Joke Collection Website - Bulletin headlines - 2065438+2008 Selected Experiences of Confidentiality Awareness and Common Sense Education
2065438+2008 Selected Experiences of Confidentiality Awareness and Common Sense Education
The meeting was presided over by Tian Junqiang, executive deputy director of the editorial department. First of all, Director Tian profoundly analyzed the new situation and challenges faced by the current security work from the current information security situation and risks, the security threats faced by important national information, the main loopholes in leaking secrets, and computer networks. And organized and studied the Law of People's Republic of China (PRC) on Guarding State Secrets, which came into effect on October 20 10/0, and the Implementation Regulations of People's Republic of China (PRC) Law on Guarding State Secrets, which came into effect on March 0 1 year. Finally, it is more vividly expounded through two real cases of leaking secrets through new media such as WeChat and QQ.
Because the information in the organization is very important, and the staff work in a confidential environment for a long time, editorial cadres need to have a high sense of confidentiality. The editorial department has formulated a number of measures to ensure the safety of the organization:
First, confidential computers are not allowed to access the Internet, and the comprehensive management platform for institutional compilation statistics and real-name registration system is not allowed to access the Internet, and the fundamental bottom line of "Internet access is confidential and Internet access is not confidential" is adhered to;
Second, the personal USB flash drive is managed by myself, and the principle of not mixing USB flash drives of networked computers and non-networked computers is adhered to;
Third, the file transmission line processing, all the files that need to be transmitted to the relevant units are burned on the CD and then transmitted through the intranet security line, which ensures the security of the files.
After the study, everyone said that under the condition of informationization, every staff member should have basic confidentiality awareness and common sense. Never say what you shouldn't say, never ask what you shouldn't ask, never read what you shouldn't read, and be an insider, a knowledgeable person and a good at keeping secrets.
20 16 experience in selected confidentiality awareness and common sense education
First, strengthen the publicity and education of the Secrecy Law and enhance employees' sense of confidentiality.
The secrecy law provides a reliable legal guarantee for us to do a good job in secrecy under the new situation.
Confidential work experience. We believe that the most fundamental thing to do a good job in keeping technology and data confidential according to law is to enhance the confidentiality concept and sense of responsibility of technicians and employees. Therefore, combined with the implementation of the secrecy law, we should take various forms to publicize and educate technicians with the secrecy law as the main content. First, systematically publicize and study the "Secrecy Law" to further clarify the status and role of confidentiality work. The second is to hold a special meeting to carry out key confidential education. Confidentiality work should attract the attention of the whole party and all employees, especially cadres, scientific and technological personnel and employees with more secrets. Therefore, in addition to insisting on secrecy education with secrecy law as the main content, we should also learn internal secrecy rules and regulations, carry out activities of leaking cases, and implement targeted and focused secrecy education. In view of the fact that some scientific and technological personnel steal secrets in the field of science and technology at home and abroad and lack the necessary knowledge of scientific and technological secrecy, they organize to watch relevant TV videos, choose the knowledge of scientific and technological secrecy published in Confidentiality Work, and strengthen the education of scientific and technological secrecy.
Through in-depth and meticulous confidentiality education, the concept of confidentiality and sense of responsibility of technicians have been significantly enhanced. Drilling geological design, technical data and engineering data, which are often mixed in newspapers and magazines piled up everywhere, are now collected in cabinets and registered separately. The technical data shall be managed by the responsible person. When they are taken out for inspection and all recovered, the special person shall be responsible for inspection and recording. This not only improves the speed and efficiency of work, but also makes the management of technical data and documents orderly and safe.
Second, improve the confidentiality system and strictly manage confidentiality.
Security work is very policy-oriented. According to the requirements of the secrecy law, some systems in the past can not fully meet the current needs. Therefore, we should take establishing and perfecting the secrecy system as an important task to implement the secrecy law. The first is to establish a confidentiality system. In accordance with the secrecy law and relevant technical data confidentiality requirements, the original document confidentiality system should be revised, and the systems such as document management norms, cadre confidentiality provisions, technical personnel confidentiality work methods, publicity and reporting confidentiality system, and technical secret confidentiality provisions should be improved, and the confidentiality matters of online office business should also be stipulated. So that the confidentiality of technical data and documents in the future can be followed by laws and rules.
Third, carry out a confidentiality competition to improve the confidentiality level of documents and materials.
The first is to carry out competition activities. Through the competition, it can promote the technical personnel of the unit to strive for a new level of confidentiality, and at the same time make a fair and objective evaluation of the results of the activities and give some encouragement. The second is to conduct regular assessments. In the assessment, the units and individuals that have made outstanding achievements in practical work should be commended in strict accordance with the standards and the principle of equal treatment. Finally, effectively mobilize the enthusiasm and initiative of technicians at all levels, strive for perfection and be brave in innovation. The above are some immature views on the confidentiality of technical data of our unit, which need to be constantly tested in future work practice and constantly improve the level of confidentiality.
QHSE Management Department: On the afternoon of February 6th, the company organized personnel to study the case of stealing secrets and leaking secrets. We think this exhibition is rich in content, concrete in form and shocking in case, which gives us a vivid secret education lesson. Through the study, I realize that at present, the trend of world multipolarization and economic globalization is developing in depth, and the secrecy work is more difficult and the secrecy work situation is grim. From a strategic and overall perspective, we should fully understand the importance and urgency of strengthening secrecy work, earnestly enhance our sense of responsibility and mission, comprehensively strengthen publicity and education on secrecy legal system, and better play the role of service and guarantee in maintaining national security and stability.
First, strengthen confidentiality education and enhance confidentiality awareness. Publicity and education activities were widely carried out by broadcasting warning films and holding publicity columns. To achieve confidential education, "there are always demands, voices and activities."
The second is to strengthen confidentiality measures and highlight the effectiveness of work. Strengthen the confidentiality management of key confidential departments and key confidential matters, strictly implement the censorship system of company information disclosure and news reports, and strictly regulate the operation of official documents.
The third is to conscientiously implement the responsibility system for leading cadres' confidentiality. The key to secrecy lies in leadership, with emphasis on leadership. Leaders at all levels should shoulder the leadership responsibility of confidentiality work and put it on the important agenda.
The fourth is to strengthen supervision and inspection to eliminate hidden dangers of confidentiality. The company shall carry out a safety inspection activity regularly. In the inspection, we should adhere to the principle and take it seriously, and order the matters that do not meet the confidentiality requirements to be rectified within a time limit, and require all employees to establish the concept that "the hidden danger of leaking secrets is around, and the confidentiality work starts with me" and earnestly strengthen the confidentiality work. Adhere to the regular meeting system, implement scientific decision-making, supervise the implementation of the work, and ensure that the confidentiality work is carried out vigorously, orderly and effectively, and that the confidentiality work is foolproof.
Planning and Finance Department: On the afternoon of February 6th, the company organized employees to watch TV and video programs on confidential work, and was surprised and shocked by criminal incidents such as ignoring national security, leaking secrets to overseas countries, ignoring industry norms, and leaking secrets to other enterprises. Thankfully, the criminal who leaked the secret was finally put in prison. Combined with the financial management work we are currently engaged in, we believe that taking this as a lesson, we should always keep secrets and effectively prevent the crime of leaking secrets.
First, improve the quality of financial managers. Financial managers have a special status and identity, and they have the characteristics of knowing secrets early, knowing more secrets and knowing more secrets. Protecting enterprise secrets is more important than ordinary staff. Therefore, the quality of financial managers is the key to the quality of financial secrecy. Financial managers must have a strong sense of responsibility, dedication and a high sense of confidentiality. They should not only have a rigorous work style, but also have clear procedures and prevent the secret of "intangible" savings from leaking out in their minds. Because financial managers often come into contact with a large number of business secrets of the unit, these secrets are brought to various complicated occasions with their social activities. Often in a word, the speaker is unintentional, the listener is intentional, and the secret is leaked unconsciously. Therefore, no matter what the occasion, financial personnel should keep their mouths shut, be foolproof, and take protecting the secrets of this enterprise as their sacred duty and due obligation.
The second is to strengthen the daily management of accounting files. The consulting, moving and destruction of accounting files should be handled in strict accordance with the prescribed procedures, and must be approved by the leaders of the formulation, and the registration and signing procedures should be carefully performed. No one has the right to access them without authorization. After the use of accounting files, they should be cleaned up and checked in time. If the problem of confidentiality and disclosure is found, the reasons should be found out in time and remedial measures should be taken to prevent irreparable economic losses to the enterprise.
The third is to strengthen the safe carrying of accounting materials and warehouse management. Financial data should be carried with people in the data, and the transfer should be carried out in secret to prevent all possible accidental losses. Accounting data warehouse management should be considered from many aspects, and not any office can be used as a warehouse. Considering the confidentiality of accounting data, it is not appropriate to locate the warehouse on the ground floor of the office building, and the doors and windows of the warehouse should be specially reinforced to prevent theft. We should also try to separate the data warehouse from the office and the data warehouse from the reading room. The accounting data warehouse should be managed by a designated person, and a strict warehouse management system should be formulated to prohibit irrelevant personnel from entering. Practice has proved that the scientific management of financial data warehouse is the basic guarantee of financial secrecy and financial file security, and it is also a powerful measure to prevent the crime of data disclosure in enterprises.
Fourth, continue to conscientiously implement and study the spirit of the State Secrecy Law. As accountants, we should make use of our own jobs, widely publicize the secrecy law, seriously study the secrecy law, constantly improve our ideological understanding and enhance our sense of secrecy. First, we must have a high sense of political responsibility, love the motherland and love the party; The second is to have high professional quality and professional knowledge, and be familiar with the confidentiality laws and regulations of this position; Third, we should have keen working ability and observation ability, be good at doing confidential work, and be able to handle general confidential issues in our work independently.
20 16 experience in selected confidentiality awareness and common sense education
With the rapid development of information technology and the increasing number of information dissemination channels, the connotation and extension of military secrecy work in the new period are constantly enriched, and it is facing unprecedented new situations and challenges. How to adapt to the complex new situation, better serve the central work of the army, and do a good job in the support of the army is a new topic that every officer and soldier needs to devote himself to thinking and seriously discussing. Information security and confidentiality is a long-term and historic political task. Today, with the progress of science and technology, security has become the top priority of all work. Therefore, we must actively formulate effective measures to do a good job in information security and confidentiality, and safeguard national security and stability.
First, strengthen education, raise awareness, build a strong ideological "firewall" and achieve "three essentials"
In view of the fact that some officers and men are mentally paralyzed in practical work, illegally surfing the Internet and using mobile storage media, the information concerning military activities in letters is not kept confidential, and violations of confidentiality regulations occur from time to time. Therefore, it is necessary to put people first, strengthen ideological education and guidance, do a good job in information security and confidentiality, constantly enhance the awareness of information security and confidentiality of officers and men, do a good job in preventing information leakage, and block the channels of information leakage from the source.
First, we should strengthen the pertinence of educational content. In terms of safety education, it is necessary to strengthen the education of safety laws and regulations, and carry out targeted studies on information security, technical security and network security, so that officers and men can understand the dangers of leaks and preventive measures. According to the needs of business work, conduct regular business knowledge confidentiality education for important positions and key personnel. Do a good job of "one point, one line": First, do a good job of confidentiality education for leading cadres. Incorporate confidentiality education into the publicity and education work of this unit, and continuously strengthen the confidentiality awareness of leading cadres and improve their confidentiality skills through centralized education and case warning education; The first line is to do a good job in the confidentiality education of key positions, staff and secret-related personnel. Take the form of holding training courses, lectures, and warning film exhibitions. Strengthen the education of ideals and beliefs, the secrecy situation and the secrecy legal system, help the secret-related personnel to enhance their awareness of the enemy and the enemy, and firmly hold the national secret defense line ideologically.
Second, we must adhere to the diversity of educational forms. Will be included in the political education plan, overall arrangement, combined with the actual situation of the unit, the nature of the task, security facilities, the degree of confidentiality, personnel status, etc., to take the form of leadership class, special discussion, security analysis, watching videos and other forms of security education. According to their own situation, set up a confidential education study group headed by the main leaders and discuss it regularly. Strive to make the education curriculum lively, easy to learn and understand, easy to master, focused and comprehensive, combine centralized education with decentralized education, combine regular education with random education, combine general education with individual education, and combine professional education with ideological education to ensure that every officer and soldier is educated and well educated.
Third, we should highlight the effectiveness of educational effects. It is necessary to pay attention to the infiltration of secret education into the whole process of various tasks, and to carry out special secret education during major festivals and important military activities; Arrange special safety education when cadres change jobs, personnel transfer and soldiers leave the army; Conduct regular education for confidential personnel, confidential personnel, network command system staff and other confidential personnel. It is necessary to change the formalistic practice of focusing only on how many classes, how many people and how many documents have been learned in education, and position the effectiveness of education on the scale of how much secret knowledge the officers and men have mastered under high-tech conditions, the strength of their sense of secrecy, and whether they have leaked secrets. By stimulating and enhancing the consciousness and initiative of officers and men who are diligent in learning, good at thinking, brave in innovation and practice, their sense of security and confidentiality can be effectively improved.
Two, strengthen management, implement the system, build a strong management "firewall" and implement the "four systems"
At present, although the country has strengthened the security and secrecy work, and all levels of the military have also carried out targeted education in time and strengthened the security and secrecy measures, compared with the requirements of the new situation and new tasks, there are still some unsuitable places and many problems that need to be solved urgently. In this regard, we must strengthen military management, improve rules and regulations, strengthen measures, build a solid wall of management, and do a good job in the implementation of the "four systems."
The first is to improve the rules and regulations. The main leaders of the unit should establish the consciousness of "no small matter in confidential work" and set up an institution responsible for confidential work. The organization of security work should give full play to its role, earnestly perform its duties, regard security work as an important task, put it on the agenda, carry out special investigations, and formulate perfect and feasible rules and regulations. In view of the problems existing in the use of mobile phones and computers by officers and men in the new situation, combined with the actual situation, we will study countermeasures and formulate effective management measures, and it is strictly forbidden to use one computer for two purposes.
The second is to adhere to the office system. For secret-related personnel, it is necessary to clarify the scope of activities and prevent secret vector from taking out of the office area to talk about secrets with irrelevant personnel; The production, distribution, transmission, storage and destruction of documents and materials should be controlled in the whole process, and documents and materials with incomplete procedures should not be taken out of the office; Floppy disks, removable hard disks and USB flash drives shall be kept and encrypted by designated personnel; Statistics, classification and filing of computers shall be uniformly numbered according to the five levels of "Top Secret, Confidential, Secret, Internal and Open", uniformly labeled with classified labels, and classified management shall be implemented; The confidential computer used must provide a power-on password of not less than the specified number of digits. Computers connected to the Internet must not involve secrets. It is strictly forbidden to take the portable computer home for use and surfing the Internet without permission.
The third is to implement the inspection system. On major festivals, it is necessary to inspect key classified parts and secret vector, and conduct key inspections or special inspections on communication lines and network command systems that are easy to leak inside and outside the camp, and take effective measures; Grasp and control the activities of long-term secret-related personnel, and timely review and transfer those who may cause leaks; The secret of opening the computer
For those who have insufficient digits and surf the Internet without authorization, it is necessary to make rectification within a time limit, make regular inspection and supervision, make unremitting efforts, check and change, find problems, correct them in time, and nip in the bud.
Fourth, strict responsibility system. Rules and regulations are the basic basis for doing a good job in security and confidentiality, and whether rules and regulations can play an effective role depends on whether the responsibility system is perfect and implemented. To do a good job in security and confidentiality, the key is to act according to the rules, form a responsibility system that pays attention to the first level and is responsible for the first level, and earnestly implement the responsibility to individuals. It is necessary to organize officers and men to sign the Information Security Responsibility Letter. Those who do not act according to the rules and regulations and endanger information security should be dealt with in strict accordance with the regulations and held accountable. They must not tolerate it, earnestly safeguard the seriousness and authority of the rules and regulations, and ensure that all kinds of rules and regulations for information security and confidentiality are effective.
Third, grasp the key, improve facilities, build a technical "firewall" and implement the "three measures"
With the wide application of computer, network and communication technology in fire fighting forces and the vigorous promotion of paperless office, various means of processing and storing confidential information have also undergone tremendous changes. A large number of confidential information is transmitted quickly and easily copied, and its controllability is greatly weakened. A USB flash drive can store tens of thousands of files, and a mobile hard disk can hold millions of files. Once lost or stolen, the consequences are unimaginable. Therefore, in view of the rapid development of network stealing and infiltration technology in the information age, how to "ensure security and promote development" makes security work face new challenges. In the safety work under high-tech conditions, we must take practical measures, attach importance to the training of safety technical personnel, do a good job in safety technical prevention, and implement the "three measures".
First, we must strengthen the cultivation of confidential talents. All levels of the army should face up to the current situation of secrecy work and the contingent of secrecy talents, attach importance to the cultivation of secrecy talents, and conduct corresponding professional knowledge training on a regular basis, so as to lay a foundation for guiding the troops to do a good job in secrecy work. Please come in, send out, run business training classes, etc., do a good job in information technology training, and strive to improve the professional quality and professional level of confidential business personnel. For confidential, communication, network command system and other staff, it is necessary to conduct a strict review to prevent people with impure thoughts, unstable posts or personality defects from mastering secret information, not only to prevent leaks caused by objective factors, but also to prevent subjective and artificial leaks.
Second, we must strengthen infrastructure construction. It is necessary to invest the necessary manpower, material resources and financial resources in infrastructure construction and work hard on "hardware". The confidential room, confidential room, reference room and archives room should be equipped with "three irons" (iron gates, bars and cabinets), confidential room and alarm system. The problems existing in classified computers should be checked and maintained by special personnel in time to ensure the normal operation of computers. On the issue of infrastructure implementation, money must be spent, equipment must be matched, and it must be well matched. Never leak because the infrastructure is not in place.
Third, we must do a good job in ensuring special facilities. We should do well in the use and management of computer equipment. For computers connected to the Internet, it is necessary to separate confidential computers from non-confidential computers. For computers, access control technology, firewall technology and anti-virus technology should be installed in the form of physical isolation, with advanced technology as the guarantee, and the outflow of confidential information should be resolutely put an end to. Don't take any chances. If something goes wrong, we must find a way to truly implement the statement that "one machine is strictly prohibited for dual use".
- Previous article:How to be an excellent class teacher
- Next article:Which province and city is Ruoqiang County in Bayinguoleng, Xinjiang?
- Related articles
- What is the slogan of cherishing water resources?
- What is a logo T-shirt? What does an advertising shirt with LOGO on it mean?
- Quality benchmarking team slogan slogan daquan
- Do a good job in promoting the national health city review work
- Summary of the Global Hand-washing Day in 222 (6 articles)
- Warm slogan of caring for the elderly and building harmony in nursing homes
- How about China Construction Bank Co., Ltd. Wuhan Aerospace Shuangcheng Sub-branch?
- 10 reasons not to lose weight.
- Comprehensive Management Publicity Month Summary Template
- Classic sentences of pearl speech