Joke Collection Website - Bulletin headlines - Confidentiality work research report

Confidentiality work research report

5 Confidentiality Work Research Reports

In our current society, reports are very important. Reports include title, body, conclusion, etc. So how is a general report written? The following is a confidentiality work research report that I collected and compiled. It is for reference only. I hope it can help everyone.

Confidentiality Work Research Report 1

Since the launch of the company’s confidentiality work “Investigation and Research Year” activity, all departments of the company have acted quickly, carefully planned, and deployed quickly. Each department has launched the “Investigation and Research Year” The event started well and progressed in an orderly manner. The work progress is now reported as follows:

1. The progress of confidentiality work

1. Attach great importance and have strong organization.

All departments of the company regard the "Investigation and Research Year" activities as an effective measure to further improve the level of confidentiality work. As an important starting point to strengthen and improve the company's work and improve the security and confidentiality capabilities under the new situation, it is included in the annual Focus on work and strengthen organization and implementation. The company established a research group with the manager as the team leader, the deputy manager as the deputy team leader, and the company's leadership team as members, providing important organizational guarantees for the smooth development of the "Investigation and Research Year" activities.

2. In-depth learning and rapid deployment.

Each department quickly communicated the requirements for studying the "Investigation and Research Year" activities, and issued the "XXX County XXX Company Confidentiality "Investigation and Research Year" Activity Plan" in the form of a document based on the actual situation of the company, clarifying the important significance and guiding ideology. , target tasks and work requirements. Centrally organize personnel to learn theories, laws and regulations, and clarify work tasks to lay a solid foundation for doing research work.

3. Connect with reality and focus on results.

Deeply study the party and state’s confidentiality work guidelines, policies, laws and regulations, learn the party’s fine traditions of confidentiality work, learn the basic principles, requirements and methods of investigation and research work, further clarify the target direction of the research work, and continuously improve Scientific level of decision-making management.

4. Strengthen technical prevention measures to ensure secret security

First, strictly manage documents and materials, and do a good job in sending, receiving, distributing, sorting, filing, and destroying documents and materials; Input, archive, send, print, backup, etc. of electronic documents to ensure the security of electronic documents. At the same time, the daily management of the archives room will be strengthened. Non-staff members are generally not allowed to enter the archives room to prevent the leakage of secrets. Second, the company has strengthened the hardware management of key secret-related departments and positions. In accordance with national confidentiality regulations and standards, the company has fully equipped confidentiality protection equipment and improved confidentiality precautions. The third is to implement complete physical isolation of the company's internal and external networks. At the same time, in accordance with the requirements of provincial and municipal companies, anti-virus and desktop terminal management system and other software are installed on the internal network computers. Fourth, the "Five Strict Prohibitions" are strictly implemented (it is strictly prohibited to connect confidential computers to information intranets and external networks; it is strictly prohibited to process and store confidential information on computers connected to external networks; it is strictly prohibited to cross-use computers on information intranets and external networks). ; It is strictly prohibited to use ordinary removable storage media across the intranet and the external network; it is strictly prohibited to use scanners, printers and other computer peripherals across the intranet and the external network).

2. Achievements

1. Find out the base number of units and evaluate the risk coefficient of confidentiality work. According to the spirit of the notice,

The company has implemented system construction, responsibility system implementation, review system, confidentiality work, management of confidential personnel, management of confidential carriers, management of confidential departments, confidentiality publicity, and confidentiality commitment letters. Compare the signing and other situations, conduct analysis and research on each link, investigate the details that are easy to leak in each confidential link, find the entry point to eliminate leaks, and prevent the occurrence of leaks from the source.

2. Raise confidentiality awareness and strengthen the construction of confidentiality work system. According to the requirements of the notice, the company will strengthen re-learning of the "Secrecy Law" and enhance the confidentiality awareness and confidentiality skills of confidential personnel. In particular, through the thorough investigation of confidentiality work, the company will further standardize the construction of the confidentiality work system and prevent the occurrence of leaks from the system.

3. Prevent leaks and standardize network confidentiality management. The scale, topology, scope of use, information resources, and confidentiality of application systems of the company's network all meet the requirements. Networks are isolated by technical means or physically, and there is no cross-use. There are no illegal external connections at network terminals.

There are different user names on the server side, which are managed by dedicated personnel, and are all equipped with firewalls; network terminals are equipped with power-on passwords that meet the requirements, and are equipped with professional anti-virus software.

4. Sign a confidentiality commitment and formulate a system for investigating matters involving confidentiality. According to the notification process, the company took the "Investigation and Research Year" activity on confidentiality work as an opportunity. First, it organized and carried out confidentiality self-examination work for all team members and signed a confidentiality commitment letter. Second, it formulated a system for investigating matters involving confidentiality to clarify the consequences and harm of confidentiality. and responsibility. The third is to take the "Investigation and Research Year" activity as an important measure to strengthen and improve confidentiality work and improve security and confidentiality capabilities under the new situation. Through the above work, the hidden danger of leakage is basically eliminated.

3. Existing problems and difficulties

First, individual employees do not have enough understanding of the importance of confidentiality in their work, and their awareness of confidentiality is not very strong. It is necessary to further strengthen confidentiality work education and effectively Enhance employee confidentiality awareness. Second, computer, mobile storage media and network management still need to strengthen technical protection, improve protective measures, and further increase supervision and inspection efforts.

IV. Typical experiences and improvement measures

Strengthen the pertinence of confidentiality education for leading cadres and confidential personnel, and incorporate confidentiality education for leading cadres into the cadre training plan. Provide on-the-job education to secret-related personnel through special education, conference education, special lectures, and training on entry and exit of secret-related positions, so that secret-related personnel can truly meet the requirements for learning, knowing, abiding by, and using the law.

Up to now, our company has not had a single computer loss of confidentiality, leakage, or illegal external link accident, ensuring the company's internal information security.

In the future, we will further lay a solid foundation for confidentiality work, improve the overall level of confidentiality work, strengthen confidentiality work education, and effectively enhance employees’ confidentiality awareness. At the same time, we will strengthen the technical protection of confidentiality work and improve protective measures to make our company more secure. Confidentiality has reached a new level. Confidentiality Work Research Report 2

Currently, the construction of office automation network for government systems is in the ascendant. Governments at all levels have increased investment in hardware and software and built office automation networks. With the expansion of network scale, the improvement of office automation application level, and the increasing degree of data sharing, everyone is becoming more and more dependent on computers while changing the old manual work methods. Some important information in the network involves a wide range of things. Once it goes wrong, it will have a huge impact and the consequences will be more serious.

Therefore, while we are focusing on building the office automation network, we must also effectively strengthen the confidentiality of the office automation network, focus on the development and application of effective confidentiality measures, and achieve sieves (information filtering systems) and locks. (Self-isolation system) and shield (protection system) are comprehensively used to truly establish a solid confidentiality protection system.

Confidentiality of office automation network information Information leakage is one of the main confidentiality risks of office automation networks. The so-called information leakage refers to information that is intentionally or accidentally detected, intercepted, stolen, analyzed, and collected into the system, especially secret information and sensitive information, resulting in leakage incidents. As we all know, the network has three vulnerabilities in terms of confidentiality protection: First, the accessibility of data.

Data information can be easily copied by end users without leaving any traces. The second is the convergence of information. When information exists in fragmented form, its value is often small. Once the network brings together a large amount of related information, its value is considerable. The third is the difficulty of fortification. Although layers of defense can be established, for a person who is familiar with network technology, he may be able to break through these barriers with some effort, which will bring great difficulties to confidentiality work. To protect the confidentiality of office automation networks, we can start from the following three aspects:

Physical isolation. According to the confidentiality requirements of the General Office of the State Council and the National Security Bureau for government office automation networks, office automation networks must be physically isolated from public information networks. State secret information must not be stored, processed or transmitted on information equipment connected to the public information network; information on the public information network on government systems must undergo confidentiality review, be approved by the competent leadership, and a registration and filing system must be established.

Data encryption. The confidentiality of information is to prevent adversaries from deciphering confidential information in information systems. Data encryption is an important means to achieve information confidentiality.

Encrypting data on an office automation network is a process in which various original data information (plaintext) is transformed into data information that is completely different from plaintext, that is, ciphertext, according to a specific encryption algorithm through the encryption mechanism in the network. Currently, the commonly used data encryption technologies mainly include link encryption, node encryption and end-to-end encryption.

Make full use of the security measures provided by the system itself. Some users have insufficient knowledge of the network and basically do not use or rarely use the security measures provided by the network operating system, thus leaving hidden dangers. In fact, general network operating systems and application systems, such as ware. Notes, etc., all have good confidentiality measures, and we must make full use of them. For example, NetWare provides four levels of confidentiality measures: the first level is network access confidentiality, the second level is setting directory and file access permissions, the third level is file and directory attribute confidentiality, and the fourth level is file server security and confidentiality.

Confidentiality of office automation network entities Network entities refer to computers and their physical peripheral equipment and network components that implement information collection, transmission, storage, processing, distribution and utilization. The following three measures can be taken to enhance the confidentiality of network entities.

Prevent electromagnetic leakage. When computer equipment is working, it radiates electromagnetic waves, which can be received within a certain range with the help of instruments. In particular, high-sensitivity instruments can be used to stably and clearly see the information being processed by the computer. In addition, network ports, transmission lines, etc. may cause electromagnetic leakage due to loose or unshielded shielding. Relevant experiments have shown that after an uncontrolled computer facility starts working, its contents can be copied within a kilometer using an ordinary computer and an interception device.

Therefore, we should try our best to consider using low-radiation equipment. The monitor is a weak link in computer security, and stealing displayed content is a mature technology. Therefore, a low-radiation monitor should be used. In addition, distance protection, noise interference, shielding and other measures can also be used to suppress electromagnetic leakage to a minimum. Confidentiality Work Research Report 3

In recent years, leaks of confidential documents have occurred from time to time due to the lack of awareness of network security among some staff, causing immeasurable losses. were punished for the incident. Although our bureau has strengthened its management of confidential networks, there are still some security risks of leaking secrets.

First, the awareness of confidentiality is weak

Due to the long-term peace period, some secret personnel, especially some leading cadres, have weakened their awareness of confidentiality and the concept of enemy situation. They mistakenly believe that, like Sichuan, The situation of a disaster as big as a major earthquake has been disclosed to the whole world, so what else can be kept secret? It is undeniable that with the continuous advancement of our country's democracy and legal system construction, the scope and matters of confidentiality are gradually reducing, but this does not mean that there are no secrets that can be protected. The threat of secret theft we face continues to increase, the confidentiality situation becomes more severe, and the confidentiality task becomes more arduous. We must pay great attention to this.

Second, the security facilities are imperfect.

Some key security parts have not even implemented the minimum "three irons" (iron doors, iron windows, and safe cabinets) requirements. There are huge gaps. Safety hazard. There are even cases where the intranet is directly connected to the Internet without effective physical isolation. Some comrades do not strictly control the information released online and do not implement strict confidentiality review, resulting in network leaks. In particular, our current network management methods are still quite backward and are basically undefended.

Third, the management of confidential media is chaotic.

Confidential documents and materials are copied at will, and strict management systems have not been established for confidential magnetic media (U disks, mobile hard drives, etc.). Confidential documents are placed haphazardly, and some even treat them as scrap and sell them to individual scrap collectors, which poses a serious risk of leakage.

Fourth, the management of key confidential parts is not strict.

The key parts of confidential information are not clear enough. The education and management of secret-related personnel working in secret-related positions are not strict, and the confidentiality responsibility system is not implemented as required. Due to unclear responsibilities, management of some important parts was out of control. To do a good job in confidentiality work, the following points need to be done:

1. Strengthen leadership

It is necessary to conscientiously implement the responsibility system for confidentiality work of leading cadres, and the top leaders of the unit shall be responsible for the confidentiality work of the unit and system. Responsible for overall responsibility, leaders in charge of specific tasks, and designated personnel responsible for confidentiality work.

It is necessary to frequently intervene in confidentiality work and promptly study and solve specific problems in confidentiality work.

2. Self-examination and self-correction should be carried out

All departments at all levels must, in accordance with confidentiality requirements, quickly conduct self-examination and self-correction on the confidentiality work of the system and department, focusing on identifying confidentiality issues Weak links and weak points in your work. We must pay special attention to self-correction work and implement inspection and correction at the same time. The self-examination and self-correction work cannot be a formality, and rectification must be in place. If there are any problems during the self-examination and self-correction, they must be reported to the corresponding confidentiality department in a timely manner.

3. Strengthen management.

Firstly, the Internet must not cross-use mobile U disk storage tools with intranets or confidential computers; secondly, QQ cannot be used to transmit internal office documents online information; third, internal office documents, confidential basic geographical information databases and maps cannot be stored on hard drives connected to external networks. Fourth, laptops and removable media such as USB flash drives that handle internal files are not allowed to be taken home for Internet access or work.

4. Clarify confidentiality responsibilities

In the network security and confidentiality organization and management system under the new situation, it is necessary to strictly follow the rules of "whoever accesses the Internet, who is responsible, whoever approves, who is responsible" and "whoever approves is responsible" and " Based on the working principle of "review first, then disclose", we will strengthen the leadership of network security and confidentiality organizations, and form a good situation of ensuring implementation at one level and at all levels. Confidentiality work research report 4

According to the requirements of the XX County Party Committee Confidentiality Committee [20xx] No. 2 document, our site’s confidentiality work leading group attaches great importance to it and convenes a special meeting in a timely manner to conduct self-examination of confidentiality work. At the same time, relevant personnel in the organization office conducted a comprehensive self-examination of confidentiality work. The self-examination report is now as follows:

1. Basic information on the organizational structure of confidentiality work

Confidentiality work is related to national security and interests, and is related to the overall situation of reform, opening up, development and stability. Our site has always attached great importance to confidentiality work, and has always put confidentiality work on the important agenda. In response to personnel changes, we have promptly adjusted and enriched the confidentiality work leading agency, confidentiality review agency and personnel, and done a good job handover to ensure the continuity of work. . Our site has a confidentiality work leading group, headed by the deputy secretary of the party committee, and composed of members of the party and government team and the person in charge of confidentiality work. The leading group has an office under which the director of the Party and Government Office concurrently serves as the director of the office. Two comrades are also determined to be mainly responsible for specific work on confidentiality. Relevant personnel signed the "Confidentiality Responsibility Letter for Confidential Personnel Positions" to effectively strengthen confidentiality management and prevent and eliminate the occurrence of leaks.

2. Development of confidentiality work

(1) Strengthen inspection and supervision of key confidentiality departments and key parts. Departments such as the Party and Government Office and Archives Office are key departments and positions for confidentiality. Our field leadership team conducts irregular inspections and supervision on the confidentiality work of these departments to prevent confidentiality leaks. In daily work, our factory insists on starting from every link. The fax machine of the Party and Government Office has a dedicated person responsible for sending and receiving documents. The photocopier is handled by the staff of the printing room. The transmission, recycling and cancellation of secret documents and internal information are strictly in accordance with the superior regulations. Handle relevant requirements. At the same time, the contents of major party committee and government meetings must not be leaked to the outside world. It is necessary to strengthen the management of documents issued by the workplace and documents from superiors, and they must not be thrown or placed randomly.

(2) Strengthen the management of encrypted computers. In accordance with the requirements of the relevant departments at the higher level, our site has designated staff who understand business and management to be responsible for the management of encrypted computers, strengthen the inspection of computer Internet access, register the Internet computers, and be well aware of the management; strengthen Regarding the safekeeping of computer data, it is strictly prohibited to print or copy the company's software data to personnel from outside the company without the consent of the company leader. At the same time, when a confidential machine or confidential soft or hard disk fails, the office will find out the cause and contact a professional computer company to send technicians directly to the unit to perform on-site repairs on the faulty machine and magnetic media to ensure that confidential information is not compromised. Leaked and stolen.

(3) Construction of confidentiality rules and regulations.

In accordance with the confidentiality work regulations, our site has established and improved various confidentiality work rules and regulations.

Further improved the "Confidentiality Work System", "Confidentiality Management System for Confidential Personnel", "Computer Confidentiality Management System", "Confidentiality Management System for Office Automation Equipment such as Fax Machines and Copiers", "Meeting Confidentiality System", "Archives Confidentiality Management System" 》 and other confidentiality work rules and regulations, so that confidentiality work has evidence and rules to follow, and the procedures are strictly standardized according to the system.

(4) Carry out confidentiality publicity and education.

The party committee attaches great importance to confidentiality publicity and education work, and takes the form of posting slogans, holding banners, etc., and uses various opportunities to carry out regular confidentiality publicity and education work among agency cadres. For example, the meeting of village chief cadres was used to convey and study documents and information related to confidentiality work, and to understand the confidentiality work situation and the requirements of superiors, so that the cadres strengthened the concept of confidentiality and laid a solid mass foundation for the confidentiality work in our field.

3. Existing problems and suggestions for improvement

Through this inspection, it was found that the confidentiality management of confidential carriers in the entire system was basically good, and no loss of confidential documents and data was found. The main problems are:

(1) Education on confidentiality needs to be continuously strengthened. The practice of confidentiality work in recent years has made us realize that it is very important to strengthen the confidentiality education of government officials and improve the confidentiality awareness of every citizen. For example, using computer networks and emails to send information to others is a very convenient and fast way, but it may also bring the risk of leaking information. In response to this situation, it is necessary to strengthen publicity, enhance people's awareness of confidentiality, and improve the initiative and consciousness of confidentiality work. Corresponding rules and regulations must also be formulated to standardize prior behavior and block possible losses and leaks. incidents and eliminate hidden dangers to ensure national security.

(2) To do a good job in confidentiality work, a strong material foundation is also needed to ensure it. In addition to necessary investment in funds and equipment, professional training for confidentiality staff should also be strengthened to improve the quality of confidentiality cadres. At present, there is less training for full-time (part-time) confidentiality staff at the grassroots level, and with frequent personnel changes, the professional training of confidentiality staff needs to be strengthened. Secrecy Work Research Report 5

In our country, work secrecy is a legal concept, and our country’s Civil Servant Law, Judges Law, Prosecutors Law, Police Law and other laws have this in mind Regulation. However, on the whole, these regulations are scattered, not centralized, and too principled and not specific. Therefore, they are poor in operability in actual work and lack guidance for work. In particular, with the promulgation and implementation of the "Government Information Disclosure Regulations", how to accurately define the connotation and extension of work secrets, achieve the unification of keeping work secrets in accordance with the law and actively promote government information disclosure, is an important issue that requires further research.

1. The necessity of accurately defining work secrets

It is conducive to preventing the unlimited expansion of state secrets. At present, my country's confidentiality work has problems such as "random classification" and other arbitrary classification problems. There are many reasons for this problem, and the unclear concept of work secrets is one of the reasons. It is precisely because of the unclear definition of the concept of work secrets that work secrets that are not state secrets are determined as state secrets, which leads to the infinite expansion of state secrets, which cannot be managed and cannot be managed well, resulting in leaks that occur from time to time, which brings great harm to the country. Threats to security and interests. Accurately defining work secrets can restrain the unlimited expansion of state secrets to a certain extent, reduce the cost of keeping secrets, and enable real state secrets to be protected and well protected.

It is conducive to actively promoting government information disclosure. On May 1, the "Government Information Disclosure Regulations" officially came into effect. During the implementation process, some government departments did not have a clear concept of work secrets, resulting in some government information that could have been disclosed but were afraid or unwilling to disclose it due to concerns about confidentiality. This resulted in the loss of some information resources that were beneficial to the work of the agencies and units. If it is not used effectively, the public will not understand it and will complain. Accurately defining work secrets can, on the one hand, enable relevant departments to relieve their concerns and proactively disclose government information; on the other hand, it can also enable the public to clarify which matters are work secrets and should not be disclosed, and consciously limit their right to know, which is conducive to active disclosure of government information. Promote government information disclosure.

It is conducive to ensuring that agencies and units properly exercise their powers. Work secrets are generated by government agencies in the process of exercising their powers. Disclosure or leakage will directly hinder the normal exercise of relevant powers of the unit, damage the interests of the public, reduce or impair its effectiveness in governing society, and even seriously affect social stability. .

Therefore, agencies and units have the obligation and responsibility to strictly protect them. At the same time, the determination of work secrets is an administrative discretion. The abuse of this power will seriously affect the public's right to know. Therefore, agencies and units should exercise this power with caution. Therefore, accurately defining work confidentiality can make it clear that the determination and preservation of work secrets is both a right and an obligation, a power and a responsibility, and ensures the proper exercise of their powers.

2. Conceptual analysis of work secrets

As an important classification of secrets, work secrets have no clear definition in law as to what their connotation and extension are. There are three main definitions of work secrets by authoritative departments, local regulations and academic circles. The first is the definition of the drafting department of the Civil Servant Law, which means: (1) Matters other than state secrets that must not be disclosed publicly in official activities. (2) Once leaked, it will bring harm and damage to the work of the agency and unit. The second is the definition of the "Guangzhou Municipal Regulations on Keeping Work Secrets": Work secrets refer to matters that are not state secrets and are not suitable for disclosure in the official activities and internal management of governments at all levels and their administrative departments, and shall be determined and disclosed in accordance with prescribed procedures. Work matters that are only known to a certain range of people within a certain period of time. The third is the definition of academic circles: work secrets refer to matters that arise in the official activities and internal management of state agencies at all levels that are not state secrets and are not suitable for disclosure to the outside world.

These three definitions summarize the internal and external characteristics of work secrets to a certain extent, but they have the following flaws: First, they limit the subjects of work secrets to state agencies at all levels; Certain public institutions, enterprises and institutions that actually possess work secrets and need to be accurately defined are excluded; secondly, it is not specified that the essential feature of work secrets is to ensure that state agencies and authorized units at all levels properly exercise their powers; thirdly, there is no summary of work secrets The procedural characteristics of secrets lead to the arbitrariness of determining work secrets in practice; fourth, the use of "negative" to define work secrets does not clarify what work secrets are and what they include. The definition of work secrets must be an affirmative proposition. Based on this, the author believes that from the perspective of protecting citizens’ right to know and promoting government information disclosure, the so-called work secrets refer to state agencies and authorized units at all levels, in order to ensure the proper exercise of their powers, determined according to simple procedures and within a certain period of time. Work matters that are only known to a certain range of personnel.

3. Analysis of the Characteristics of Work Secrets

(1) Extensiveness of Subjects

There is no doubt that state agencies at all levels produce the most work secrets and require strict confidentiality. However, in addition to state agencies at all levels, some authorized public institutions, enterprises and institutions are also subjects that generate work secrets and need to be strictly regulated. In practice, with the gradual advancement of our country's strategy of governing the country according to law, certain enterprises and institutions have been entrusted with authorization to engage in public affairs management and service activities. The work secrets determined by these enterprises and institutions themselves have conflicts with public interests. It may conflict with citizens’ right to know, so the work secrets of such subjects must also be taken seriously and accurately defined.

(2) Legitimacy of powers

The work secrets of administrative agencies and authorized units involve the internal management matters and external management matters of the unit. Both internal matters and external matters are consistent with Relevant to the proper exercise of powers of government agencies and units. According to the requirements for the development of democratic politics in modern countries, the process of government agencies or authorized units exercising their powers should be made public in order to protect citizens' rights to know, participate, and supervise. However, it is true that some matters that arise from government agencies or authorized units in the course of exercising their powers should not be made public. Countries around the world protect these matters as an administrative prerogative of government agencies or authorized units. However, it should be noted that this privilege can only be limited to ensuring the proper exercise of administrative powers and authorized powers, and cannot attempt to cover up administrative violations or administrative errors. Different from this, state secrets are matters related to national security and interests. If leaked, they will directly cause damage to the overall security and interests of the country. They are the most important administrative privileges granted by the Constitution.

(3) Simplicity of procedures

The work secrets of administrative agencies and authorized units involve citizens’ right to know and participate. Too many and excessive work secrets mean that The degree of realization of citizens’ rights to know and participate has been reduced. Therefore, in addition to physical restrictions on work secrets, there must also be procedural restrictions on them.

In other words, specific procedures such as the determination of work secrets, the determination and change of confidentiality periods, marking, confidentiality, and declassification must be clearly defined. However, based on the consideration of confidentiality costs, the procedures for determining and protecting work secrets should not be equated with the procedures for determining and protecting state secrets, but should highlight its simplicity. Simplified procedures refer to procedures in which administrative agencies and authorized units omit, simplify or merge certain steps and links in the procedures for determining and protecting state secrets, and determine and protect work secrets in a shorter period of time. Simplicity is not arbitrary, but an appropriately lowered standard compared to the legality and strictness of the procedures for determining and protecting state secrets.

(4) Confidentiality of content

After a matter is determined to be a work secret, the relevant administrative agencies or authorized units should refer to the management regulations on state secret protection measures to treat work secrets Specific regulations will be made on each link including the generation, storage, circulation and destruction of confidential media, and the scope of contact will be reasonably delineated based on the principle of work needs. However, keeping work secrets is slightly different from keeping state secrets. State secrets are related to the security and interests of the country. The absolute security of keeping state secrets is the highest goal and the highest principle, and there is no room for bargaining on this; while work secrets involve The principle of balance of interests or damage measurement means that when the boundary between confidentiality and disclosure is blurred and difficult to determine, the balance of interests principle is used to determine whether confidentiality and disclosure should be based on the analysis of damage and benefits to society.

(5) Administrative nature of responsibility

Keeping work secrets is the legal obligation of national civil servants, which is generally stipulated in the Civil Service Law. Article 12 of my country’s Civil Servant Law clearly stipulates that civil servants have the obligation to keep state secrets and work secrets. There are similar regulations abroad, but they are broader and cover state secrets, work secrets, business secrets learned at work, and personal privacy. For example, Article 26 of the "Law on the General Status of National and Local Civil Servants" promulgated by France in 1983 stipulates that civil servants have the obligation to keep secrets, facts known, documents and reports obtained in the performance of their duties or in connection with the performance of their duties. If a civil servant in a government department or a clerk in an authorized unit discloses work secrets without authorization, he or she violates the Civil Servant Law and shall bear administrative liability according to law. ;