Joke Collection Website - Bulletin headlines - Confidentiality warning slogans, confidentiality law awareness month slogans

Confidentiality warning slogans, confidentiality law awareness month slogans

Secrecy warning slogans, Secrecy Law Publicity Month slogans

1. The awareness, ability and level of confidentiality work are the basic quality conditions for leading cadres.

2. The word confidentiality looks lighter, is heavier when done, and is more stable when hidden.

3. To store confidential media, a safe and confidential place and location should be selected and equipped with confidential facilities and equipment.

4. Fasten the confidential seat belt and brake the confidential brake plate.

5. No state secrets should be revealed when submitting articles to news publications or accepting interviews.

6. When destroying confidential media, inventory and registration procedures must be carried out and approved by the unit leader.

7. When carrying top-secret classified carriers out, a dedicated person must be responsible and absolutely reliable security measures must be taken.

8. Carrying confidential carriers out must be approved by the supervisor of the agency and the unit.

9. When carrying confidential carriers out, the confidential carriers must always be under effective surveillance.

10. If state secrets are leaked, remedial measures must be taken immediately and reported in a timely manner.

11. Behaviors that endanger national secrets and security must be investigated under national law.

12. Consciously fulfill the obligation to keep state secrets for the sake of national security and interests.

13. Maintenance of confidential carriers shall be the responsibility of the specialized technical personnel of the agency and unit.

14. Confidential documents, materials and items shall not be carried out of the country without approval.

15. Without approval, no unauthorized recording, audio recording, or videotaping of confidential meetings and activities is allowed.

16. Copying, quoting and extracting top-secret documents and materials without approval is prohibited.

17. Guide people with correct confidentiality thoughts and shape people with noble confidentiality behavior standards.

18. Enhance the awareness of confidentiality, strengthen the concept of enemy situation, and ensure the security of the country’s core secrets.

19. Reading and using confidential documents and information should be carried out in an office that meets confidentiality requirements.

20. The more reform and opening up, the more economic development occurs, the more confidentiality work must be strengthened.

21. Enhance the awareness of knowing and understanding the law, and improve the ability to abide by the law and use it.

22. Do not discuss state secrets abroad at will, and do not discuss sensitive issues in the host country.

23. Enhance the legal awareness of confidentiality, strengthen the concept of enemy situation, and safeguard national security interests.

24. When producing confidential carriers, the confidentiality level and confidentiality period should be indicated, as well as the distribution scope and production quantity.

25. Materials that do not need to be archived during the production of confidential carriers must be destroyed in a timely manner.

26. Conversation has a charm, just like love and wine, it can induce us to reveal our secrets without even realizing it.

27. Keep state secrets, safeguard national security and interests, and ensure the smooth progress of reform, opening up, and socialist construction.

28. We must pay great attention to keeping secrets. Nine and a half points are not enough, and nine and a half points are not enough. It must be ten points.

29. Keeping confidentiality is to protect national security, career development, family happiness, and personal future.

30. Keeping state secrets is to protect national security, family happiness, and personal future.

31. Everyone is responsible for keeping state secrets, and national security and interests are above all else.

32. Do not lead foreign personnel into military restricted areas or confidential department areas.

33. Information is the database that generates combat effectiveness, and confidentiality is the firewall that protects combat effectiveness.

34. Study the "Secretary Law", implement the "Secretary Law", and abide by the "Secretary Law".

35. Promote confidentiality laws and regulations, popularize confidentiality knowledge, enhance confidentiality concepts, and strengthen confidentiality management.

36. All state agencies, armed forces, political parties, social groups, enterprises, institutions and citizens have the obligation to keep state secrets.

37. Multi-function machines that handle confidential information must not be connected to ordinary telephone lines.

38. Personal computers and removable storage media are not allowed into important confidential places.

39. Warmly celebrate the implementation of the new law "Law of the People's Republic of China on the Protection of State Secrets".

40. Conscientiously implement the "Secrecy Law" and do a good job in confidentiality work under the new situation.

41. Confidential messages and confidential documents must be drafted in the confidentiality room of our country’s embassy or consulate abroad.

42. Scientific confidentiality is maintained throughout spring, summer, autumn and winter, and stable development in the southeast and northwest is sustainable.

43. Firmly establish the concept that keeping state secrets is to protect national security, personal future, and family happiness.

44. Conscientiously implement the Law of the People's Republic of China on the Protection of State Secrets.

45. Conscientiously implement the Scientific Outlook on Development and comprehensively promote the standardization and legalization of confidentiality management.

46. Earnestly implement the "Secrecy Law" and do a good job in confidentiality work under high-tech conditions.

47. Any behavior that endangers national secrets and security must be pursued to the letter.

48. No organization or individual may illegally acquire or hold state secret carriers, and no organization or individual may buy, sell, transmit or privately destroy state secret carriers.

49. When sending and receiving confidential documents and materials, registration, numbering, and signature procedures must be followed.

50. One percent of prevention beforehand is better than ninety-nine percent of remedy afterward.

51. Confidential personnel are strictly prohibited from working privately in overseas institutions, organizations or wholly foreign-owned enterprises.

52. Confidential personnel are strictly prohibited from privately providing labor and consulting services to overseas institutions, organizations or personnel.

53. Mobile storage media such as mobile phones and USB flash drives shall not store confidential information or store confidential information in leaked information systems or other public places such as the Internet without approval and without taking precautionary measures. Information exchange between information networks.

54. Confidential meetings and activities shall not use video and telephone conferencing systems that do not meet confidentiality conditions.

55. Wireless microphones and other wireless equipment and devices are not allowed to be used in confidential meetings and activities.

56. Electronic equipment used in confidential meetings and activities should undergo safety inspections.

57. Confidential computers and networks are not allowed to be connected to the Internet and other public information networks.

58. Confidential computers and removable storage media are not allowed to be sent through ordinary mail channels.

59. Resolutely investigate and punish illegal activities of stealing and leaking secrets, and severely crack down on criminal activities of stealing and leaking secrets.

60. Strengthen confidentiality work under the new situation and strive to serve the overall situation of reform, development and stability.

61. Strengthen confidentiality work under the new situation to serve reform, opening up and economic construction.

62. Improve the confidentiality management system, improve confidentiality protection measures, carry out confidentiality publicity and education, and strengthen confidentiality supervision and inspection.

63. Improve the confidentiality system, strengthen confidentiality supervision, and strictly enforce confidentiality inspections to ensure the security of national secrets.

64. Confidential computers and mobile storage media shall not be handed over to others for use or safekeeping in violation of regulations.

65. Video and audio input devices are not allowed to be installed on computers connected to the Internet in confidential places.

66. Removable storage media shall not be used cross-wise between classified computers and non-confidential computers.

67. State secrets shall not be disclosed in private interactions, correspondence, conversations and family life.

68. Only by always being vigilant can we defeat the enemy, and by putting an end to paralyzed thoughts can we keep secrets secret.

69. Always tighten the secrecy string, always recite the secrecy sutra, and always ring the secrecy bell.

70. If you find others leaking state secrets, you must stop them immediately and report them to the relevant units.

71. To keep confidentiality, care, patience and responsibility are all indispensable.

72. Strengthen confidentiality work, enhance the public’s awareness of confidentiality, and ensure the security of national secrets.

73. Compiled confidential media should be marked and managed according to the highest level of confidentiality and the longest confidentiality period.

74. State secrets are protected by law, and any behavior that endangers the security of state secrets must be prosecuted by law.

75. When compiling state secret documents and information, the confidentiality level, confidentiality period and scope of knowledge shall not be changed.

76. Actively prevent, highlight key points, and manage in accordance with the law, which not only ensures the security of national secrets, but also facilitates the rational use of information resources.

77. Copies and excerpts of confidential and secret-level documents and materials must be subject to approval procedures.

78. When dealing with confidentiality, use a microscope to examine problems and a magnifying glass to see hazards.

79. Copying confidential documents and information shall not change their confidentiality level, confidentiality period and scope of knowledge.

80. When doing work, if you do nothing for one day, it is a fault; if you keep secrets, if you have no faults for a lifetime, it is merit.

81. In the revolutionary war era, secrecy was to protect survival and victory; in the period of peace construction, secrecy was to protect security and development.

82. Implement the "Secrecy Law" and do a good job in confidentiality work under high-tech conditions.

83. Export of state secret technologies must be strictly carried out in accordance with the approved scope and content.

84. Confidential carriers must be delivered through confidential transportation, confidential communications, or by designated personnel.

85. Start with yourself, start from scratch, and make confidentiality a work and life habit.

86. Ordinary fax machines, telephones and mobile phones are not allowed to be used to transmit or discuss confidential information.

87. Do not use wired, wireless communications and ordinary postal services without confidentiality protection to transmit party and state secrets.

88. Do not involve party or state secrets in private communications, publicly published articles, writings, speeches, or on the Internet.

89. Do not discuss party and state secrets in front of family members, relatives, friends, acquaintances and other unrelated persons.

90. Office automation equipment that has not been technically inspected shall not be used in key confidential departments.

91. Confidential computers that have not been professionally declassified shall not be sold, given away or discarded.

92. Wireless peripherals such as wireless mice and wireless keyboards are not allowed to be used on confidential computers.

93. Confidential manuscripts or other works are not allowed to be sent to overseas organizations or institutions.

94. Confidential computers and office automation equipment shall not be handed over to outside personnel for maintenance without authorization.

95. It is not allowed to entrust other personnel to participate in confidential meetings and activities without authorization.

96. You are not allowed to carry confidential laptops and removable storage media out without authorization.

97. You are not allowed to install software on confidential computers or copy other people’s files without authorization.

98. Personal computers and mobile storage media are not allowed to store or process confidential information.

99. Office equipment used by overseas personnel shall not be used to process confidential information.

100. Computers with wireless interconnection capabilities must not be used to process confidential information.

101. State secrets shall not be transmitted in plain code or in unapproved passwords.