Joke Collection Website - Bulletin headlines - Further strengthen the management regulations on confidential documents.

Further strengthen the management regulations on confidential documents.

Confidential documents can be big or small. How to further strengthen the management of confidential documents? First of all, it is necessary to formulate relevant management regulations. The following are the rules I have compiled for you to further strengthen the management of confidential documents, I hope it will be useful to you!

Confidential documents and information management system

In order to strengthen the management of confidential documents and materials in the office of Gulou District Committee and standardize relevant working procedures, this system is formulated in accordance with the People's Republic of China (PRC) Secrecy Law (hereinafter referred to as the Secrecy Law) and relevant confidentiality provisions.

The first is the receipt system.

When receiving state secret documents and materials, the office security personnel shall open the security package. At the same time, a separate register should be set up, and the receiving personnel should perform the counting, registration, numbering and signing procedures in time.

Second, the system of issuing documents.

The distribution of state secret documents and materials must be carried out in strict accordance with the prescribed scope, and the scope shall not be expanded without authorization. Document distribution personnel shall perform registration, numbering and receiving procedures, strictly distribute documents, and abide by relevant regulations; When signing, you must check them one by one.

The transmission of confidential documents and materials shall be carried out by confidential personnel, and shall be packaged and sealed, registered and signed in strict accordance with the regulations.

The third is the production (printing) system.

When making state secret documents and materials, it is necessary to follow the confidentiality procedures in accordance with the provisions of the Secrecy Law, indicate the classification and duration of confidentiality, indicate the distribution scope and production quantity, and arrange serial numbers for top secret and confidential documents. If a computer is used to make secret documents and materials, the computer cannot be connected to the public information network. Confidential documents should be printed in the internal printing room, made in strict accordance with the approved quantity, and not copied or kept privately.

Fourth, the reading (circulation) system

Confidential documents and materials shall be communicated and read within the prescribed scope, and the scope shall not be expanded without authorization, nor shall the contents of the documents be disclosed to irrelevant personnel. When circulating confidential documents, the office security clerk shall be responsible for reading the special folder, and fill in the "Circulation Sheet" to record the number, number and reading time of confidential documents in the folder. After reading it, he should sign it and return it voluntarily, without crossing the line. For urgent documents, the secret keeper should promptly urge them. Confidential documents should be read in the office or confidential room, and the top secret documents should be approved and returned immediately in the presence of security personnel after reading.

Verb (abbreviation for verb) lending system

Reading and using confidential documents and materials shall be carried out in the office space that meets the confidentiality requirements. If it is really necessary to read and use outside the office, strict borrowing and recording procedures should be implemented. Borrowers are responsible for the security and confidentiality of documents, and consciously return them on time before borrowing. It is forbidden to take confidential documents home or to other public places. The confidential clerk should take back the lent documents in time according to the time limit.

It is forbidden to copy, copy, extract or compile confidential documents and materials without the approval of the organ, unit or higher authority that has determined the classification. If you copy, extract or compile confidential and confidential documents, you must get approval and go through the approval procedures. At the same time, you must not change the classification, confidentiality period and scope of knowledge, and regard it as original management.

Six, repel and retreat system

Confidential documents and materials that should be cleared in accordance with regulations shall, in principle, be returned to the original organs and units in accordance with regulations. Under special circumstances, the reasons shall be explained and reported to the original issuing authority for approval.

Seven. Destroy system

Confidential documents and materials that need to be destroyed shall be registered by the confidential clerk, reported to the office leaders for examination and approval, and registered by counting, and shall not be destroyed without authorization. Paper sent to the designated paper mill for destruction must be escorted and supervised by two or more security guards. It is forbidden to sell secret carriers as waste.

Provisions on the administration of confidential documents

Chapter I General Principles

Article 1 In order to strengthen the collection, transmission, reading and confidentiality management of confidential documents and ensure the security of state secrets, these Provisions are formulated in accordance with the relevant requirements of the General Office of the Central Committee and the General Office of the Provincial Party Committee and in combination with the reality of our school.

Article 2 The confidential documents mentioned in these Provisions include those of the Central Committee, the Provincial Party Committee and other superior departments, those released publicly without the authorization of the relevant media, and those classified as confidential or internal matters in school work.

Article 3 The confidentiality management of confidential documents shall follow the principles of strict management, strict prevention, ensuring safety and facilitating work.

Article 4 The secrecy office of the Party Committee Office of the school shall be responsible for the daily management of confidential documents, and the secrecy staff shall earnestly perform their duties and strictly manage confidentiality. The school secrecy committee is responsible for guidance, supervision and inspection.

Chapter II Receiving, Sending and Passing of Confidential Documents

Article 5 When sending and receiving confidential documents, confidential transportation, confidential communication or special personnel must be designated, and corresponding security measures must be taken. Delivery by ordinary postal or non-postal channels is not allowed. Confidential documents should be packaged and sealed, and the envelope should be marked with the classification, number and the name of the sending and receiving unit.

Article 6 Confidential personnel must count, register, number and sign for the delivered confidential documents. Chapter III Reading and Communication of Confidential Documents

Article 7 After receiving the confidential documents, the competent leader shall determine the scope of the insiders according to the classification of the documents, the requirements of the issuing authority and the needs of the work.

Eighth reading and using confidential documents, should go through the formalities of registration and receipt.

(1) loop.

The official document should be attached with "XXX University Official Document Processing Sheet", which will be read and signed by the person in charge of the office according to the content and nature of the official document and then submitted to the school leaders and the undertaking department for reading and approval. When circulating confidential documents and materials, there must be a special person in charge, and readers are not allowed to take out, keep, copy or copy the contents without authorization. Readers should read documents, signatures and notes in time. After reading the documents, they should be counted, registered and sent to others for circulation, and they should not be passed across.

2 convey.

Confidential documents should be transmitted in the meeting room that meets the confidentiality requirements, and the participants should be registered in detail. No audio recording, video recording, audio recording, wireless microphone and other equipment without confidentiality guarantee are allowed in the communication process, and no news reports are allowed.

Article 9 Reading confidential documents shall be carried out in offices that meet the confidentiality requirements. Confidential documents are not allowed to be taken home or read in public places.

Chapter IV Safety Management of Confidential Documents

Article 10 Confidential documents shall be received and managed as confidential documents, and the documents shall be handed over and signed strictly. Documents must be kept in safe and reliable confidential equipment and managed by special counters.

Eleventh confidential documents shall not be copied or compiled; In principle, confidential and confidential documents shall not be copied or compiled. If it is really necessary to copy or compile, it shall be reported to the general office of the provincial party Committee of the school, and the general office of the provincial party Committee shall strictly perform the examination and approval procedures. Copied and assembled files are regarded as original file management.

Twelfth secret documents shall not be lent out in principle. If it is really necessary to take it out of the country because of work, protective measures should be taken to keep the documents under the effective control of the carrier.

Thirteenth any unit or individual shall not change or lift the classification of confidential documents without authorization; Before the document is decrypted, the full text, abstract, title, document number, printing and dissemination scope of the document shall not be used for non-confidential contents such as internal documents, briefing materials and internal websites of internal publications; The contents of superior documents such as the Central Committee and the Provincial Party Committee shall not be released without the authorization of the superior, and shall not be used in public documents, publications, conferences, news media and the Internet. If the documents of the Central Committee, the Provincial Party Committee and other organs at higher levels are publicly released after being deleted, the publicly released version shall prevail when publicly used. Document numbers of the central and provincial committees shall not be used publicly.

Fourteenth confidential documents should be checked monthly for reading and storage, and classified and counted as required. If it is found that it cannot be retrieved, a written report should be written and submitted to the office leader in time, and the school should report to the higher authorities.

Fifteenth confidential documents that should be retired in accordance with the regulations shall be handed over to the higher level security department in time or destroyed as required; Documents allowed to be saved shall be kept in the confidential room, and the file directory shall be kept for reference.

Sixteenth secret personnel shall go through the handover procedures in accordance with the provisions before leaving their posts or leaving their posts.

Seventeenth register used to record the receipt, use, cleaning and destruction of confidential documents shall be properly kept by special personnel. Chapter V Destruction of Confidential Documents

Eighteenth the destruction of official documents must strictly fulfill the formalities of examination and approval and registration, and two or more confidential personnel shall go to the unit designated by the confidentiality management department to supervise the destruction, so as to ensure that the official documents are not lost or omitted, and that the confidential information cannot be recovered.

Article 19 It is forbidden to sell confidential documents as waste.

Chapter VI Punishment Rules

Twentieth confidential personnel or confidential document management personnel in violation of these provisions, if the circumstances are minor, the school security committee shall give criticism and education; If the circumstances are serious, resulting in major leaks, report to the superior security department.

Twenty-first whoever divulges state secrets in violation of these regulations shall be given administrative or disciplinary sanctions in accordance with relevant regulations; If the circumstances are serious enough to constitute a crime, criminal responsibility shall be investigated according to law.

Confidential management report

1. The establishment of security organization aims to further improve security management and strengthen the unified management of information security and confidentiality. Our company has set up a safety work leading group and a safety office to be fully responsible for the company's safety work; The safety office is responsible for the formulation, implementation, supervision and inspection of the safety work system, and is the executive body of safety work. The general manager is the leader of the leading group for secrecy work, and the members of the secrecy office include: heads of secrecy posts such as technology, finance department, human resources department, project management department, marketing department, technology department and administration department.

Member of safety (confidentiality) working group, responsible for establishing, perfecting and implementing relevant safety (confidentiality) management system, and organizing safety (confidentiality) education and knowledge learning of the company. Organize regular supervision and inspection of the company's security (confidentiality) work, and solve the problems existing in the security (confidentiality) work in time.

The second is the construction of confidentiality system.

1. Strictly abide by various security management systems. The company requires leaders at all levels and all employees to strictly abide by various safety (confidentiality) management systems and regulations, strengthen information security and confidentiality prevention, strictly follow the business processes of various tasks, earnestly perform and supervise each other, and find and eliminate hidden dangers in time. Strengthen safety management. Focusing on the security management of secret-related personnel, secret vector and secret-related computers, we will further strengthen the leadership of security work, strengthen security management, strengthen supervision and inspection, pay close attention to the implementation of various security measures and the responsibility system for security, and put an end to major leaks.

2. Classified personnel management

Personnel engaged in confidential business services (including external experts) shall conduct security review in accordance with relevant regulations, sign a letter of responsibility for security and confidentiality with the unit, and clarify the responsibilities and obligations for security and confidentiality. When leaving the post of confidential business consulting service, the classified vectors should be cleared away and confidential management should be implemented.

3, classified project management top secret or classified projects, it should be clear that the security leading group leader is responsible for the security management, and strictly control the scope of knowledge.

4. Management of Classified Vectors In order to ensure the safety of secret vector, based on the principles of strict management, strict prevention, ensuring safety and convenient work, the management of production, receiving, dispatching, dissemination, use, preservation and destruction of classified vectors has been strengthened in strict accordance with the requirements, so that the management of classified vectors has entered a standardized track. In the production process, both paper media carriers and other media carriers are uniformly produced by formulators, and materials that do not need to be archived are destroyed in time.

In the process of receiving, sending and transmitting, the procedures of counting, registration, numbering and distribution shall be strictly implemented, and a special person shall be appointed to take charge of the transmission and take corresponding safety measures. In the use of links, strictly know the scope of personnel, to expand the scope of knowledge without authorization, strictly investigate the responsibility of relevant personnel. If audio recording, audio recording and video recording are not allowed, it is stated in advance that the reproduction carrier must be approved by the competent leader and go through the registration formalities. In terms of storage, archives should be filed in strict accordance with national archives laws and regulations, and designated personnel should be responsible for it, equipped with necessary safety equipment. In terms of destruction, the procedures of examination, inventory and registration should be carefully performed, and corresponding confidentiality methods should be adopted to prevent secret carriers from being sold as waste.

5, classified computer management?

Classified computers and their mobile storage media shall be managed centrally, and ledgers shall be established;

Confidential computers and information systems should be physically isolated from the Internet and other public information networks; ?

Confidential computers shall not be equipped with any wireless communication equipment; ?

Before the classified information system is put into use, it must go through the system evaluation and acceptance of the state secrecy department; ?

Non-classified computers and information systems shall not store and process classified information; ?

The remote transmission of confidential information shall adopt password protection measures according to the requirements of the state secrecy department; ?

The mobile storage media used by classified computers and information systems shall adopt binding or effective technical control measures, and the import and export of information shall meet the relevant national confidentiality requirements;

? Computers and information systems that store and handle state secrets shall be technically protected in accordance with relevant laws, regulations and standards.

? Implement computer network security protection inspection, and take measures such as regularly upgrading antivirus software of local area network every week. Adhere to the principle of "Internet information is not classified and classified information is not online" to prevent leakage.

6. Secure communication and office automation equipment management?

Confidential office automation equipment shall not be connected to the Internet or other public information networks; ?

Do not use office automation equipment with wireless interconnection function to handle confidential information; ?

Do not use ordinary communication equipment to transmit confidential information; ?

Do not use ordinary telephone (mobile phone) to talk about confidential matters;

Don't use cordless phones in confidential places.

7. Strengthening Archives Safety Management In order to strengthen the security and confidentiality in the circulation of documents and archives, the archives management system has been improved, and the system of handover, destruction and borrowing of archives has been strictly implemented.

8. Seriously implement the three-level inspection system of safety (confidentiality). The company's security (confidentiality) working group is level 3; The managers of all departments are Grade II; Individual employees are the first floor. Implement the safety (confidentiality) work responsibility system step by step, and earnestly implement the safety (confidentiality) management work.

Three. Review and education management of secret-related personnel

1. Strictly implement the assessment of secret-related personnel. The company strengthens the management of all secret-related personnel and strictly examines whether the secret-related personnel and their relatives have criminal records. Records shall not be included in the classified staff. After investigation, the company's current secret-related personnel meet the requirements.

2. Strengthening the management of the company's confidential publicity and education In order to institutionalize, regularize and standardize the company's confidential publicity and education work, and improve the confidentiality awareness of all employees, according to the Law of People's Republic of China (PRC) on Guarding State Secrets and its implementation methods and relevant regulations, various forms of daily confidential training for employees are further strengthened, especially the induction training for new employees.

3. Clarify the division of responsibilities for confidential publicity and training. The company's secrecy team leads, guides and coordinates the company's secrecy publicity and education work, and guides the formulation of the company's secrecy publicity and education plan; Organize and arrange confidential publicity and education activities within the company and annual confidential training for relevant personnel of the company. Provide information, teaching materials, teaching and consulting for other confidential publicity and education activities of the company.

4. Strengthen business confidentiality management and strengthen the awareness of business confidentiality management of all departments. Take the initiative to sign a confidentiality agreement with customers for projects involving secrets.

5. It is an important way to enhance employees' confidentiality awareness and improve their confidentiality skills by strengthening the daily training of employees and improving their confidentiality awareness and publicity and education. It is the legal obligation of employees of the company to receive publicity and education on confidentiality and strive to improve their awareness and skills of confidentiality.

Confidentiality publicity and education is a basic and long-term work of the company's confidentiality work. All employees receive regular confidential knowledge training, which mainly includes:

State secrecy laws and regulations and relevant provisions of the secrecy department; ?

Various confidentiality rules and regulations of the company; ?

Basic knowledge of safety work and safety management; ?

Knowledge and measures of safety technology prevention; ?

Computer information system security knowledge and preventive measures; ? The implementation and process of the company's confidential projects, confidential knowledge and preventive measures;

6. Strictly implement the employee resignation procedures, further refine the employee resignation handover procedures, especially for confidential employees, and further tighten the labor contract management. Four, confidential key parts management

1, functional department mailbox encryption. The mailboxes of the company's finance department, human resources department, project management department and other secret-related functional departments are all encrypted to avoid mail leakage.

2. Human Resources Department:? All personnel files are put into the cabinet and sealed and kept by special personnel;

Sign a confidentiality agreement with new and old employees. Without approval, employees shall not disseminate or provide all documents and materials related to the company to the outside world, nor shall they hand them over to irrelevant personnel, otherwise they shall compensate all economic losses suffered by the company. If necessary, legal responsibility shall be investigated. The confidentiality clause shall not become invalid due to the termination of the labor contract. ? Strictly strengthen the management of the handover process of resigned personnel, refine the handover procedures of employees and stipulate the handover time.

3. Project Management Department: Confidential projects sign confidentiality agreements with users. ? Confidential project documents are all paper or other media, and shall not be sent through the network. The electronic version is in pdf format and has a password. ? Strict project data archiving and borrowing approval procedures. ? The contract is managed by a special person.

4. Business Technology Department: All confidential electronic materials shall be kept or stored and locked by the department manager or project leader.

5. Office:? Establish a special custody and borrowing approval system for file management. ? Strengthen the security and anti-theft management in the office area, and set up a separate filing cabinet for the confidential information of the project and lock it. ? In order to ensure the safety of the company's servers, the server shall not be operated without the consent of the company's computer system maintenance personnel.

V. Construction of safety equipment and facilities

The company is equipped with special computers and printers for confidential projects. Computers are not connected to the internet, special power sockets are provided, and special office areas are set up. All the materials are kept in the classified data filing cabinet.

The intransitive verb classified vector use management company has specially formulated classified vector management measures for classified projects, as follows:

Article 1 The receiving, sending, internal transmission and circulation of confidential documents and materials must be registered by numbers and classified with non-confidential documents and materials. The signing formalities must be performed at the time of handover.

Article 2 The research, transmission, investigation, borrowing and reading of confidential documents, materials and archives shall strictly control the scope of insiders. The scope of insiders shall be determined by the person in charge of confidentiality of the company.

Article 3 The staff of classified projects shall not take classified vectors out at will by taking advantage of their work. People on business trips are not allowed to carry secret vectors. If it is necessary to carry it with you under special circumstances, it must be approved by the person in charge of confidentiality and the competent leader of the company in advance and go through the registration formalities. When carrying a secret carrier, it must be packed in a file bag or a password file box, and a safe means of transportation must be taken. It is strictly forbidden to go out without a secret carrier without security measures. It is not allowed to carry the carrier in and out of public places, sightseeing, visiting relatives and friends.

Article 4 Centralized and unified management of classified vectors? And establish filing, borrowing and registration system. Borrowing secret carriers requires the approval of the company's competent leaders. After approval, it is only available to me. Borrowing is not allowed without approval. To consult the secret vector, you must use the secret computer in the secret area, and you are not allowed to take it home without authorization. Do not use non-confidential computers to consult, and do not lend documents to others at will.

Article 5 The filing of confidential carriers shall be classified, filed and bound in strict accordance with the confidentiality management measures formulated by the company. Keep it in a separate cabinet together with non-confidential documents, and store it in a secure device with security guarantee.

Article 6 Copying confidential information and carriers shall be handled in accordance with the following provisions:

1, confidential project data shall not be copied without approval.

2. If it is really necessary to copy confidential documents due to work needs, it must be approved by the person in charge of confidentiality of the company? And go through the registration formalities.

3. Without the permission of the person in charge of the company's confidentiality, no one may copy or reprint the storage media, CDs and other files of confidential contents.

Article 7 The transfer and destruction of confidential information and its carriers must be strictly managed under the supervision and guidance of the person in charge of confidentiality of the company.

Guess you like:

1. Rules and regulations on the use and management of confidential networks

2. Preparation of secret vector management system

3. Demonstration rules and regulations of archives security management

4. Unit confidentiality rules and regulations

5. Measures for the administration of confidential documents