Joke Collection Website - Public benefit messages - Basic knowledge of confidentiality for classified personnel

Basic knowledge of confidentiality for classified personnel

1. State secrets are matters related to national security and interests, determined in accordance with legal procedures, and limited to a certain range of personnel within a certain period of time. 2. To protect state secrets, implement the policy of active prevention, highlighting key points, and management in accordance with the law. 3. The basic principles of strengthening and improving the overall requirements for confidentiality work should adhere to the party's management of confidentiality, management in accordance with the law, comprehensive prevention, and innovation-driven. 4. The newly revised "Law of the People's Republic of China on the Protection of State Secrets" will come into effect on October 1, 2010. 5. The Central Secrecy Commission is the leading body of the Party Central Committee that provides unified leadership for the confidentiality work of the Party, government and military. 6. The national secrecy administrative department is responsible for secrecy work nationwide. 7. Top-secret state secrets are the most important state secrets, and their leakage will cause particularly serious damage to national security and interests. 8. State agencies and units at all levels shall determine the confidentiality level of state secret matters that arise in accordance with the provisions of state secrets and the specific scope of their classification. 9. The person responsible for classification shall be responsible for the determination, change and release of relevant state secrets within the scope of his/her authority. 10. Excerpts and quotations from confidential documents that are state secrets shall be marked with the highest level of confidentiality and the longest confidentiality period. 11. Keeping state secrets is a basic obligation of our citizens. 12. Secret personnel refer to staff who come into contact with, know about, manage and master state secrets at work. 13. Confidential personnel must undergo confidentiality review and training before taking up their posts. 14. Secrets-related personnel must implement declassification period management when they leave their secret-related positions. The declassification period for core secret-related personnel is three years, important secret-related personnel are two years, and general secret-related personnel are one year. 15. The declassification period for core technical experts engaged in ballistic missiles, nuclear weapons, military nuclear power, nuclear submarines and other equipment shall be no less than 5 years. 16. Before leaving secret-related positions, secret-related personnel must clear out all state secret carriers they manage and use and sign a confidentiality commitment. 17. If the confidentiality period of a state secret carrier needs to be extended, the decision shall be made by the agency, unit or superior agency that originally determined the confidentiality level and confidentiality period. 18. It is prohibited to discuss or transmit state secrets in plain language or coded language during ordinary mobile phone calls, text messages, and social media communications. 19. State secret information shall not be stored, processed, or transmitted on computers connected to the Internet. 20. Documents, materials and other items that are state secrets are not allowed to be delivered through ordinary post, express delivery or other means without confidentiality measures. 21. Secret personnel who carry state secret carriers out on official business must comply with state confidentiality regulations and take reliable confidentiality measures. 22. To destroy state secret carriers, physical or chemical methods should be used to completely destroy them to ensure that the information cannot be restored. 23. Removable storage media must not be used cross-wise on classified computers and non-confidential computers. 24. Ordinary fax machines and fax machines are not allowed to be used to transmit confidential information. 25. Confidential information systems must not be directly or indirectly connected to the Internet and must be physically isolated. 26. The confidentiality level of confidential computers should be determined according to the highest security level for storing and processing information. 27. Computer - once confidential information has been stored and processed, it should be identified as a confidential computer and the relevant confidentiality level label should be affixed. 28. Unapproved confidential information systems cannot store and process confidential information during trial operation. 29. Without the approval of the information management department of the unit, you are not allowed to format confidential computers and reinstall the operating system by yourself. 30. When on-site maintenance of confidential office automation equipment is carried out, relevant personnel should be present throughout the process. 31. Electronic files stored in confidential computers or storage media should be marked with a confidentiality level as long as the content is confidential. 32. If the system login of a confidential computer uses the method of user name and password, the system password replacement cycle shall not be longer than one week. 32. If the system login of a confidential-level computer uses user name and password, the system password replacement cycle shall not be longer than one week. 33. Top-secret computers use one-time passwords or physiological characteristics for identification. 34. The startup time of a confidential computer screen saver that complies with national confidentiality requirements is no more than ten minutes.

35. High-level secret mobile storage media are prohibited from being used on low-level confidential computers. 36. Approval procedures must be followed when taking confidential computers and storage media out. 37. If you take confidential computers and storage media out, you must conduct a confidentiality inspection when you bring them back. 38. Units with confidentiality qualifications for scientific research and production of weapons and equipment shall conduct confidentiality review and approval when releasing information to the outside world. 39. The internal institutions that generate, transmit, use and manage top-secret level or more confidential-level and secret-level state secrets in the daily work of agencies and units are called key confidentiality departments. 40. Confidentiality management must be planned, deployed, inspected, summarized, and rewarded and punished in the same way as confidential scientific research management. 41. Article 100 of the Criminal Law stipulates that anyone who steals, spies on, bribes, or illegally provides state secrets or intelligence for overseas institutions, organizations, or personnel shall be sentenced to fixed-term imprisonment of not less than five years but not more than ten years.