Joke Collection Website - Blessing messages - How do police keep confidentiality?
How do police keep confidentiality?
Confidentiality has always been an important task for the party and the government. In times of war, secrecy is to protect survival, victory, and hope; in times of peace, secrecy is to protect security, development, and advantages. In today's society, as the degree of world economic integration continues to increase, the struggle between infiltration and counter-infiltration, theft and counter-theft, and subversion and counter-subversion has become extremely complex and sharp. As an important part of state organs and a tool of the people's democratic dictatorship, the quality of confidentiality work of public security organs is particularly important. Based on my own confidentiality work experience, the author talks about some superficial understanding and encouragement to colleagues.
1. The impact of informatization construction on traditional confidentiality work
The public security agency is an important part of the national judicial system. The legal status of the public security agency determines that it is both a large number of state secrets and a and the carrier of public security work secrets. It is also an important department that produces a large number of state secrets and public security work secrets. However, with the continuous advancement of informatization construction of public security organs, the traditional confidentiality mechanism has been violently impacted. Mainly manifested in the following three aspects:
(1) Impact on the traditional concept of confidentiality. For many years, public security confidentiality work has required "keep-mouth", do not ask about things that should not be asked, and do not tell about things that should not be said. Strictly abide by the "Secrecy Law" and the relevant confidentiality regulations of the public security organs: do not inquire about state secrets and case status for reasons other than work; do not talk about state secrets and public security work secrets in public places and in front of family members, children, relatives and friends; do not talk about state secrets and public security work secrets in private places. Disclose state secrets and case information during interactions; do not copy or copy secret documents and information without permission; do not carry secret documents and case files to dormitories or public places; do not quote state secrets in personal works and articles, and do not disclose them to others without approval. It has become common knowledge for all public security personnel that any unit provide information on ongoing cases, etc. Based on this kind of consciousness, or the concept of confidentiality, the security of state secrets and public security work secrets has been better protected in public security work over the years. However, in the construction of informatization, because many people's understanding of computers is still in its infancy, they only pay attention to the convenience of work brought by office automation, and ignore or simply do not realize that sitting in front of the computer in the office may leak public security work secrets. go out. Therefore, the concept of secrecy of "just keep your mouth shut and your hands tight; confidentiality is only a matter for a few people" has fallen far behind the requirements of the times.
(2) Impact on traditional confidentiality methods. For a long time, the main ways of maintaining confidentiality of public security organs have been to strengthen the management of confidential documents, assign special personnel to be responsible for sending and receiving documents, circulate them within the prescribed range, collect them in a timely manner, store them in centralized categories, and destroy them regularly; and strictly control the scope of distribution of photocopies of confidential documents. , and strengthen management as original documents; for state secrets or public security work secrets formed in public security work, strictly follow procedures, assign responsibilities to people, and file them in a timely manner; set up a special fax machine room to strictly control the approval procedures and management of confidential faxes; Set up a special archives room to strengthen the centralized management and utilization of documentary files, litigation files and other files. However, this traditional, single confidentiality method has been severely impacted in the process of information construction. Due to the use of information networks, a large amount of information is circulated and shared online, and information materials containing state secrets will be leaked as soon as they enter the computer. In addition, the extensive use of external computer disks also makes it easy for public security work secrets to be copied and leaked. Similarly, if the operation of the internal LAN cannot be completely physically isolated from the public network or if frequent confidentiality measures are not taken, the secrets on the network will also be leaked. Therefore, it can be said that there are more ways to leak secrets in the informatization construction of public security organs, and relying solely on traditional confidentiality methods has been far unable to keep up with the needs of informatization development.
(3) Impact on traditional confidential objects. The traditional confidentiality objects of public security organs are mainly various confidential paper documents with a classification level and litigation files produced in public security litigation activities, as well as confidential faxes, notebooks, meeting minutes, various exhibits and other confidential items. With the development of informatization in public security organs, the objects of confidentiality have also rapidly expanded, including computers (including portable), computer floppy disks, U disks, audio (video) tapes, and radio communication equipment (mobile phones, paging) that store state secrets and public security work secrets. machines, etc.) have become confidential objects. The emergence of such confidential objects has made the management of confidentiality work more difficult, and there is currently a lack of effective management mechanisms.
2. Hidden dangers and problems existing in the current public security confidentiality work
In recent years, through continuous education, publicity, inspection and deployment of confidentiality work, we have ensured that the public security organs Implementation of confidentiality measures. However, individual departments and individual police officers still do not tighten their grip on confidentiality work, and their understanding of confidentiality work is still superficial. They think that as long as they protect confidential documents, information, pictures and other paper media, they will not protect some optical media. There is insufficient understanding of the importance of media and magnetic media as carriers of state secrets, and no effective protective measures have been taken, resulting in widespread risks of leakage and loopholes.
(1) Loopholes in discarded documents and data. According to reports, during a surprise inspection of a scrap collection station in a certain city, it was discovered that among the scrap materials sold by a certain unit, there were 5 top-secret documents, 8 confidential documents, and more than 200 secret documents, as well as a large amount of internal information, which was shocking. By comparison, does this phenomenon also exist in other places and departments? When a county relocated to a new office building, some departments sold a large amount of used documents and materials. It was impossible to verify whether there were classified documents among them. However, this way of handling used documents and materials is a major hidden danger in confidentiality work.
(2) Loopholes of lax registration. According to confidentiality requirements, confidential documents must first be registered and then circulated within the specified range. The person who circulates must read and sign within the specified time, and finally archive and seal them. However, in actual operation, some comrades do not strictly register the confidential documents after receiving them, and process the confidential documents together with other general documents; some leaders randomly place the circulated confidential documents on their desks so that the staff who enter the office can There is a chance to read these confidential documents at will, causing the risk of leakage; what is more serious is that some confidential documents are circulated without registration, causing the confidential documents to disappear during the circulation, causing greater risks of leakage; some leaders do not abide by confidentiality. The regulations stipulate that viewing confidential documents is regarded as administrative treatment, and the scope of circulation of confidential documents is determined based on the administrative level. These are wrong practices and require our attention and improvement in our work.
(3) Vulnerabilities in confidential computers and storage media. First, when the police used various types of confidential electronic media to store confidential information, due to negligence or irregular operations, secret information was leaked or stolen; second, the management of confidential computers was not standardized. Failure to strictly abide by relevant regulations such as "eight prohibitions", "four prohibitions" and "one machine for dual use", failure to strictly implement confidentiality requirements for confidential computer information systems, and failure to ensure that "online information is not confidential, "Confidential information is not allowed on the Internet", and no distinction is made between secret information and non-confidential information; thirdly, carriers such as USB flash drives, floppy disks, optical disks and mobile hard drives (MP3, MP4, digital camera memory sticks) that store confidential information are not marked with confidentiality levels in accordance with regulations. It cannot be kept properly. The used confidential carriers were not destroyed, allowing people with ulterior motives to use technical means to recover hard drive data that had been degaussed or formatted many times, causing leaks; fourth, computer management was not strict, resulting in computer losses. Laptop computers, desktop computers and other confidential computers are lost due to poor management, which poses a risk of leakage.
(4) Vulnerabilities in mobile phone voice signals and sending short messages. With the development of information technology, mobile phones have more and more functions, and there are more and more hidden dangers of leaking secrets, which brings severe challenges to security and confidentiality work. Poor awareness of safety precautions and low vigilance when using mobile phones, or failure to strictly implement confidentiality management regulations for the use of mobile phones, and casually talking about state secrets or transmitting secret information during calls; or using mobile phones donated by others; or holding meetings involving matters. During the confidential meeting, the conference room was not equipped with a mobile communication jammer and the mobile communication signals in the venue were not blocked. At present, mobile phone leakage has become a major leakage risk that cannot be ignored.
(5) Loopholes in printing secret documents. After printing confidential documents and information, they cannot be stored on other media in a timely manner and encryption measures must be taken. When printing secret documents and information, they do not print at designated printing plants, but print at printing plants and business premises in the public, causing leakage of secrets.
3. Countermeasures to strengthen and improve public security confidentiality work
(1) Firmly establish the concept of confidentiality. At work, we must always adhere to the principle that "confidentiality is no small matter", be vigilant at all times, strictly abide by confidentiality disciplines, and consciously fulfill confidentiality responsibilities. First of all, leading cadres at all levels should take confidentiality work into their sights and put it on their important work agenda as an important part of their work.
Secondly, when determining confidential personnel for important positions, police officers who are politically reliable, have a clear history, have a strong sense of responsibility, and have a decent style should be educated to fully understand the importance of public security confidentiality, firmly establish the concept of enemy situation, enhance confidentiality awareness, and build a We must strengthen our ideological defense line, resolutely overcome the vague understanding that "it is difficult to protect if there is a secret, and it is impossible to protect if there is no secret" and the paralyzing thinking under peaceful conditions, and resolutely abandon the erroneous tendency of guarding against the outside but not the inside.
(2) Vigorously carry out confidentiality publicity work. As the saying goes, "alarm bells sound." Leaders at all levels must attach great importance to confidentiality publicity and education, carry out extensive, in-depth, and sustained mass confidentiality publicity and education activities, and conscientiously study the Law of the People's Republic of China on the Protection of State Secrets. ” to further enhance the national defense awareness, national security awareness and public security work-oriented awareness of all police officers. It is necessary to focus on the confidentiality education work of the main responsible comrades and personnel in key departments and positions, and carry out targeted education and training. At the same time, all police officers are organized to conduct knowledge examinations and knowledge competitions on confidentiality laws and regulations, continuously innovate educational methods, and strengthen the sense of urgency and mission in safety and confidentiality work.
(3) Improve internal confidentiality prevention capabilities. "The embankment of a thousand miles collapsed in an ant nest." We should follow the principle of "active prevention, highlighting key points, and proceeding from reality" and determine confidentiality procedures and formulate confidentiality measures based on the work characteristics and scope of each business department. Personnel involved in confidentiality must establish file management, clarify confidentiality work responsibilities, and at the same time strictly implement confidentiality management measures to build a strong dam for confidentiality work ideologically and from the source to ensure that confidentiality work is foolproof.
(4) Improve and improve the confidentiality working mechanism. First of all, do a good job of classification. Classification is to determine the confidentiality level of information in accordance with laws and regulations and to mark the confidentiality level on the carrier. Classification in accordance with the law is the legal responsibility and obligation imposed by the law on the units that produce state secrets. Classification work is a regular and basic work. It is a process of distinguishing between classified and non-classified, what classification level is and marking it on the carrier. Steps and methods of classification: First, strengthen organizational leadership. Generally, the leader in charge of confidentiality work is the team leader, and the heads of departments with secret matters are members. The second is to determine the person responsible for the classification work and clarify the responsibilities. The person responsible for classification work is generally the person in charge of drafting and reviewing documents in the office. The person responsible for classification work shall sign a responsibility letter for classification work to the unit confidentiality committee, clarifying responsibilities and reward and punishment measures. The third is to organize relevant personnel to study the "Regulations on State Secrets and the Specific Scope of Classification" and master the standards and basis for classification. Secondly, formulate a confidentiality work plan and establish dynamic management. As the saying goes, “Nothing can happen without rules”, which shows the importance of system construction. First, strictly implement the registration system to prevent the loss or omission of confidential documents; second, strictly control the circulation scope and circulation time limit of confidential documents. No one is allowed to copy or excerpt without authorization, let alone retain confidential documents, to prevent the expansion of the scope of circulation and the leakage of confidentiality during the circulation process; The third is to control confidential personnel, and dedicated personnel must be responsible for registration, transmission, archiving and other tasks; the fourth is to establish a destruction system for expired and invalid confidential documents. Secret-related departments must be equipped with shredders to process drafts and printouts of confidential documents generated during work. Wrong products, waste products, etc. must be destroyed in a timely manner; fifthly, a sound and strict management system must be established and documents and materials must be carefully screened and classified, and discarded documents and materials must not be disposed of without permission to prevent the leakage of confidential documents; sixthly, the confidential document archiving system must be strictly implemented.
(5) Increase confidentiality supervision and confidentiality penalties. At present, many hidden dangers of leaks in the confidentiality work of grassroots public security officers are largely caused by the lack of confidentiality supervision and punishment mechanisms. Therefore, the competent authorities must conduct irregular inspections of confidential units to discover hidden dangers in a timely manner and plug leaks. Those who violate confidentiality disciplines and rules and regulations must be promptly pointed out, corrected, and dealt with in a timely manner. Those who should be punished should be punished, transferred if they should be transferred, and dismissed if they should be dismissed. Those who violate the criminal law must be investigated for criminal responsibility in accordance with the law. They will never be lenient and will never be merciful. Do not tolerate accommodation.
- Previous article:How to transfer money from mobile banking to WeChat?
- Next article:Does it cost me money to call 12 1?
- Related articles
- How much does it cost to roam the UK by mobile phone?
- Introduction to mobile phone message rates in Guangdong?
- What is the tariff standard of China Mobile International SMS?
- Where is the source of the epidemic in Sanmenxia Lakeside District?
- Time flies. Thank you Xpeng Motors G3 for accompanying me through the spring, summer, autumn and winter.
- Will credit card repayment be notified by SMS?
- Romantic and humorous love words that make your girlfriend happy.
- Spring Festival greetings SMS, but pay attention to safety.
- How do I cancel the Migu premium membership fee?
- How to write a brief warm reminder to urge the payment of property fees?