Joke Collection Website - Bulletin headlines - No equipment with any functions may be brought into confidential offices without approval
No equipment with any functions may be brought into confidential offices without approval
It is strictly prohibited to use equipment with the function of connecting to the Internet and other public information networks as state secret equipment.
Secret-related computers should be physically isolated from the Internet and other public information networks, and direct or indirect connections between classified computers and non-confidential computers, non-confidential information networks, and the Internet are strictly prohibited.
Secret-related computers should be equipped with anti-electromagnetic leakage video jammers and filtered power sockets approved by the national confidentiality administration department for protection, and the power supply circuits of red and black equipment should meet isolation requirements.
Confidential meetings are an important part of security and confidentiality management, and should be paid more attention to in daily work to ensure the security of national secret information and prevent the occurrence of leaks. The conference organizer needs to verify the participants based on the determined list of conference participants by making corresponding certificates, checking identities, etc., to ensure that the attendees are accurate and to prevent irrelevant persons from entering the conference site.
For meetings where the contents of the meeting or the media issued have a higher confidentiality level or where a large number of confidential personnel are involved, the confidentiality work plan should be held in an internal location and a confidentiality work plan should be implemented. The location of a confidential meeting must be inspected and determined by the relevant departments organized by the confidentiality office. It must meet the confidentiality conditions of the meeting place, and the venue service personnel must conduct strict review.
Specialized personnel should be designated to be responsible for the issuance, removal, delivery and destruction of conference confidential media, and registration and signature procedures should be performed at the same time to strengthen confidentiality management.
Technical equipment used at the conference site should comply with security and confidentiality requirements. Mobile phones and portable computers with unlimited Internet access are prohibited. Equipment with camera, video, audio and other functions are prohibited from being brought in without approval. Depending on the needs of the meeting, mobile phone jammers should be set up in the meeting room when necessary.
- Previous article:Elephants are invisible from "agility" ¡ª¡ª Thoughts on Reading "Your Chinese class can be so agile"
- Next article:Watch the slogan of 800
- Related articles
- What are the cultured marine fish?
- How to promote an errand company, other than issuing leaflets
- Why are the strawberries in Dandong so delicious?
- Primary school students' traffic safety handwritten newspaper is concise and beautiful, with clear words.
- 600 words of epidemic situation _ 5 essays on fighting epidemic situation
- Soft decoration: make the home space full of warmth and personality.
- Urgent! Shanxi specialty slogan?
- I beg you to expand your experience. . . Requirements: Write about corporate spirit and culture.
- How far is Maoxian from Wenchuan?
- If you improve your Chinese scores in the senior high school entrance examination