Joke Collection Website - Bulletin headlines - Ten Prohibited Contents of Confidentiality Work
Ten Prohibited Contents of Confidentiality Work
1. It is forbidden to use personal electronic devices to shoot, store, process and transmit confidential, internal and sensitive information.
2. It is forbidden to use social media such as WeChat and QQ to store, process and transmit confidential, internal and sensitive information.
3. It is forbidden to use graphic recognition and other applications to store, process and transmit confidential, internal and sensitive information.
4. It is forbidden to publish, forward, process and disseminate confidential, internal and sensitive information from media and friends.
5. It is forbidden to talk about, provide and handle confidential, internal and sensitive information in places that do not have confidentiality conditions.
6. It is prohibited to illegally carry documents, materials, carriers and equipment containing confidential, internal and sensitive information out of the country.
7. It is forbidden to accept consultation, interview and investigation in violation of regulations, and to talk about, provide and handle confidential, internal and sensitive information.
8. It is forbidden to collect, provide and publish (print and burn) non-confidential information without "non-confidential review".
9. Without the examination and approval procedures specified in the Confidentiality Approval Form, no information may be provided or released to the outside world.
10. It is forbidden to store, process and transmit confidential, internal and sensitive information, as well as steal secrets and disclose illegal clues through the Internet, Shangmi.com and WeChat.
Confidentiality system for confidential work:
1. Keeping state secrets is related to national security and interests, and it is the duty and responsibility of every national staff. The staff of all departments must strictly abide by the secrets of the party and the state, abide by the confidentiality code, and act in accordance with the procedures stipulated in the secrecy law.
2, the computer room to establish and improve the management system, enter the computer room to carry out examination and approval and registration system, to determine the person responsible for computer application management. Where confidential data are transmitted and stored, corresponding security measures should be taken, and floppy disk information should be properly kept with files to prevent loss.
3, establish and improve the system of sending and receiving documents, each department should have someone who is responsible for the registration, management and repaying of documents. When documents belonging to state secrets are found to be lost, stolen or leaked, they must be reported immediately, traced in time and recovered.
4. Documents and some publications that have nothing to do with this department and have no preservation value must be destroyed or shredded at the end of the year, and shall not be sold without authorization.
5. Full-time and part-time archivists should strictly manage confidential archival materials and strictly transfer and borrow them. If you need to borrow, you must obtain the consent of the leader in charge and consult it in the file reading room. You are not allowed to take them out of the archives or pick them up. Archivists shall not expand the scope of use without approval to ensure the safety of archives.
- Previous article:Where is the smart tripod warning sign?
- Next article:Congratulations and encouragement for the postgraduate entrance examination
- Related articles
- Community fund slogan
- Baw 2 12 slogan
- After a few years, you can create a third level.
- Sentences about paying attention to safety when working on the construction site
- Anita Yuen slogan
- Event planning with the theme of anti-epidemic
- What do you mean the cashier is suspended?
- Model essay on the annual work summary of school canteen safety
- What is the linkage path of five institutions?
- The role of corporate culture