implementation of various confidentiality measures and confidentiality responsibility system, and prevent the occurrence of major leaks. First, the party group of the bureau has always included confidentiality work on its important agenda, and has paid close attention to the implementation of the responsibility system. It held a special meeting at the beginning of the year to formulate confidentiality measures, forming a management system in which the top leader takes overall responsibility, leaders in charge are responsible for their respective responsibilities, and the office is organized and coordinated. . Second, in order to adapt to the new situations and new problems of confidentiality work under the new situation, we have further improved and improved the confidentiality work leadership with the director and secretary as the team leader, other team members as deputy team leaders, and the heads of the secondary agencies of each department as the team members. The team, with an office under it, is responsible for handling the daily affairs of confidentiality work, providing a strong organizational guarantee for the comprehensive implementation of confidentiality work. The third is to adhere to the principle of who is in charge and who is responsible, implement the target responsibility system, include it as one of the contents of the overall target assessment, break down the target tasks layer by layer, and implement them to each department and secondary organization of the bureau, so that there are arrangements at the beginning of the year and regular tasks. Inspections and assessments at the end of the year.
(2) Strengthening publicity and education
Strengthening confidentiality education and enhancing the concept of confidentiality are the prerequisite and foundation for doing a good job in confidentiality work. In this regard, our bureau attaches great importance to the publicity and education of confidentiality work. Leading cadres and personnel involved in confidentiality insist on taking the lead in carefully studying the relevant regulations on confidentiality work, and constantly improve the level of managing confidentiality work in accordance with the law. At the same time, various meetings and other forms are used to strengthen confidentiality publicity and education among employees, prompting cadres and workers to consciously fulfill confidentiality obligations and responsibilities, and changing misconceptions such as "no secrets can be kept" and "no secrets can be kept".
(3) Improve the system
First, further improve confidentiality rules and regulations to ensure the safety of key secret-related parts; second, adhere to the management and use of our bureau’s secret carriers A system of quarterly inspections is implemented to promptly rectify deficiencies and hidden dangers discovered during inspections; third, a computer management system is formulated to conduct inspections of computer network security protection and take measures such as regular upgrades of local area network anti-virus software. Adhere to the principles of "whoever surfs the Internet is responsible" and "online information does not involve confidentiality, and confidential information does not enter the Internet" to prevent the occurrence of confidentiality issues.
(4) Strict confidentiality management
First, strengthen the management of secret carriers. In order to ensure the safety of secret carriers, in line with the principles of strict management, strict prevention, ensuring safety, and convenient work, our bureau strictly follows the requirements and strengthens the management of the eight major links of secret carrier production, receipt, transmission, use, preservation, and destruction, so that The management of secret carriers has entered a standardized track. In the production process, both paper media carriers and magnetic media carriers are produced uniformly within the institution, and materials that do not need to be archived are destroyed in a timely manner. In the sending, receiving and delivery process, the procedures for counting, registration, numbering, and issuance are strictly performed. When delivering, confidential personnel are assigned to be responsible and corresponding security and confidentiality measures are taken. In terms of use, the scope of personnel must be strictly known. For unauthorized expansion of the scope of knowledge, any recording, audio or video recording is not allowed. The communicator must declare in advance that copying secrets must be approved by the supervisor and must complete registration procedures. In terms of preservation, it is archived in strict accordance with national archives laws and regulations, and a dedicated person is assigned to take charge and equipped with necessary confidentiality equipment. In terms of destruction, we must conscientiously perform the review, inventory, and registration procedures, adopt corresponding non-leakage methods to destroy, and prevent secret carriers from being sold as scrap. The second is to strengthen file confidentiality management. In order to strengthen the security and confidentiality during the borrowing and circulation of documents and archives, the "Archives Custody System", "Job Responsibilities of Archives Personnel", "Archives Handover System" and other systems have been further improved. Through the establishment of these systems, the work of sending, receiving, circulating, clearing, and borrowing files has been strengthened, so that the documents of our bureau can be cleared and returned completely, circulated in a timely manner, and all aspects of the filing, archiving, transfer, and destruction of files can be ensured. Safety. The third is to implement dedicated management of confidential computers. Implement dedicated management of confidential computers, strengthen education and training for operators, and implement job responsibilities. The fourth is to strengthen information submission for review and approval. Strengthen the approval system for online submission of information. All information submitted to various government websites must be approved by the office before submission.
II. Existing problems and corrective measures
1. The organization of cadres and employees to conduct confidentiality education is not enough, the confidentiality awareness of ordinary employees is not strong, and there is still a phenomenon of random placement of information and documents. , the management records of confidential personnel are incomplete.
Corrective measures: Strengthen confidentiality publicity and education for overall cadres and employees, improve confidentiality awareness, standardize the management of documents and materials, strengthen responsibility awareness, and implement the responsibility system and accountability system.
2. The confidentiality system is not perfect, and there are some compromises in the implementation of the system. The confidentiality management regulations for computers, laptops, networks, and mobile hard drives need to be further refined, and there is insufficient awareness of the problem of network leaks.
Corrective measures: Through this self-inspection and major inspection of confidentiality work, we will focus on rectification of weak links. First, we will further improve various management regulations, work hard on refinement, and make a fuss about implementation. Strengthen network maintenance and management, formulate specific measures and methods, strengthen supervision and inspection, and ensure that rectification achieves substantial results.
3. There are still loopholes in the confidentiality management of key parts and departments. The emphasis is on hardware construction and the management of the use of confidential computers and confidential mobile storage media is ignored.
Corrective measures: Prevent the occurrence of confidential leaks from the source. Strengthen system construction and review and control of personnel entering and exiting key positions and departments. On the basis of improving the management regulations on the use of confidential computers, we must pay close attention to the implementation and implementation of various basic rules and regulations.
Part 4 of the Self-examination Report on Strengthening Confidentiality Management
In December 2020, the director of our company’s Confidentiality Office and two other people participated in the training of the new confidentiality qualification system. According to the documents and spirit of the company, we have carefully carried out self-examination of confidentiality work in response to some problems and weaknesses in our company. The relevant situation is summarized as follows:
1. Strengthening organizational leadership
Since this year, under the guidance of the provincial and municipal confidentiality bureaus, our company has conscientiously implemented the spirit of relevant documents to ensure Focus on confidentiality management of confidential personnel, confidential carriers, and confidential computers, further strengthen confidentiality work leadership, strengthen confidentiality management, strengthen supervision and inspection, pay close attention to the implementation of various confidentiality measures and confidentiality responsibility systems, and prevent the occurrence of major leaks of confidentiality. . First, we always put confidentiality work on the important agenda, pay close attention to the implementation of the responsibility system, hold a special meeting at the beginning of the year to formulate confidentiality measures, and form a management system in which the top leader takes overall responsibility, leaders in charge are responsible for their respective responsibilities, and the management department organizes and coordinates. Second, in order to adapt to the new situations and new problems of confidentiality work under the new situation, we have further improved and improved the confidentiality work leading group with the general manager as the leader and the heads of each department as members. It has a confidentiality office under it, which is responsible for handling the daily routine of confidentiality work. affairs, providing a strong organizational guarantee for the comprehensive implementation of confidentiality work. The third is to adhere to the principle of who is in charge and who is responsible, implement a target responsibility system, include it as one of the contents of the overall target assessment, break down the target tasks layer by layer, and implement them into each department, so that there are arrangements at the beginning of the year, inspections at ordinary times, and assessments at the end of the year. .
2. Strengthen publicity and education
Strengthening confidentiality education and enhancing the concept of confidentiality are the prerequisite and foundation for doing a good job in confidentiality work. In this regard, our company attaches great importance to the publicity and education of confidentiality work. Leading cadres and personnel involved in confidentiality insist on taking the lead in carefully studying the relevant regulations on confidentiality work, and constantly improve the level of managing confidentiality work in accordance with the law. At the same time, various meetings and other forms are used to strengthen confidentiality publicity and education among employees, so as to encourage employees to consciously fulfill confidentiality obligations and responsibilities, and change misconceptions such as "no secrets can be kept" and "there are secrets difficult to keep".
3. Improve the system
First, further improve the confidentiality rules and regulations to ensure the safety of key confidential parts. In March 2017, the Municipal Secrecy Bureau conducted a special inspection of our company During the confidentiality inspection, it was found that there were no monitoring problems in the confidentiality room, and our company made serious rectifications. At the same time, in view of the hidden dangers in the confidential workroom, such as water leakage when it rains and lack of strict management of people entering, in January 2018, the confidential machines in the confidential workroom were merged into the security room to strengthen management and eliminate hidden dangers. The second is to adhere to the quarterly inspection system for the management and use of our company's secret carriers, and to rectify the deficiencies and hidden dangers found during the inspection in strict accordance with the requirements; the third is to formulate a computer management system and implement inspections of computer network security protection. Take measures such as regular upgrade of local area network anti-virus software. Adhere to the principles of "whoever surfs the Internet is responsible" and "online information does not involve confidentiality, and confidential information does not enter the Internet" to prevent the occurrence of confidentiality problems.
IV. Strict confidentiality management
First, strengthen the management of secret carriers. In order to ensure the safety of secret carriers, in line with the principles of strict management, strict prevention, ensuring safety, and convenient work, our company strictly follows the requirements and strengthens the management of the eight major links of secret carrier production, receipt, transmission, use, preservation, and destruction, so that The management of secret carriers has entered a standardized track. In the sending, receiving and delivery process, the counting, registration, numbering, and issuance procedures are strictly performed. When delivering, confidential personnel are assigned to be responsible and corresponding security and confidentiality measures are taken. In the use process, the scope of personnel is strictly known. If the scope of knowledge is expanded without authorization, any recording, audio or video recording is not allowed. The communicator must state in advance that copying secrets must be approved by the supervisor and complete the registration procedures. In terms of preservation, it is archived in strict accordance with national archives laws and regulations, and a dedicated person is assigned to take charge and equipped with necessary confidentiality equipment. In terms of destruction, we must conscientiously perform the review, inventory, and registration procedures, adopt corresponding non-leakage methods to destroy, and prevent secret carriers from being sold as scrap.
2. We have strengthened the work of sending and receiving documents, circulating them, clearing them, and borrowing files, so that our company's documents can be cleared and returned in a complete manner, circulated in a timely manner, and all aspects of file establishment, archiving, transfer, and destruction are safe. The third is to implement dedicated management of confidential computers. Implement dedicated management of confidential computers, strengthen education and training for operators, and implement job responsibilities. The fourth is to strengthen information submission for review and approval. Strengthen the approval system for online submission of information. All information submitted to various government websites must be approved by the confidentiality office before submission.
In the future, we are determined to take this self-examination as an opportunity to unremittingly educate and manage all personnel, especially confidential personnel, strengthen business training and on-the-job training, continuously improve rules and regulations, and strengthen confidentiality. Awareness, resolutely prevent the occurrence of leaks, and create good conditions for the development of the enterprise.
Part 5 of the Self-examination Report on Strengthening Confidentiality Management
County Confidentiality Committee Office:
According to the "Notice on Carrying out a Major Inspection of Confidentiality Work" (issued by the County Party Committee Security Office [20**] No. 5) document, the leaders of our bureau attach great importance to it and organized relevant staff to conduct a comprehensive self-examination of confidentiality work. The self-examination situation is now reported as follows:
1. Basic situation
In recent years, our bureau has received very few coded telegrams from the county party committee office, and has dispatched dedicated personnel to receive them and return them quickly as required by regulations; it has no procedures for printing, copying, and destroying coded telegrams, and has not drafted any procedures. Pass confidential documents. Our bureau attaches great importance to confidentiality work. The relevant organizations and systems for confidentiality work are sound, responsibilities are clear, education, prevention, inspection and other work and measures have been well implemented. Agency personnel have a strong awareness of confidentiality. In recent years, there have been no incidents of loss or leakage of confidentiality. .
II. Main tasks
(1) Strengthen leadership, clarify responsibilities, and place confidentiality work in an important position
Our bureau’s leadership team attaches great importance to confidentiality work , taking it as an important task, the bureau has established a confidentiality work leading group, with the director as the leader, two deputy directors as deputy leaders, and the heads of each unit as members, responsible for the overall confidentiality work and implementing confidentiality management system. The leading group has an office under which designated personnel are responsible for information security and confidentiality supervision, inspection, guidance and other daily affairs.
(2) Strengthen education, strengthen awareness, and improve the overall level of confidentiality work. Strengthening the publicity and education of confidentiality work is the key to doing a good job in confidentiality work. To this end, the leaders of our bureau took the lead in participating in confidentiality education activities, and incorporated confidentiality education into the learning content of the bureau’s central group, and organized staff to learn the "Regulations on the Scope of State Secrets in Quality Supervision, Inspection and Quarantine Work" and "A Concise Reader of Confidentiality Knowledge" and related information from superiors The relevant regulations on confidentiality work have enhanced the confidentiality awareness of all types of personnel. We also provide regular confidentiality education to key personnel involved in secrets, which significantly improves their awareness of confidentiality, further enhances their sense of political responsibility, and firmly builds an ideological barrier to prevent leaks of secrets.
(3) Improve the system, strengthen management, and ensure that confidentiality work is implemented. In recent years, our bureau has further revised and improved confidentiality work rules and regulations such as the "Confidentiality Work Management Measures" and the "Information Release Confidentiality Work System" in accordance with the requirements of superiors for confidentiality work and in light of actual conditions, so as to manage people by system and act according to procedures. In daily work, circulate confidential documents according to the prescribed scope and procedures; conscientiously implement the document management system, adhere to two-way registration, strengthen the confidentiality of documents sent and circulated, adopt direct transmission method for circulating documents, register the submitted documents, and be responsible for circulation Document personnel will sign and read each item one by one, return it after reading, count the copies, and return them to the office. All reported documents and information published on the website will be reviewed and signed by the Deputy Director of Internal Affairs before being reported to the office. Waste and duplicate materials generated during the internal material formation process, as well as those that need to be destroyed, shall be uniformly sent to designated institutions for destruction; archives staff are prohibited from using their authority to privately excerpt, copy, and disseminate the contents of confidential files, effectively preventing leaks of confidentiality.
- Previous article:Salesperson job responsibilities
- Next article:Words of greeting and caring for the diseases of the elderly
- Related articles
- Fengze District launched the "Talent Service Month" in 2022.
- Why didn't you receive a text message reminding me that the provident fund had arrived?
- Why can't my mobile phone receive the verification code and send short messages?
- Poems about caring for distant children in Mid-Autumn Festival
- A sentence in which boys apologize to girls.
- Does it take a second for your girlfriend to chat?
- Give the leader a brief New Year greeting.
- What should I do if Huawei's mobile phone uses Huami amazfit Watch 2 without reminding me?
- Fake SMS ringtone
- 10RMB 4G short and MMS package: how to open SMS?