Joke Collection Website - Bulletin headlines - 20 common sense tips on confidentiality technology prevention
20 common sense tips on confidentiality technology prevention
1. 2018 Secrecy Technology Prevention Common Sense
2018 Secrecy Technology Prevention Common Sense 1. Secrecy Technology Prevention Common Sense Content
Secrecy Technology Prevention Common Sense: 1. Do not use the Access confidential computers and networks to the Internet and other public information networks 2. Removable storage media such as USB flash drives are not allowed to be cross-used between confidential computers and non-confidential computers 3. The Internet and other public information networks are not allowed to be used without taking protective measures Copy data on other public information networks to confidential computers and networks 4. Do not set passwords for confidential computers in violation of regulations 5. Do not install software on confidential computers or copy other people’s files without authorization 6. Do not use wireless peripheral devices Confidential computers 7. Confidential computers and removable storage media are not allowed to be shipped through ordinary mail channels or handed over to others for use or storage in violation of regulations 8. Confidential laptops and removable storage media are not allowed to be taken out without authorization 9. Confidential computers and removable storage media are not allowed to be processed without authorization Computers and mobile storage media, fax machines, copiers and other office automation equipment containing confidential information must be handed over to outside personnel for maintenance. 10. Office automation equipment such as computers and other confidential computers that have not been professionally declassified shall not be sold, given away or discarded. 11. Office automation equipment involving the handling of confidential information shall not be The multi-function machine that contains confidential information is connected to an ordinary telephone line. 12. Video and audio input devices are not allowed to be equipped and installed on computers connected to the Internet in confidential places. 13. Mobile phones are not allowed to be brought into important confidential places. 14. Mobile phones are not allowed to be connected to the Internet. Store and process confidential information on computers of other public information networks15. Do not store or process confidential information on non-confidential office networks16. Do not post confidential information on government portals17. Do not use Computers with wireless interconnection functions are not allowed to process confidential information. 18. Personal computers and mobile storage media are not allowed to be used to store or process confidential information. 19. Office automation equipment that has not been tested by confidentiality technology is not allowed to be used in key confidentiality departments and parts. 20. Ordinary computers are not allowed to be used. Fax machines, telephones and cell phones transmit or discuss confidential information.
2. Common sense content of confidentiality technology prevention
Common sense knowledge of confidentiality technology prevention: 1. Confidential computers and networks are not allowed to be connected to the Internet and other public information networks 2. They are not allowed to be used in Cross-use of mobile storage media such as USB flash drives between confidential computers and non-confidential computers 3. Data on the Internet and other public information networks must not be copied to confidential computers and networks without taking protective measures 4. Passwords for confidential computers are not allowed in violation of regulations. 5. You are not allowed to install software on confidential computers or copy other people’s files without authorization. 6. You are not allowed to use wireless peripherals for confidential computers. 7. You are not allowed to send confidential computers and removable storage media through ordinary mail channels. Ship or illegally hand it over to others for use or storage 8. Confidential laptops and mobile storage media are not allowed to be taken out without authorization 9. Office automation equipment such as computers and mobile storage media, fax machines, and photocopiers that process confidential information are not allowed to be handed over without authorization Maintenance by external personnel 10. Office automation equipment such as confidential computers that have not been professionally sold shall not be sold, given away, or discarded. 11. Multi-function machines that process confidential information shall not be connected to ordinary telephone lines. 12. No confidential places shall be used. Video and audio input devices are equipped and installed on computers connected to the Internet. 13. Mobile phones are not allowed to be brought into important confidential places. 14. Confidential information is not allowed to be stored or processed on computers connected to the Internet and other public information networks. 15. Confidential information must not be stored or processed on non-confidential office networks16. Confidential information must not be posted on government portals17. Computers with wireless interconnection capabilities must not be used to process confidential information18. Personal computers and mobile storage media must not be used Storing and processing confidential information 19. Office automation equipment that has not been tested by confidentiality technology shall not be used in key confidentiality departments and parts. 20. Ordinary fax machines, telephones and mobile phones shall not be used to transmit or discuss confidential information.
3. Relevant requirements for confidentiality work and "Twenty Don'ts" for confidentiality technology prevention
Go to Baidu Library to view the complete content gt; Content comes from user: chenzhixiong10 Relevant requirements for confidentiality work 1. Who is in charge of confidentiality work and who is responsible for it. According to the leadership division of labor, who is in charge of what business. At the same time, he leads and manages the confidentiality work in the business. When he is in charge or in charge of the business work, anything that may involve the secrets of the party and the state must be kept. At the same time, specific requirements should be put forward for the confidentiality work involved, and careful arrangements should be made. Wherever business work is managed, confidentiality work should also be managed.
2. When sending and receiving secret carriers, procedures such as counting, registration, numbering, and signing must be completed. When delivering secret carriers, they should be packaged and sealed; safe means of transportation and traffic routes should be selected, and corresponding security and confidentiality measures should be taken; it should be done through confidential transportation, confidential communications, or designated personnel, and should not be delivered through ordinary postal or non-postal channels.
To deliver top-secret secret carriers, a two-person escort system is implemented. 3. It is necessary to set up a special folder for circulation and delivery, and to keep track of the whereabouts of secret documents and materials at all times.
The scope of reading and knowing of secret documents cannot be expanded at will. The scope of knowledge is determined by the supervisor. In principle, confidential documents circulated cannot stay overnight in the confidentiality room. "Horizontal circulation" of confidential documents circulated and sent to the office is strictly prohibited (that is, secret documents cannot be It is passed directly from one comrade to another through the hands of the person who transmits the secret document). 4. Secret documents may not be copied at will. Registration procedures must be followed when copying secret carriers, and copies must be stamped with the stamp of the copying agency or unit.
Moreover, copies must be managed as if they were originals, and their confidentiality level, confidentiality period, and scope of knowledge must not be changed without authorization, and confidential documents must not be copied and kept privately. Compilation, excerpts, and quotations from confidential documents must also be treated as copied confidential documents.
9. The confidentiality management of online information adheres to the principle of "whoever accesses the Internet is responsible". All online information must be reviewed and approved for confidentiality. The unit leadership responsibility system shall be implemented for confidentiality approval.
4. How much do you know about confidentiality?
What regulations does the state have on citizens’ confidentiality? 1. Article 53 of my country’s current Constitution clearly stipulates: Citizens must abide by the confidentiality provisions in the Constitution and laws; 2. Article 3 of the “Secrecy Law” stipulates: All state agencies, armed forces, political parties, social groups, and enterprises Institutions and citizens have the obligation to keep state secrets; 3. Article 24 of the "Secrecy Law" stipulates that state secrets are not allowed to be disclosed in private interactions and communications.
When going out with documents, materials and other items that are state secrets, you must not violate confidentiality regulations. It is not allowed to discuss state secrets in public places; 4. Article 25 of the "Secrecy Law" stipulates that confidentiality measures must be taken when transmitting state secrets in wired and wireless communications.
It is not allowed to use clear codes or passwords that have not been reviewed and approved by the relevant central authorities to transmit state secrets. Documents, materials and other items belonging to state secrets are not allowed to be delivered by ordinary post.
What are the 12 serious violations of the confidentiality law? The Secrecy Law lists 12 of the most common and typical serious violations. These violations lead to the failure of confidentiality measures, the loss of control of state secrets, the destruction of the confidentiality technology protection system, and serious threats to the security of state secrets.
These behaviors are: 1. Connecting confidential computers and confidential storage devices to the Internet and other public information networks; 2. Without taking protective measures, connecting confidential information systems with the Internet and other public* ** Information exchange between information networks; 3. Using non-confidential computers and non-confidential storage devices to store and process state secret information; 4. Illegally copying, recording, and storing state secrets; 5. On the Internet and other Transmitting state secrets in public information networks or wired and wireless communications without confidentiality measures; 6. Involving state secrets in private interactions and communications; 7. Uninstalling or modifying security technology programs of confidential information systems without authorization, Management programs; 8. Giving away, selling, discarding or using confidential computers and confidential storage devices that have not been processed by security technology and withdrawn from use for other purposes; 9. Illegally obtaining and holding state secret carriers; 10 . Delivering state secret carriers through ordinary post, express delivery and other channels without confidentiality measures; 11. Buying, selling, transferring or privately destroying state secret carriers; 12. Mailing or consigning state secret carriers out of the country or carrying, Carrying state secrets out of the country.
The Confidentiality Law stipulates that those who commit any of the above-mentioned acts shall be punished in accordance with the law; if they constitute a crime, they shall be investigated for criminal responsibility in accordance with the law; those who commit the above-mentioned acts do not constitute a crime and are not subject to sanctions shall be subject to confidentiality administrative management The department urges its agencies and units to handle it. How to distinguish state secrets from work secrets? 1. Different stakeholders.
The stakeholders directly involved in work secrets are relevant state agencies. Once leaked, it will only cause harm to the relevant state agencies’ local interests such as the performance of the powers and responsibilities assigned by the state; while the stakeholders directly involved in state secrets are the state. Once leaked, it will cause harm to the overall interests of the country; 2. The determination methods are different. The determination of work secrets is mainly determined by state agencies at all levels. Only if there are unified regulations or clear authorization for a few central state agencies, such regulations shall be followed; the determination of state secrets must be carried out in accordance with the law and must be carried out in the state confidentiality department in conjunction with the relevant central state agencies. Operations within the scope of the "Regulations on the Specific Scope of State Secrets and Their Classification" formulated and issued by the agency shall not be determined at will; 3. The signs are different.
Documents, materials and other carriers that are work secrets can be marked as "internal" and may not be marked as state secrets; 4. Management is different. The management of work secrets by state agencies at all levels can refer to the management methods of state secrets, but they do not need to be regulated in accordance with legal procedures.
For example, the delivery of state secret documents, materials or other items must be delivered through confidential postal services and shall not be delivered through ordinary postal services; there are no unified requirements for the delivery of work-secret documents, materials or other items and can be delivered by Each agency makes its own choice; 5. The applicable laws are different. The legal norm applicable to the protection of work secrets is the "National Civil Servant Law", which mainly provides legal protection to work secrets through administrative means; while the "Secrecy Law" applies to the protection of state secrets, and not only administrative means can be used, but also Legal means; 6. Different responsibilities.
After work secrets are leaked, the relevant responsible persons will only bear administrative responsibilities and will only be subject to corresponding administrative sanctions; when state secrets are leaked, the relevant responsible persons should be determined based on the possible harmful consequences and other circumstances. legal liability. If the circumstances are minor and the consequences are not serious, you can bear administrative responsibility; if the circumstances and consequences are serious, you will have to bear criminal responsibility; in short, because work secrets and state secrets involve different stakeholders, once they are leaked, the harmful consequences will be within the scope There is a big difference in degree.
Therefore, the protection of work secrets is significantly less than the protection of state secrets. All other differences arise from this.
What are the confidentiality requirements for using mobile phones? 1. You are not allowed to involve state secret information in mobile phone calls, you are not allowed to use your mobile phone to send state secret information, and you are not allowed to store state secret information in your mobile phone; 2. You are not allowed to bring mobile phones and other mobile terminals to participate in secret-related meetings or enter secret-related event venues or confidential information. Departmental positions; 3. Mobile phones and other mobile terminals are not allowed to be used in confidential places for recording, photography, photography, video calls and broadband Internet access; 4. Mobile phones and other mobile terminals are not allowed to be used as confidential information equipment or in conjunction with confidential information equipment and carriers Connection; 5. Confidential personnel are strictly prohibited from filling in information such as agency and unit names and addresses when applying for a mobile phone number, registering a mobile email or activating other functions. They are not allowed to store sensitive information such as the work unit and position of core confidential personnel in their mobile phones. Enable the remote data synchronization function of mobile phones; 6. Mobile phones used by core secret personnel and important secret personnel should undergo necessary security inspections, and be equipped and use dedicated mobile phones as much as possible. Mobile phones without network access permission and location services must not be used. Mobile phones with Internet connection and other functions; 7. When the mobile phones of core confidential personnel and important confidential personnel malfunction or abnormal conditions are discovered, they should report it immediately and have it repaired at the designated location. Mobile phones that cannot be restored to use should be destroyed as confidential equipment.
What is the common sense about confidentiality technology prevention? 1. Confidential computers and networks are not allowed to be connected to the Internet and other public information networks; 2. Confidential computers and non-confidential computers are not allowed to be connected.
- Previous article:What are the GMP management models of Yunnan Baiyao?
- Next article:Team space slogan
- Related articles
- What are the inspirational slogans of high school students?
- Cartoon door slogan in music classroom
- National policy on handling farmyard manure
- Is there an overtime fee on the expressway?
- Is it illegal to grow vegetables in wasteland?
- Why are many important headlines written in Japanese in Japan?
- Poetry for creating a civilized campus
- Introduction of Jiehui Expressway?
- Advantages of taking place names as titles
- 20 years of "Jinsheng" slogan.